Get my own profile
Public access
View all53 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Eyal KushilevitzComputer Science Department, TechnionVerified email at cs.technion.ac.il
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Yuval IshaiVerified email at cs.technion.ac.il
Yuval RabaniThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Ivan ViscontiDIEM, University of Salerno, ITALYVerified email at unisa.it
Giovanni Di CrescenzoPerspecta Labs also d/b/a Applied Communication SciencesVerified email at appcomsci.com
Adam SmithProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Giuseppe PersianoUniversita' di Salerno -- ItalyVerified email at unisa.it
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
brett hemenway falkUniversity of PennsylvaniaVerified email at cis.upenn.edu
Vladimir BravermanAssociate Professor of Computer Science, Johns Hopkins UniversityVerified email at cs.jhu.edu
Nishanth ChandranPrincipal Researcher, Microsoft Research, IndiaVerified email at microsoft.com
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Vipul GoyalCarnegie Mellon UniversityVerified email at cs.cmu.edu
Leonid ReyzinAssociate Professor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Oded GoldreichProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu