Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Gabi NakiblyRadwareVerified email at cs.technion.ac.il
Ittai AbrahamIntelVerified email at cs.huji.ac.il
Noam RinetzkyAssistant Professor of Computer Science, Tel Aviv UniversityVerified email at cs.tau.ac.il
Yoni ZoharBar Ilan UniversityVerified email at biu.ac.il
Idit KeidarProfessor, TechnionVerified email at ee.technion.ac.il
Asaf CidonColumbia UniversityVerified email at columbia.edu
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Alexander ShraerCockroach LabsVerified email at cockroachlabs.com
Hristo BojinovStanford UniversityVerified email at cs.stanford.edu
Aaron SchulmanUC San DeigoVerified email at cs.ucsd.edu
Mooly SagivTel Aviv UniversityVerified email at acm.org
Marc JoyeZamaVerified email at zama.ai
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il
Meni OrenbachSecurity Researcher, NVIDIAVerified email at nvidia.com
Suman NathPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
Jie LiuHarbin Institute of Technology (Shenzhen)Verified email at hit.edu.cn
Christof FetzerTU DresdenVerified email at tu-dresden.de
Ronen TalmonAssociate Professor, EE Department, TechnionVerified email at ee.technion.ac.il
Israel CohenProfessor of Electrical & Computer Engineering, Technion - Israel Institute of TechnologyVerified email at ee.technion.ac.il