Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Arjen LenstraProfessor of Computer Science, EPFLVerified email at epfl.ch
Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
Karthikeyan BhargavanINRIAVerified email at inria.fr
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
Luke ValentaCloudflareVerified email at cloudflare.com
Antoine JouxCISPAVerified email at cispa.saarland
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
David AdrianUniversity of MichiganVerified email at umich.edu
Drew SpringallAuburn UniversityVerified email at auburn.edu
Benjamin VanderSlootAssistant Professor, University of Detroit MercyVerified email at udmercy.edu
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Nicolas ThériaultUniversidad de Santiago de ChileVerified email at usach.cl
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Richard P BrentAustralian National UniversityVerified email at anu.edu.au
Fr Morainprofesseur d'informatique. Ecole Polytechnique FranceVerified email at lix.polytechnique.fr