Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Jean-Christophe DeneuvilleAssociate Professor, ENAC, Toulouse, FranceVerified email at enac.fr
Carlos Aguilar MelchorProfessor, ISAE SUPAERO, University of ToulouseVerified email at isae-supaero.fr
Wen WangIntel LabsVerified email at yale.edu
Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneVerified email at univ-st-etienne.fr
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
Nicolas SendrierInriaVerified email at inria.fr
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Philippe GaboritProfessor in computer science, university of Limoges, FranceVerified email at unilim.fr
Rafael MisoczkiCryptographer at GoogleVerified email at google.com
Marco BaldiAssociate Professor in Telecommunications, Università Politecnica delle MarcheVerified email at univpm.it
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Shay GueronProfessor, University of Haifa and Senior Principal Engineer, Amazon Web ServicesVerified email at math.haifa.ac.il
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Gilles ZémorProfessor of Mathematics, Bordeaux UniversityVerified email at math.u-bordeaux.fr
Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Jefferson E. RicardiniUniversity of Sao PauloVerified email at larc.usp.br
Kris GajGeorge Mason UniversityVerified email at gmu.edu
Daniel MasnyMetaVerified email at fb.com