Get my own profile
Co-authors
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Nicolas Veyrat-CharvillonVerified email at ubisoft.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Yoni De MulderKatholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Guillaume FumaroliThales/SYSGOVerified email at tremplin-utc.net
Victor LomnéNinjaLabVerified email at ninjalab.io
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Marc JoyeZamaVerified email at zama.ai
Alexandre VENELLIThales SIX GTS FranceVerified email at thalesgroup.com
Raveen GoundarVerified email at unsw.edu.au
Atsuko MiyajiOsaka UniversityVerified email at jaist.ac.jp
Duc-Phong LeCanadian Institute for CybersecurityVerified email at unb.ca