Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Avradip MandalSkyflowVerified email at skyflow.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Ilya KizhvatovBioNTech SEVerified email at biontech.de
Antoine JouxCISPAVerified email at cispa.saarland
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Alexander MayRuhr-Universität BochumVerified email at rub.de
Follow
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage