Get my own profile
Public access
View all41 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
Rafael PassTel-Aviv University, Cornell TechVerified email at cs.cornell.edu
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Cody FreitagPostdoc, Northeastern University and Boston UniversityVerified email at northeastern.edu
Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Ran RazPrinceton UniversityVerified email at princeton.edu
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
Alon RosenBocconi UniversityVerified email at unibocconi.it
Kartik NayakDuke UniversityVerified email at cs.duke.edu
Avishay TalUC BerkeleyVerified email at berkeley.edu
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Siyao GUONYU ShanghaiVerified email at nyu.edu
Pravesh K. KothariCarnegie Mellon UniversityVerified email at cs.cmu.edu
Aayush JainAssistant Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu