Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
Akira TakahashiJ.P. Morgan AI Research & AlgoCRYPT CoEVerified email at jpmorgan.com
Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
Alexandre WalletInriaVerified email at inria.fr
Avradip MandalVecsecVerified email at vecsec.com
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Yang YuTsinghua UniversityVerified email at mail.tsinghua.edu.cn
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
Aaram YunVerified email at ewha.ac.kr
Taechan KimNTT Secure Platform LaboratoriesVerified email at snu.ac.kr