Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Louise HuotVerified email at intel.com
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Ludovic PerretEPITA/LREVerified email at epita.fr
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Raphaël MarinierGoogle AIVerified email at google.com
Reynald LercierInstitut de Recherche Mathématique de RennesVerified email at m4x.org
Christophe GiraudCryptography and Product Security Group Manager at IDEMIA Secure TransactionsVerified email at idemia.com
Antoine JouxCISPAVerified email at cispa.saarland
Benjamin SmithINRIA and École polytechniqueVerified email at lix.polytechnique.fr
Domingo GómezProfesor de Informática (Unican)Verified email at unican.es
Christian QueinnecProfessor Emeritus of Computer Science, Sorbonne UniversitéVerified email at sorbonne-universite.fr
Tristan VacconMaître de conférences, Université de LimogesVerified email at unilim.fr
zoran sunicHofstra UniversityVerified email at hofstra.edu
Delaram KahrobaeiProfessor of Mathematics & Computer ScienceVerified email at nyu.edu