Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Stefan KölblGoogleVerified email at mailbox.org
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Gaëtan LeurentINRIAVerified email at inria.fr
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Christof BeierleRuhr University BochumVerified email at rub.de
Gregor LeanderRuhr University BochumVerified email at rub.de
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Marc StevensScientific Researcher, Centrum Wiskunde & InformaticaVerified email at marc-stevens.nl
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Follow![Thomas Peyrin](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=JUXrVDIAAAAJ&citpid=5)