Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guillaume BarbuIDEMIAVerified email at idemia.com
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Alberto BattistelloSecurity PatternVerified email at securitypattern.com
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Michael TunstallCryptography ResearchVerified email at cryptography.com
Caroline FontaineCNRS researcher, at LSV (Cachan, France)Verified email at lsv.fr
Abdellatif Benjelloun TouimiAmazon Web ServicesVerified email at ieee.org
Agathe HouzelotPHD student at IDEMIA and the University of BordeauxVerified email at idemia.com
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Sébastien DuvalUniversité de VersaillesVerified email at uvsq.fr
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
ileana buhanRadboud UniversityVerified email at ru.nl
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA
Verified email at idemia.com