-
1Conference
Authors: Park, Yongmo, Amarnath, Aporva, Pal, Subhankar, Swaminathan, Karthik, Buyuktosunoglu, Alper, Shaul, Hayim, Aharoni, Ehud, Drucker, Nir, Lu, Wei D., Soceanu, Omri, Bose, Pradip
Source: 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA) HPCA High Performance Computer Architecture (HPCA), 2025 IEEE International Symposium on. :1127-1142 Mar, 2025
Relation: 2025 IEEE International Symposium on High Performance Computer Architecture (HPCA)
-
2Conference
Authors: Akavia, Adi, Galili, Ben, Shaul, Hayim, Weiss, Mor, Yakhini, Zohar
Source: 2023 IEEE 36th Computer Security Foundations Symposium (CSF) CSF Computer Security Foundations Symposium (CSF), 2023 IEEE 36th. :489-504 Jul, 2023
Relation: 2023 IEEE 36th Computer Security Foundations Symposium (CSF)
-
3
-
4
-
5Report
Authors: Aharoni, Ehud, Baruch, Moran, Bose, Pradip, Buyuktosunoglu, Alper, Drucker, Nir, Pal, Subhankar, Pelleg, Tomer, Sarpatwar, Kanthi, Shaul, Hayim, Soceanu, Omri, Vaculin, Roman
Source: In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security - ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14347. Springer, Cham
Access URL: http://arxiv.org/abs/2207.03384
-
6Report
Authors: Aharoni, Ehud, Adir, Allon, Baruch, Moran, Drucker, Nir, Ezov, Gilad, Farkash, Ariel, Greenberg, Lev, Masalha, Ramy, Moshkowich, Guy, Murik, Dov, Shaul, Hayim, Soceanu, Omri
Subject Terms: Computer Science - Cryptography and Security, Computer Science - Machine Learning, E.1, E.3
Access URL: http://arxiv.org/abs/2011.01805
-
7Academic Journal
Authors: Drucker, Nir1, drucker.nir@gmail.com, Moshkowich, Guy1, Pelleg, Tomer1, Shaul, Hayim1
Source: Journal of Cryptology; Mar2024, Vol. 37 Issue 1, p1-35, 35p
-
8Report
-
9Report
-
10
-
11Academic Journal
Authors: Sharir, Micha, Shaul, Hayim
Source: SIAM Journal on Computing; June 2011, Vol. 40 Issue 4, p1045-1074, 30p
-
12
-
13
-
14
-
15
-
16
-
17Academic Journal
Authors: Aharoni, Ehud, Drucker, Nir, Ezov, Gilad, Shaul, Hayim, Soceanu, Omri
Source: IEEE Security & Privacy; Sep/Oct2022, Vol. 20 Issue 5, p35-43, 9p
-
18
-
19Academic Journal
Authors: Sharir, Micha, Shaul, Hayim
Source: In Computational Geometry: Theory and Applications 2005 30(3):239-252
-
20Academic Journal
This result is not displayed to guests.
Login for full access.