Get my own profile
Public access
View all49 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Patrick DerbezUniversity of RennesVerified email at irisa.fr
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
Benjamin GregoireInria Sophia-AntipolisVerified email at inria.fr
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Gaëtan LeurentINRIAVerified email at inria.fr
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Mohamed SabtUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Antoine JouxCISPAVerified email at cispa.saarland
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Thomas PrestPQShieldVerified email at pqshield.com
Jeffrey E HoffsteinProfessor of Mathematics, Brown UniversityVerified email at math.brown.edu
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr