Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Avradip MandalVecsecVerified email at vecsec.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Ilya KizhvatovBioNTech SEVerified email at biontech.de
Antoine JouxCISPAVerified email at cispa.saarland
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Alexander MayRuhr-Universität BochumVerified email at rub.de
Follow![Jean-Sebastien Coron](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=AeXfSUsAAAAJ&citpid=2)
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage