Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Avradip MandalSkyflowVerified email at skyflow.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Marc JoyeZamaVerified email at zama.ai
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Ilya KizhvatovBioNTech SEVerified email at biontech.de
Antoine JouxCISPAVerified email at cispa.saarland
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Alexander MayRuhr-Universität BochumVerified email at rub.de
Follow
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage