Get my own profile
Public access
View all32 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Inria, IUFVerified email at ens.fr
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Akira TakahashiJ.P. Morgan AI Research & AlgoCRYPT CoEVerified email at jpmorgan.com
Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
Yang YuTsinghua UniversityVerified email at mail.tsinghua.edu.cn
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Avradip MandalZfense LabsVerified email at zfenselabs.com
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Benjamin GregoireInria Sophia-AntipolisVerified email at inria.frJean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Vincent Quentin UlitzschMassachusetts Institute of TechnologyVerified email at mit.edu
Francisco Rodríguez-HenríquezTechnology Innovation Center: Cryptography Research Centre of the Technology Innovation CentreVerified email at cs.cinvestav.mx
Amit SahaiSymantec Chair in Computer Science; Professor of Computer Science and Mathematics, UCLAVerified email at cs.ucla.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr