Get my own profile
Public access
View all53 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ioana BoureanuProfessor, University of SurreyVerified email at surrey.ac.uk
- Pascal JunodApplied CryptographerVerified email at junod.info
- Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
- Pouyan SepehrdadSenior Staff Engineer / Manager at Qualcomm Technologies Inc.Verified email at qti.qualcomm.com
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Gildas AvoineINSA Rennes, IRISA, CNRSVerified email at irisa.fr
- Thomas BaignèresOlvidVerified email at olvid.io
- David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Mike JustAssociate Professor, Computer Science, Heriot-Watt UniversityVerified email at hw.ac.uk
- Christos DimitrakakisProfessor, University of NeuchatelVerified email at alumni.epfl.ch
- Matthieu FiniaszSecurity ExpertVerified email at olvid.io
- Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Paulo MateusProfessor of Logic and Computation, Instituto Superior Técnico, Lisboa, PortugalVerified email at math.ist.utl.pt
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Marko VukolićConsensusLab, Protocol LabsVerified email at acm.org
- Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg