Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Gil
    Last name: Segev
    DBLP: s/GilSegev
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 73 of 73  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Zvika Brakerski, Gil Segev.
    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
    J. Cryptology 2014, Volume 27 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Nonmalleable Extractors with Short Seeds and Applications to Privacy Amplification.
    SIAM J. Comput. 2014, Volume 43 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Zvika Brakerski, Gil Segev.
    Function-Private Functional Encryption in the Private-Key Setting.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Journal article
    David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev.
    More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
    J. Cryptology 2013, Volume 26 (0) 2013
    Conference paper
    Ananth Raghunathan, Gil Segev, Salil P. Vadhan.
    Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Journal article
    Rasmus Pagh, Gil Segev, Udi Wieder.
    How to Approximate A Set Without Knowing Its Size In Advance
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Ananth Raghunathan, Gil Segev, Salil P. Vadhan.
    Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
    Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Elette Boyle, Gil Segev, Daniel Wichs.
    Fully Leakage-Resilient Signatures.
    J. Cryptology 2013, Volume 26 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Subspace-Membership Encryption and Its Applications.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wieder.
    Balls and Bins: Smaller Hash Families and Faster Evaluation.
    SIAM J. Comput. 2013, Volume 42 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II 2013 (0) 2013
    Conference paper
    Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev.
    Message-Locked Encryption for Lock-Dependent Messages.
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I 2013 (0) 2013
    Conference paper
    Dan Boneh, Ananth Raghunathan, Gil Segev.
    Function-Private Subspace-Membership Encryption and Its Applications.
    Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I 2013 (0) 2013
    Conference paper
    Dan Boneh, Valeria Nikolaenko, Gil Segev.
    Attribute-Based Encryption for Arithmetic Circuits.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Rasmus Pagh, Gil Segev, Udi Wieder.
    How to Approximate a Set without Knowing Its Size in Advance.
    54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA 2013 (0) 2013
    Conference paper
    Krzysztof Pietrzak, Alon Rosen, Gil Segev.
    Lossy Functions Do Not Amplify Well.
    Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Dan Boneh, Gil Segev, Brent Waters.
    Targeted malleability: homomorphic encryption for restricted computations.
    Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012 2012 (0) 2012
    Conference paper
    Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev.
    Incremental Deterministic Public-Key Encryption.
    Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Non-malleable Extractors with Short Seeds and Applications to Privacy Amplification.
    Proceedings of the 27th Conference on Computational Complexity, CCC 2012, Porto, Portugal, June 26-29, 2012 2012 (0) 2012
    Conference paper
    Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jennifer Rexford, Scott Shenker.
    A new approach to interdomain routing based on secure multi-party computation.
    11th ACM Workshop on Hot Topics in Networks, HotNets-XI, Redmond, WA, USA - October 29 - 30, 2012 2012 (0) 2012
    Conference paper
    Moni Naor, Gil Segev.
    Public-Key Cryptosystems Resilient to Key Leakage.
    SIAM J. Comput. 2012, Volume 41 (0) 2012
    Conference paper
    Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev.
    Incremental Deterministic Public-Key Encryption.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek.
    Hedged Public-key Encryption: How to Protect against Bad Randomness.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich.
    Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
    Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings 2011 (0) 2011
    Conference paper
    L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wieder.
    Balls and Bins: Smaller Hash Families and Faster Evaluation.
    Electronic Colloquium on Computational Complexity (ECCC) 2011, Volume 18 (0) 2011
    Conference paper
    Elette Boyle, Gil Segev, Daniel Wichs.
    Fully Leakage-Resilient Signatures.
    Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification.
    Electronic Colloquium on Computational Complexity (ECCC) 2011, Volume 18 (0) 2011
    Conference paper
    Zvika Brakerski, Gil Segev.
    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
    Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wieder.
    Balls and Bins: Smaller Hash Families and Faster Evaluation.
    IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22-25, 2011 2011 (0) 2011
    Conference paper
    Zvika Brakerski, Gil Segev.
    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Dan Boneh, Gil Segev, Brent Waters.
    Targeted Malleability: Homomorphic Encryption for Restricted Computations.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Ilya Mironov, Moni Naor, Gil Segev.
    Sketching in Adversarial Environments.
