Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Gil
    Last name: Segev
    DBLP: s/GilSegev
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 96  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Gilad Asharov, Gil Segev.
    On Constructing One-Way Permutations from Indistinguishability Obfuscation.
    Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf.
    Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Zvika Brakerski, Ilan Komargodski, Gil Segev.
    Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
    Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Alon Rosen, Gil Segev, Ido Shahaf.
    Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
    Electronic Colloquium on Computational Complexity (ECCC) 2016, Volume 23 (0) 2016
    Conference paper
    Alon Rosen, Gil Segev, Ido Shahaf.
    Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Tal Moran, Moni Naor, Gil Segev.
    An Optimally Fair Coin Toss.
    J. Cryptology 2016, Volume 29 (0) 2016
    Conference paper
    Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf.
    Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations.
    Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016 2016 (0) 2016
    Conference paper
    Gilad Asharov, Alon Rosen, Gil Segev.
    Indistinguishability Obfuscation Does Not Reduce to Structured Languages.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Gilad Asharov, Alon Rosen, Gil Segev.
    Indistinguishability Obfuscation Does Not Reduce to Structured Languages.
    Electronic Colloquium on Computational Complexity (ECCC) 2016, Volume 23 (0) 2016
    Conference paper
    Ilan Komargodski, Gil Segev, Eylon Yogev.
    Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
    Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Zvika Brakerski, Gil Segev.
    Function-Private Functional Encryption in the Private-Key Setting.
    Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II 2015 (0) 2015
    Journal article
    Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev.
    Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
    SIAM J. Comput. 2015, Volume 44 (0) 2015
    Conference paper
    Zvika Brakerski, Ilan Komargodski, Gil Segev.
    From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Gilad Asharov, Gil Segev.
    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev.
    Message-Locked Encryption for Lock-Dependent Messages.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Benny Pinkas, Thomas Schneider 0003, Gil Segev, Michael Zohner.
    Phasing: Private Set Intersection using Permutation-based Hashing.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Prabhanjan Vijendra Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan.
    From Selective to Adaptive Security in Functional Encryption.
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Benny Pinkas, Thomas Schneider 0003, Gil Segev, Michael Zohner.
    Phasing: Private Set Intersection Using Permutation-based Hashing.
    24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. 2015 (0) 2015
    Conference paper
    Gilad Asharov, Gil Segev.
    On Constructing One-Way Permutations from Indistinguishability Obfuscation.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Zvika Brakerski, Gil Segev.
    Hierarchical Functional Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Gilad Asharov, Gil Segev.
    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
    IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015 2015 (0) 2015
    Conference paper
    Zvika Brakerski, Gil Segev.
    Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
    J. Cryptology 2014, Volume 27 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
    Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Gil Cohen, Ran Raz, Gil Segev.
    Nonmalleable Extractors with Short Seeds and Applications to Privacy Amplification.
    SIAM J. Comput. 2014, Volume 43 (0) 2014
    Conference paper
    Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy.
    Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Show item 1 to 25 of 96  

    Your query returned 96 matches in the database.