Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guillaume BarbuIDEMIAVerified email at idemia.com
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Alberto BattistelloSecurity PatternVerified email at securitypattern.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
Jean-Pierre SeifertEinstein Professor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
Agathe HouzelotPHD student at IDEMIA and the University of BordeauxVerified email at idemia.com
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Sébastien DuvalUniversité de LorraineVerified email at loria.fr
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
ileana buhanRadboud UniversityVerified email at ru.nl
Michael TunstallCryptography ResearchVerified email at cryptography.com
Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
Abdellatif Benjelloun TouimiAmazon Web ServicesVerified email at ieee.org
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA Secure Transactions
Verified email at idemia.com