Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
- Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Stefan KölblGoogleVerified email at mailbox.org
- Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
- Christof BeierleRuhr University BochumVerified email at rub.de
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
- Patrick DerbezUniversity of RennesVerified email at irisa.fr
- María Naya-PlasenciaINRIA ParisVerified email at inria.fr
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Henri GilbertANSSIVerified email at ssi.gouv.fr
- Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
- Christina BouraIRIF, Université Paris CitéVerified email at irif.fr
- Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
- Valentin SUDERUniversity of Rouen NormandyVerified email at suder.xyz
- Gaëtan LeurentINRIAVerified email at inria.fr
- Dahmun GoudarziQuarkslabVerified email at quarkslab.com
- Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com