![]() | 1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡DocID: 1xUUI - View Document |
![]() | /nas/dft/ire/yossi/RiskLensPaper/Paper/Figures/uncon_corr.epsDocID: 1xUzx - View Document |
![]() | Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACTDocID: 1xUbv - View Document |
![]() | Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACTDocID: 1v8IU - View Document |
![]() | Min-cost Matching with Delays Itai Ashlagi Yossi AzarDocID: 1uzvK - View Document |