Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Gil
    Last name: Segev
    DBLP: s/GilSegev
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 85  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Ilan Komargodski, Gil Segev, Eylon Yogev.
    Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
    Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Zvika Brakerski, Gil Segev.
    Function-Private Functional Encryption in the Private-Key Setting.
    Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II 2015 (0) 2015
    Journal article
    Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev.
    Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
    SIAM J. Comput. 2015, Volume 44 (0) 2015
    Conference paper
    Zvika Brakerski, Ilan Komargodski, Gil Segev.
    From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Gilad Asharov, Gil Segev.
    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev.
    Message-Locked Encryption for Lock-Dependent Messages.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Benny Pinkas, Thomas Schneider 0003, Gil Segev, Michael Zohner.
    Phasing: Private Set Intersection using Permutation-based Hashing.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Prabhanjan Vijendra Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan.
    From Selective to Adaptive Security in Functional Encryption.
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Benny Pinkas, Thomas Schneider 0003, Gil Segev, Michael Zohner.
    Phasing: Private Set Intersection Using Permutation-based Hashing.
    24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. 2015 (0) 2015
    Conference paper
    Gilad Asharov, Gil Segev.
    On Constructing One-Way Permutations from Indistinguishability Obfuscation.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Show item 1 to 10 of 85  

    Your query returned 85 matches in the database.