Crea il mio profilo
Accesso pubblico
Visualizza tutto26 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ayoub OtmaniUniversity of RouenEmail verificata su univ-rouen.fr
- Philippe GaboritProfessor in computer science, university of Limoges, FranceEmail verificata su unilim.fr
- Nicolas SendrierInriaEmail verificata su inria.fr
- Gilles ZémorProfessor of Mathematics, Bordeaux University and Institut universitaire de FranceEmail verificata su math.u-bordeaux.fr
- Thomas Debris-AlazardResearcher at Inria Saclay & LIX, École PolytechniqueEmail verificata su inria.fr
- Alain CouvreurINRIA & LIX, École PolytechniqueEmail verificata su lix.polytechnique.fr
- Ludovic PerretSorbonne University/LIP6Email verificata su lip6.fr
- Olivier BlazyEcole PolytechniqueEmail verificata su polytechnique.edu
- Harold OllivierINRIAEmail verificata su inria.fr
- Paulo BarretoUniversity of Washington TacomaEmail verificata su uw.edu
- Iryna AndriyanovaETIS / ENSEA - Université Cergy Pontoise - CNRSEmail verificata su ensea.fr
- Olivier RuattaProfessor of Mathematics and Computer SciencesEmail verificata su unilim.fr
- Valérie Gauthier-UmañaUniversidad de los Andes, Departamento de Ingeniería de Sistemas y ComputaciónEmail verificata su uniandes.edu.co
- Rafael MisoczkiCryptographer at MetaEmail verificata su meta.com
- Edoardo PersichettiAssociate Professor, Florida Atlantic UniversityEmail verificata su fau.edu
- Carlos Aguilar-MelchorChief Scientist, Cybersecurity, SandboxAQEmail verificata su sandboxquantum.com
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Vlad-Florin DragoiAurel Vlaicu University of AradEmail verificata su uav.ro
- Antoine JouxCISPAEmail verificata su cispa.saarland
- Yuval RoichmanBar-Ilan UniversityEmail verificata su math.biu.ac.il