Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Christophe GiraudCryptography and Product Security Group Manager at IDEMIA Secure TransactionsVerified email at idemia.com
Nicolas Veyrat-CharvillonUbisoft AnnecyVerified email at ubisoft.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Guillaume FumaroliValeoVerified email at tremplin-utc.net
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Yoni De MulderKatholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Victor LomnéNinjaLabVerified email at ninjalab.io
Alexandre VENELLINXP SemiconductorsVerified email at nxp.com
Raveen GoundarVerified email at unsw.edu.au
Duc-Phong LeFintech Technical Researcher (Cryptographer), Bank of CanadaVerified email at bankofcanada.ca