Get my own profile
Public access
View all40 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.frGaëtan LeurentINRIAVerified email at inria.fr
Christina BouraIRIF, Université Paris CitéVerified email at irif.fr
Willi MeierFHNWVerified email at fhnw.ch
Xavier BonnetainInria, CNRS, Université de LorraineVerified email at inria.fr
Léo PerrinInriaVerified email at inria.frJean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Marc KaplanVeriQloudVerified email at veriqloud.comAnthony LeverrierInriaVerified email at inria.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Antonio Flórez-GutiérrezNTT Social Informatics LaboratoriesVerified email at ntt.comRenaud SirdeyResearch Director, Commissariat à l'Energie Atomique, FranceVerified email at cea.fr
Sergiu CarpovArciumVerified email at arcium.com
Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
Valentin SUDERUniversity of Rouen NormandyVerified email at suder.xyzMartin SchläfferInfineon TechnologiesVerified email at infineon.com
Friedrich WiemercryptosolutionsVerified email at mailbox.org