Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.fr
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Nikolaos-Foivos POLYCHRONOUHardware Security PhDVerified email at cea.fr
Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.fr
Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.fr
Vincent BeroulleUniv. Grenoble AlpesVerified email at lcis.grenoble-inp.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
Lionel RivièrePhD, Security Analyst at eShardVerified email at eshard.com
Julien BringerKallistechVerified email at kallistech.com
Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Camille SivelleNTNUVerified email at ntnu.no
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Herve ChabanneFull (invited) ProfessorVerified email at telecom-paris.fr
Mathieu GallissotCEA/LetiVerified email at cea.fr
Clément PernetGrenoble INP - UGA, LJKVerified email at univ-grenoble-alpes.fr
Philippe Elbaz-VincentProfessor of Mathematics, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr