Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Kristin E. LauterPrincipal Researcher, Manager, Cryptography Research Group, Microsoft ResearchVerified email at microsoft.com
Kim LainePrincipal Researcher, MicrosoftVerified email at microsoft.com
Amir NavotPrincipal Research Scientist at Amazon Prime AirVerified email at amazon.com
Michael NaehrigResearcher, Microsoft Research, USAVerified email at cryptojedi.org
Nathan DowlinNSF Postdoc in Mathematics, Columbia UniversityVerified email at math.columbia.edu
Assaf SchusterProfessor of Computer Science, TechnionVerified email at cs.technion.ac.il
Mary CzerwinskiMicrosoft ResearchVerified email at microsoft.com
Lin XiaoFacebook AI ResearchVerified email at fb.com
Ohad ShamirWeizmann Institute of ScienceVerified email at weizmann.ac.il
Ofer DekelMicrosoft ResearchVerified email at microsoft.com
Shai FineHead of the Data Science Institute, IDCVerified email at idc.ac.il
Mikhail BilenkoMicrosoftVerified email at microsoft.com
Liran KatzirGoogle ResearchVerified email at cs.technion.ac.il
Noam KoenigsteinTel-Aviv UniversityVerified email at tauex.tau.ac.il
Ran El-YanivProfessor of Computer Science, Technion - Israel Institute of TechnologyVerified email at cs.technion.ac.il
Nikolaj BjornerMicrosoft ResearchVerified email at cs.stanford.edu
Pengtao XieAssistant Professor, UC San DiegoVerified email at eng.ucsd.edu
Koby CrammerProfessor of Electrical Engineering, Technion - Israel Institute of TechnologyVerified email at ee.technion.ac.il
Asta RosewayFusionist, Microsoft ResearchVerified email at microsoft.com
Zhicong HuangAlibaba GroupVerified email at alibaba-inc.com
Ran Gilad-Bachrach
Verified email at tauex.tau.ac.il - Homepage