Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.fr
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Nikolaos-Foivos POLYCHRONOUHardware Security PhDVerified email at cea.fr
- Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.fr
- Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.fr
- Vincent BeroulleGrenoble INP - Univ. Grenoble AlpesVerified email at lcis.grenoble-inp.fr
- Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
- Lionel RivièrePhD, Security Analyst at eShardVerified email at eshard.com
- Julien BringerKallistechVerified email at kallistech.com
- Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.fr
- Camille SivelleNTNUVerified email at ntnu.no
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
- Herve ChabanneFull (invited) ProfessorVerified email at telecom-paris.fr
- Mathieu GallissotCEA/LetiVerified email at cea.fr
- Clément PernetGrenoble INP - UGA, LJKVerified email at univ-grenoble-alpes.fr
- Philippe Elbaz-VincentProfessor of Mathematics, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
- Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp