Get my own profile
Public access
View all30 articles
1 article
available
not available
Based on funding mandates
Co-authors
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Quisquater Jean-JacquesUCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
Marc JoyeZamaVerified email at zama.ai
Thomas PetersResearch Associate (F.R.S.-FNRS), UCLouvain, BelgiumVerified email at uclouvain.be
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Khoa NguyenUniversity of Wollongong, AustraliaVerified email at uow.edu.au
Nuttapong AttrapadungAIST, JapanVerified email at aist.go.jp
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
S LingVerified email at ntu.edu.sg
Damien StehléENS de LyonVerified email at ens-lyon.fr
Fabrice MouhartemMicrosoft Research IndiaVerified email at microsoft.com
Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
Fabien LaguillaumieProfesseur of Computer Science, Univ. Montpellier/LIRMMVerified email at ens-lyon.fr
Carla RàfolsUniversitat Pompeu FabraVerified email at upf.edu
Elie de PanafieuBell Labs France, NokiaVerified email at nokia-bell-labs.com
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Shweta AgrawalIndian Institute of Technology MadrasVerified email at iitm.ac.in
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Elizabeth QuagliaSenior Lecturer, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org