    SIAM J. Comput. 2011, Volume 40 (0) 2011
    Conference paper
    Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs.
    Public-Key Encryption in the Bounded-Retrieval Model.
    Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings 2010 (0) 2010
    Conference paper
    David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev.
    More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
    Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Yuriy Arbitman, Moni Naor, Gil Segev.
    Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation.
    51th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010, October 23-26, 2010, Las Vegas, Nevada, USA 2010 (0) 2010
    Conference paper
    Alon Rosen, Gil Segev.
    Chosen-Ciphertext Security via Correlated Products.
    SIAM J. Comput. 2009, Volume 39 (0) 2010
    Conference paper
    Elette Boyle, Gil Segev, Daniel Wichs.
    Fully Leakage-Resilient Signatures.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Vadim Lyubashevsky, Adriana Palacio, Gil Segev.
    Public-Key Cryptographic Primitives Provably as Secure as Subset Sum.
    Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings 2010 (0) 2010
    Journal article
    Danny Segev, Gil Segev.
    Approximate
    Algorithmica 2010, Volume 56 (0) 2010
    Journal article
    Moni Naor, Gil Segev.
    Public-Key Cryptosystems Resilient to Key Leakage.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs.
    Public-Key Encryption in the Bounded-Retrieval Model.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev.
    More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Tal Moran, Moni Naor, Gil Segev.
    An Optimally Fair Coin Toss.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Vadim Lyubashevsky, Adriana Palacio, Gil Segev.
    Public-Key Cryptographic Primitives Provably as Secure as Subset Sum.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek.
    Hedged Public-Key Encryption: How to Protect against Bad Randomness.
    Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Moni Naor, Gil Segev.
    Public-Key Cryptosystems Resilient to Key Leakage.
    Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yuriy Arbitman, Moni Naor, Gil Segev.
    De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results.
    Automata, Languages and Programming, 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part I 2009 (0) 2009
    Conference paper
    Tal Moran, Moni Naor, Gil Segev.
    An Optimally Fair Coin Toss.
    Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Alon Rosen, Gil Segev.
    Chosen-Ciphertext Security via Correlated Products.
    Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yuriy Arbitman, Moni Naor, Gil Segev.
    De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Yuriy Arbitman, Moni Naor, Gil Segev.
    Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
    CoRR 2009, Volume 0 (0) 2009
    Journal article
    Tal Moran, Moni Naor, Gil Segev.
    Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
    Theory of Computing 2009, Volume 5 (0) 2009
    Conference paper
    Tal Moran, Gil Segev.
    David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    Alon Rosen, Gil Segev.
    Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    Alon Rosen, Gil Segev.
    Chosen-Ciphertext Security via Correlated Products.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    Moni Naor, Gil Segev, Udi Wieder.
    History-Independent Cuckoo Hashing.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    Tal Moran, Gil Segev.
    David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
    Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Moni Naor, Gil Segev, Udi Wieder.
    History-Independent Cuckoo Hashing.
    Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming Track C: Security and Cryptography Foundations 2008 (0) 2008
    Conference paper
    Ilya Mironov, Moni Naor, Gil Segev.
    Sketching in adversarial environments.
    Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008 2008 (0) 2008
    Conference paper
    Iftach Haitner, Jonathan J. Hoch, Gil Segev.
    A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
    Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. 2008 (0) 2008
    Conference paper
    Moni Naor, Gil Segev, Adam D. Smith.
    Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
    IEEE Transactions on Information Theory 2008, Volume 54 (0) 2008
    Conference paper
    Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev.
    Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Iftach Haitner, Jonathan J. Hoch, Gil Segev.
    A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Tal Moran, Moni Naor, Gil Segev.
    Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev.
    Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
    48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings 2007 (0) 2007
    Conference paper
    Tal Moran, Moni Naor, Gil Segev.
    Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
    Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev.
    Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
    Electronic Colloquium on Computational Complexity (ECCC) 2007, Volume 14 (0) 2007
    Conference paper
    Moni Naor, Gil Segev, Adam D. Smith.
    Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Moni Naor, Gil Segev, Adam D. Smith.
    Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
    Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Danny Segev, Gil Segev.
    Approximate
    Algorithms - ESA 2006, 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006, Proceedings 2006 (0) 2006
    Show item 1 to 73 of 73  

    Your query returned 73 matches in the database.