Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Guillaume BarbuIDEMIAVerified email at idemia.com
Alberto BattistelloSecurity PatternVerified email at securitypattern.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Caroline FontaineCNRS researcher, at LSV (Cachan, France)Verified email at lsv.fr
Abdellatif Benjelloun TouimiAmazon Web ServicesVerified email at ieee.org
Michael TunstallCryptography ResearchVerified email at cryptography.com
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Sébastien DuvalUniversité de VersaillesVerified email at uvsq.fr
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
ileana buhanRadboud UniversityVerified email at ru.nl
Rina ZeitounVerified email at idemia.com
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA
Verified email at idemia.com