Get my own profile
Public access
View all50 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
Rafael PassCornell Tech, Jaobs Technion-Cornell Institute, Technion, Tel-Aviv UniversityVerified email at cs.cornell.edu
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Ran RazPrinceton UniversityVerified email at princeton.edu
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Avishay TalUC BerkeleyVerified email at berkeley.edu
Ashrujit GhoshalCarnegie Mellon UniversityVerified email at cs.cmu.edu
Siyao GUONYU ShanghaiVerified email at nyu.edu
Aayush JainAssistant Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu