Get my own profile
Public access
View all36 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Rafael PassTel-Aviv University, Cornell TechVerified email at cs.cornell.edu
Cody FreitagStudent, Cornell UniversityVerified email at cs.cornell.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Wei-Kai LinNortheastern UniversityVerified email at northeastern.edu
Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
Ran RazPrinceton UniversityVerified email at princeton.edu
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Alon RosenBocconi UniversityVerified email at unibocconi.it
Avishay TalUC BerkeleyVerified email at berkeley.edu
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Siyao GUONYU ShanghaiVerified email at nyu.edu
Pravesh K. KothariCarnegie Mellon UniversityVerified email at cs.cmu.edu
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
Aayush JainAssistant Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com