Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
Karthikeyan BhargavanINRIAVerified email at inria.fr
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
Drew SpringallAuburn UniversityVerified email at auburn.edu
Luke ValentaCloudflareVerified email at cloudflare.com
Arjen LenstraProfessor of Computer Science, EPFLVerified email at epfl.ch
Antoine JouxCISPAVerified email at cispa.saarland
David AdrianIndependentVerified email at umich.edu
Benjamin VanderSlootAssistant Professor, University of Detroit MercyVerified email at udmercy.edu
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Nicolas ThériaultUniversidad de Santiago de ChileVerified email at usach.cl
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Richard P BrentAustralian National UniversityVerified email at anu.edu.au
Shi BaiFlorida Atlantic UniversityVerified email at fau.edu