Get my own profile
Public access
View all24 articles
1 article
available
not available
Based on funding mandates
Co-authors
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Alain PasselègueInria & ENS LyonVerified email at inria.fr
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr
Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Benoit LibertZamaVerified email at ens-lyon.fr
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Sergey GorbunovUniversity of WaterlooVerified email at uwaterloo.ca
Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu