Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.fr
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Nikolaos-Foivos POLYCHRONOUHardware Security PhDVerified email at cea.fr
Vincent BeroulleUniv. Grenoble Alpes, Grenoble INP-UGA, LCISVerified email at lcis.grenoble-inp.fr
Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.fr
Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
Camille SivelleNTNUVerified email at ntnu.no
Julien BringerKallistechVerified email at kallistech.com
Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Mathieu GallissotCEA/LetiVerified email at cea.fr
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Philippe Elbaz-VincentProfessor of Mathematics, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr