Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Lionel TORRESLIRMMVerified email at lirmm.frP. MAURINEUniv. Monpellier / LIRMMVerified email at lirmm.fr
Amine DehbaouiQualcomm TechnologiesVerified email at qti.qualcomm.com
Rafael SoaresUniversidade Federal de PelotasVerified email at inf.ufpel.edu.brNey Laert Vilar CalazansLecturer at the Computing Department (DEC), Federal University of Santa Catarina, UFSCVerified email at ufsc.br
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Sylvain GUILLEYSecure-IC, a Cadence CompanyVerified email at secure-ic.com
Laurent ImbertLIRMM, CNRSVerified email at lirmm.frChristoph DobraunigIntel CorporationVerified email at intel.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at tugraz.at
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Fernando Gehm MoraesProfessor at the School of Technology at PUCRSVerified email at pucrs.br