Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Lionel TORRESLIRMMVerified email at lirmm.fr
P. MAURINEUniv. Monpellier / LIRMMVerified email at lirmm.fr
Amine DehbaouiQualcomm TechnologiesVerified email at qti.qualcomm.com
Rafael SoaresUniversidade Federal de PelotasVerified email at inf.ufpel.edu.br
Ney Laert Vilar CalazansLecturer at the Computing Department (DEC), Federal University of Santa Catarina, UFSCVerified email at ufsc.br
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Laurent ImbertLIRMM, CNRSVerified email at lirmm.fr
Christoph DobraunigIntel CorporationVerified email at intel.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Fernando Gehm MoraesProfessor at the School of Technology at PUCRSVerified email at pucrs.br