Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jean-Christophe DeneuvilleAssociate Professor, ENAC, Toulouse, FranceVerified email at enac.fr
Carlos Aguilar-MelchorChief Scientist, Cybersecurity, SandboxAQVerified email at sandboxquantum.com
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Nicolas SendrierInriaVerified email at inria.fr
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
Philippe GaboritProfessor in computer science, university of Limoges, FranceVerified email at unilim.fr
Wen WangIntel LabsVerified email at yale.edu
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneVerified email at univ-st-etienne.fr
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Rafael MisoczkiCryptographer at GoogleVerified email at google.com
Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
Shay GueronProfessor, University of Haifa and Distinguished Engineer, MetaVerified email at math.haifa.ac.il
Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
Gilles ZémorProfessor of Mathematics, Bordeaux UniversityVerified email at math.u-bordeaux.fr
Jefferson E. RicardiniAmazonVerified email at amazon.com
Kris GajGeorge Mason UniversityVerified email at gmu.edu
Daniel MasnyMetaVerified email at fb.com
Follow

Edoardo Persichetti
Associate Professor, Florida Atlantic University
Verified email at fau.edu - Homepage