Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guillaume BarbuIDEMIAVerified email at idemia.comEmmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Alberto BattistelloSecurity PatternVerified email at securitypattern.comMatthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
Jean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Agathe HouzelotPHD student at IDEMIA and the University of BordeauxVerified email at idemia.com
Praveen Kumar VadnalaPQShieldVerified email at pqshield.com
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor (UCLouvain)Verified email at uclouvain.be
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
François KoeuneUCL Crypto GroupVerified email at uclouvain.beSébastien DuvalUniversité de LorraineVerified email at loria.fr
Davide BelliziaSenior Secure ASIC/FPGA Designer | Researcher @ Telsy S.p.A.Verified email at telsy.it
ileana buhanRadboud UniversityVerified email at ru.nl
Michael TunstallCryptography ResearchVerified email at cryptography.comCaroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
Abdellatif Benjelloun TouimiAmazon Web ServicesVerified email at ieee.org
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA Secure Transactions
Verified email at idemia.com