Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.fr
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble AlpesVerified email at imag.fr
Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Nikolaos-Foivos POLYCHRONOUHardware Security PhDVerified email at cea.fr
Lionel RivièrePhD, Security Analyst at eShardVerified email at eshard.com
Julien BringerKallistechVerified email at kallistech.com
Vincent BeroulleUniv. Grenoble AlpesVerified email at lcis.grenoble-inp.fr
Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Herve ChabanneFull (invited) ProfessorVerified email at telecom-paris.fr
Clément PernetGrenoble INP - UGA, LJKVerified email at univ-grenoble-alpes.fr
Philippe Elbaz-VincentProfessor of Mathematics, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr