Get my own profile
Public access
View all43 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Patrick DerbezUniversité Rennes 1Verified email at irisa.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Benjamin GregoireInria Sophia-AntipolisVerified email at inria.fr
Gaëtan LeurentINRIAVerified email at inria.fr
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Antoine JouxCISPAVerified email at cispa.saarland
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Mohamed SabtUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Pierre-Yves StrubResearch Scientist, PQShieldVerified email at strub.nu
Raphael BostDirection Générale de l'ArmementVerified email at alumni.brown.edu
Alexandre TermierUniversity of Rennes 1Verified email at irisa.fr
Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Mélissa RossiANSSIVerified email at ssi.gouv.fr