Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
- Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
- Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
- Nicolas Veyrat-CharvillonUbisoft AnnecyVerified email at ubisoft.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
- Guillaume FumaroliValeoVerified email at tremplin-utc.net
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Yoni De MulderKatholieke Universiteit LeuvenVerified email at esat.kuleuven.be
- Praveen Kumar VadnalaRiscureVerified email at riscure.com
- Victor LomnéNinjaLabVerified email at ninjalab.io
- Alexandre VENELLINXP SemiconductorsVerified email at nxp.com
- Raveen GoundarVerified email at unsw.edu.au
- Duc-Phong LeFintech Technical Researcher (Cryptographer), Bank of CanadaVerified email at bankofcanada.ca