Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alon RosenBocconi UniversityVerified email at unibocconi.it
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Siyao GUONYU ShanghaiVerified email at nyu.edu
Eylon YogevBar-Ilan UniversityVerified email at biu.ac.il
Asaf NadlerBen Gurion University of the NegevVerified email at post.bgu.ac.il
Guy RothblumWeizmann Institute of ScienceVerified email at alum.mit.edu
Arka Rai ChoudhuriPostdoctoral Researcher, NTT ResearchVerified email at ntt-research.com
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Charlotte HoffmannInstitute of Science and Technology AustriaVerified email at ist.ac.at
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Thomas Dueholm HansenFormer Associate professor, University of CopenhagenVerified email at di.ku.dk
Bernd GärtnerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ran CohenReichman University (aka IDC Herzliya)Verified email at runi.ac.il
Deepesh DataMeta Platforms, Inc.Verified email at meta.com
Elette BoyleVerified email at mit.edu
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Lukáš FolwarcznýComputer Science Institute of Charles UniversityVerified email at iuuk.mff.cuni.cz
Jonathan UllmanAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Nikolaj Ignatieff SchwartzbachPh.d. student, Aarhus UniversityVerified email at ignatieff.io
Follow![Pavel Hubáček](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=1kM7gtQAAAAJ&citpid=6)
Pavel Hubáček
Czech Academy of Sciences and Charles University
Verified email at iuuk.mff.cuni.cz - Homepage