Get my own profile
Public access
View all28 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
- Akira TakahashiJ.P. Morgan AI Research & AlgoCRYPT CoEVerified email at jpmorgan.com
- Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Avradip MandalZfense LabsVerified email at zfenselabs.com
- Yang YuTsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
- Mélissa RossiANSSIVerified email at ssi.gouv.fr
- Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
- Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Craig GentryChief Scientist, CornamiVerified email at cornami.com
- Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
- Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
- Aaram YunVerified email at ewha.ac.kr
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Soundes MarzouguiSTMicroelectronics & TU BerlinVerified email at tu-berlin.de