Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
- Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
- Avradip MandalZfense LabsVerified email at zfenselabs.com
- Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Ilya KizhvatovBioNTech SEVerified email at biontech.de
- Antoine JouxCISPAVerified email at cispa.saarland
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
- Alexander MayRuhr-Universität BochumVerified email at rub.de
Follow
Jean-Sebastien Coron
Professor of Computer Science, University of Luxembourg
Verified email at uni.lu - Homepage