Get my own profile
Public access
View all45 articles
1 article
available
not available
Based on funding mandates
Co-authors
Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
Rafael PassTel-Aviv University, Cornell TechVerified email at cs.cornell.edu
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Ran RazPrinceton UniversityVerified email at princeton.edu
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Avishay TalUC BerkeleyVerified email at berkeley.edu
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Siyao GUONYU ShanghaiVerified email at nyu.edu
Aayush JainAssistant Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Pravesh K. KothariPrinceton UniversityVerified email at cs.cmu.edu