Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ayoub OtmaniUniversity of RouenVerified email at univ-rouen.fr
Nicolas SendrierInriaVerified email at inria.fr
Philippe GaboritProfessor in computer science, university of Limoges, FranceVerified email at unilim.fr
Gilles ZémorProfessor of Mathematics, Bordeaux UniversityVerified email at math.u-bordeaux.fr
Ludovic PerretSorbonne University/LIP6Verified email at lip6.fr
Thomas Debris-AlazardInria SaclayVerified email at inria.fr
Alain CouvreurINRIA & LIX, École PolytechniqueVerified email at lix.polytechnique.fr
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
Harold OllivierINRIAVerified email at inria.fr
Iryna AndriyanovaETIS / ENSEA - Université Cergy Pontoise - CNRSVerified email at ensea.fr
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Valérie Gauthier-UmańaUniversidad de los Andes, Departamento de Ingeniería de Sistemas y ComputaciónVerified email at uniandes.edu.co
Rafael MisoczkiCryptographer at GoogleVerified email at google.com
Olivier RuattaProfessor of Mathematics and Computer SciencesVerified email at unilim.fr
Edoardo PersichettiAssociate Professor, Florida Atlantic UniversityVerified email at fau.edu
Carlos Aguilar-MelchorChief Scientist, Cybersecurity, SandboxAQVerified email at sandboxquantum.com
Vlad-Florin DragoiAurel Vlaicu University of AradVerified email at uav.ro
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Antoine JouxCISPAVerified email at cispa.saarland
Yuval RoichmanBar-Ilan UniversityVerified email at math.biu.ac.il