Get my own profile
Public access
View all46 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
- Rafael PassTel-Aviv University, Cornell TechVerified email at cs.cornell.edu
- Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
- Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
- Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
- Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
- Ran RazPrinceton UniversityVerified email at princeton.edu
- Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
- Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
- Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
- PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
- Tal MoranIDC HerzliyaVerified email at idc.ac.il
- Kartik NayakDuke UniversityVerified email at cs.duke.edu
- Alon RosenBocconi UniversityVerified email at unibocconi.it
- Avishay TalUC BerkeleyVerified email at berkeley.edu
- Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
- Siyao GUONYU ShanghaiVerified email at nyu.edu
- Aayush JainAssistant Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Pravesh K. KothariPrinceton UniversityVerified email at cs.cmu.edu