Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
- David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Alain PasselègueCryptoLabVerified email at cryptolab.co.kr
- Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
- Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
- Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
- Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr
- Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
- Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
- Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
- Marc JoyeZamaVerified email at zama.ai
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Mariana RaykovaGoogleVerified email at cs.columbia.edu
- Tzipora HaleviBrooklyn CollegeVerified email at nyu.edu
- Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Michele OrrùCNRSVerified email at berkeley.edu
- Benoit LibertZamaVerified email at ens-lyon.fr
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com