Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
- Gabi NakiblyRadwareVerified email at cs.technion.ac.il
- Ittai AbrahamIntelVerified email at cs.huji.ac.il
- Noam RinetzkyAssistant Professor of Computer Science, Tel Aviv UniversityVerified email at cs.tau.ac.il
- Yoni ZoharBar Ilan UniversityVerified email at biu.ac.il
- Idit KeidarProfessor, TechnionVerified email at ee.technion.ac.il
- Asaf CidonColumbia UniversityVerified email at columbia.edu
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Marc JoyeZamaVerified email at zama.ai
- Hristo BojinovStanford UniversityVerified email at cs.stanford.edu
- Mooly SagivTel Aviv UniversityVerified email at acm.org
- Aaron SchulmanUC San DeigoVerified email at cs.ucsd.edu
- Mark SilbersteinProfessor, Technion, IsraelVerified email at ee.technion.ac.il
- Meni OrenbachSecurity Researcher, NVIDIAVerified email at nvidia.com
- Suman NathPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
- Jie LiuHarbin Institute of Technology (Shenzhen)Verified email at hit.edu.cn
- Christof FetzerTU DresdenVerified email at tu-dresden.de
- Yonatan WinetraubBiophysics PhD candidate, Stanford UniversityVerified email at alumni.stanford.edu
- Ronen TalmonProfessor of Electrical and Computer Engineering, Technion - Israel Institute of TechnologyVerified email at ee.technion.ac.il
- Israel CohenProfessor of Electrical & Computer Engineering, Technion - Israel Institute of TechnologyVerified email at ee.technion.ac.il