Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Louise HuotVerified email at intel.com
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Ludovic PerretSorbonne University/LIP6Verified email at lip6.fr
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Raphaël MarinierGoogle AIVerified email at google.com
Reynald LercierInstitut de Recherche Mathématique de RennesVerified email at m4x.org
Antoine JouxCISPAVerified email at cispa.saarland
Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
Benjamin SmithINRIA and École polytechniqueVerified email at lix.polytechnique.fr
Domingo GómezProfesor de Informática (Unican)Verified email at unican.es
Christian QueinnecProfessor Emeritus of Computer Science, Sorbonne UniversitéVerified email at upmc.fr
Tristan VacconMaître de conférences, Université de LimogesVerified email at unilim.fr
zoran sunicHofstra UniversityVerified email at hofstra.edu
Delaram KahrobaeiProfessor of Mathematics & Computer ScienceVerified email at nyu.edu