Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Alberto BattistelloSecurity PatternVerified email at securitypattern.com
Guillaume BarbuIDEMIAVerified email at idemia.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Caroline FontaineCNRS researcher, at LSV (Cachan, France)Verified email at lsv.fr
Abdellatif Benjelloun TouimiDigital CatapultVerified email at ieee.org
Michael TunstallCryptography ResearchVerified email at cryptography.com
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Sébastien DuvalUniversité de VersaillesVerified email at uvsq.fr
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
ileana buhanRadboud UniversityVerified email at ru.nl
Guénaël RenaultANSSI, INRIA, LIX, IPPVerified email at lix.polytechnique.fr
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA
Verified email at idemia.com