Get my own profile
Public access
View all32 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
- Gaëtan LeurentINRIAVerified email at inria.fr
- Willi MeierFHNWVerified email at fhnw.ch
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Xavier BonnetainInria, CNRS, Université de LorraineVerified email at inria.fr
- Léo PerrinInriaVerified email at inria.fr
- Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
- Christina BouraUniversité de Versailles (UVSQ)Verified email at uvsq.fr
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Marc KaplanVeriQloudVerified email at veriqloud.com
- Anthony LeverrierInriaVerified email at inria.fr
- Antonio Flórez-GutiérrezNTT Social Informatics LaboratoriesVerified email at inria.fr
- Valentin SUDERUniversity of Rouen NormandyVerified email at suder.xyz
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Renaud SirdeyResearch Director, Commissariat à l'Energie Atomique, FranceVerified email at cea.fr
- Sergiu CarpovInpherVerified email at inpher.io
- Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
- Benoit Chevallier-MamesZamaVerified email at zama.ai