Get my own profile
Co-authors
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Thomas EspitauPostdoc, NTT CorporationVerified email at lip6.fr
Avradip MandalFujitsu Labs AmericaVerified email at us.fujitsu.com
Gilles BartheMPI-SPVerified email at mpi-sp.org
Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
Craig GentryResearch Fellow, Algorand FoundationVerified email at algorand.foundation
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
Jens GrothPrincipal Researcher, DFINITYVerified email at ucl.ac.uk
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Taechan KimNTT Secure Platform LaboratoriesVerified email at snu.ac.kr
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Vadim LyubashevskyIBM Research - ZurichVerified email at zurich.ibm.com
Hemanta K. MajiDepartment of Computer Science, Purdue UniversityVerified email at purdue.edu
Mariana RaykovaGoogleVerified email at cs.columbia.edu