Get my own profile

Public access

View all3 articles

0 articles

available

not available

Based on funding mandates

### Co-authors

- Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
- Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
- Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
- Karthikeyan BhargavanINRIAVerified email at inria.fr
- Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
- Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
- Luke ValentaCloudflareVerified email at cloudflare.com
- Arjen LenstraProfessor of Computer Science, EPFLVerified email at epfl.ch
- David AdrianUniversity of MichiganVerified email at umich.edu
- Benjamin VanderSlootAssistant Professor, University of Detroit MercyVerified email at udmercy.edu
- Antoine JouxCISPAVerified email at cispa.saarland
- Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
- Kazumaro AokiNTTVerified email at lab.ntt.co.jp
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at eecs.umich.edu
- Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
- Drew SpringallAuburn UniversityVerified email at auburn.edu
- Nicolas ThériaultUniversidad de Santiago de ChileVerified email at usach.cl
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Richard P BrentAustralian National University; University of Newcastle, AustraliaVerified email at anu.edu.au
- Shi BaiFlorida Atlantic UniversityVerified email at fau.edu

Emmanuel Thomé

INRIA Nancy

Verified email at inria.fr