Get my own profile
Public access
View all20 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Amir MoradiRuhr University Bochum, GermanyVerified email at rub.de
Stefan KölblGoogleVerified email at mailbox.org
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Christof BeierleRuhr University BochumVerified email at rub.de
Gregor LeanderRuhr University BochumVerified email at rub.de
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Patrick DerbezUniversité Rennes 1Verified email at irisa.fr
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Christina BouraUniversité de Versailles (UVSQ)Verified email at uvsq.fr
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
Valentin SUDERUniversity of Rouen NormandyVerified email at suder.xyz
Gaëtan LeurentINRIAVerified email at inria.fr
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Nicky MouhaResearcher, NISTVerified email at nist.gov
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn