Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Gil
    Last name: Segev
    DBLP: s/GilSegev
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 73  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Zvika Brakerski, Gil Segev.
    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
    J. Cryptology 2014, Volume 27 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Nonmalleable Extractors with Short Seeds and Applications to Privacy Amplification.
    SIAM J. Comput. 2014, Volume 43 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Zvika Brakerski, Gil Segev.
    Function-Private Functional Encryption in the Private-Key Setting.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Journal article
    David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev.
    More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
    J. Cryptology 2013, Volume 26 (0) 2013
    Conference paper
    Ananth Raghunathan, Gil Segev, Salil P. Vadhan.
    Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Journal article
    Rasmus Pagh, Gil Segev, Udi Wieder.
    How to Approximate A Set Without Knowing Its Size In Advance
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Ananth Raghunathan, Gil Segev, Salil P. Vadhan.
    Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
    Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Elette Boyle, Gil Segev, Daniel Wichs.
    Fully Leakage-Resilient Signatures.
    J. Cryptology 2013, Volume 26 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Subspace-Membership Encryption and Its Applications.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wieder.
    Balls and Bins: Smaller Hash Families and Faster Evaluation.
    SIAM J. Comput. 2013, Volume 42 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II 2013 (0) 2013
    Conference paper
    Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev.
    Message-Locked Encryption for Lock-Dependent Messages.
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I 2013 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Subspace-Membership Encryption and Its Applications.
    Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I 2013 (0) 2013
    Conference paper
    Dan Boneh, Valeria Nikolaenko, Gil Segev.
    Attribute-Based Encryption for Arithmetic Circuits.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Rasmus Pagh, Gil Segev, Udi Wieder.
    How to Approximate a Set without Knowing Its Size in Advance.
    54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA 2013 (0) 2013
    Conference paper
    Krzysztof Pietrzak, Alon Rosen, Gil Segev.
    Lossy Functions Do Not Amplify Well.
    Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Dan Boneh, Gil Segev, Brent Waters.
    Targeted malleability: homomorphic encryption for restricted computations.
    Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012 2012 (0) 2012
    Conference paper
    Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev.
    Incremental Deterministic Public-Key Encryption.
    Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Non-malleable Extractors with Short Seeds and Applications to Privacy Amplification.
    Proceedings of the 27th Conference on Computational Complexity, CCC 2012, Porto, Portugal, June 26-29, 2012 2012 (0) 2012
    Conference paper
    Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jennifer Rexford, Scott Shenker.
    A new approach to interdomain routing based on secure multi-party computation.
    11th ACM Workshop on Hot Topics in Networks, HotNets-XI, Redmond, WA, USA - October 29 - 30, 2012 2012 (0) 2012
    Conference paper
    Moni Naor, Gil Segev.
    Public-Key Cryptosystems Resilient to Key Leakage.
    SIAM J. Comput. 2012, Volume 41 (0) 2012
    Conference paper
    Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev.
    Incremental Deterministic Public-Key Encryption.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Show item 1 to 25 of 73  

    Your query returned 73 matches in the database.