Crea il mio profilo
Accesso pubblico
Visualizza tutto46 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Eylon YogevBar-Ilan UniversityEmail verificata su biu.ac.il
- Rafael PassTel-Aviv University, Cornell TechEmail verificata su cs.cornell.edu
- Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceEmail verificata su weizmann.ac.il
- Elaine ShiCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Cody FreitagPostdoc, Northeastern University and Boston UniversityEmail verificata su northeastern.edu
- Gilad AsharovDepartment of Computer Science, Bar-Ilan UniversityEmail verificata su biu.ac.il
- Wei-Kai LinUniversity of VirginiaEmail verificata su virginia.edu
- Ran RazPrinceton UniversityEmail verificata su princeton.edu
- Gil SegevProfessor of Computer Science, Hebrew UniversityEmail verificata su cs.stanford.edu
- Zvika BrakerskiWeizmann Institute of ScienceEmail verificata su weizmann.ac.il
- Brent WatersUniversity of Texas at AustinEmail verificata su cs.utexas.edu
- PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Email verificata su ntt-research.com
- Tal MoranIDC HerzliyaEmail verificata su idc.ac.il
- Kartik NayakDuke UniversityEmail verificata su cs.duke.edu
- Alon RosenBocconi UniversityEmail verificata su unibocconi.it
- Avishay TalUC BerkeleyEmail verificata su berkeley.edu
- Daniel WichsNortheastern University, Associate ProfessorEmail verificata su ccs.neu.edu
- Siyao GUONYU ShanghaiEmail verificata su nyu.edu
- Pravesh K. KothariCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Aayush JainAssistant Professor, Carnegie Mellon UniversityEmail verificata su andrew.cmu.edu