Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.frPascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Nikolaos-Foivos POLYCHRONOUHardware Security PhDVerified email at cea.fr
Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.frVincent BeroulleUniv. Grenoble Alpes, Grenoble INP-UGA, LCISVerified email at lcis.grenoble-inp.fr
Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.frJean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
Camille SivelleNTNUVerified email at ntnu.no
Julien BringerKallistechVerified email at kallistech.com
Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.frJannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Mathieu GallissotCEA/LitenVerified email at cea.fr
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Philippe Elbaz-VincentProfessor of Mathematics, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Ayoub Ben HassenInstitut Polytechnique de ParisVerified email at telecom-sudparis.eu
Gérard ChalhoubUniversité Clermont AuvergneVerified email at uca.fr