Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
Akira TakahashiJ.P. Morgan AI Research & AlgoCRYPT CoEVerified email at jpmorgan.com
Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Yang YuTsinghua UniversityVerified email at mail.tsinghua.edu.cn
Avradip MandalZfense LabsVerified email at zfenselabs.com
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Benjamin GregoireInria Sophia-AntipolisVerified email at inria.fr
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Jean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Vincent Quentin UlitzschTechnische Universität Berlin, Security In TelecommunicationsVerified email at sect.tu-berlin.de
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr