Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Guillaume BarbuIDEMIAVerified email at idemia.com
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
- Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
- Alberto BattistelloSecurity PatternVerified email at securitypattern.com
- Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
- Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Vincent VerneuilDoctor of Mathematics, NXP Semiconductors Germany GmbHVerified email at nxp.com
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Agathe HouzelotPHD student at IDEMIA and the University of BordeauxVerified email at idemia.com
- Praveen Kumar VadnalaRiscureVerified email at riscure.com
- Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
- Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
- Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
- François KoeuneUCL Crypto GroupVerified email at uclouvain.be
- Sébastien DuvalUniversité de LorraineVerified email at loria.fr
- Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
- ileana buhanRadboud UniversityVerified email at ru.nl
- Michael TunstallCryptography ResearchVerified email at cryptography.com
- Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
- Abdellatif Benjelloun TouimiAmazon Web ServicesVerified email at ieee.org
Follow
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA Secure Transactions
Verified email at idemia.com