Folgen
Gil Segev
Gil Segev
Professor of Computer Science, Hebrew University
Bestätigte E-Mail-Adresse bei cs.stanford.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Public-Key Cryptosystems Resilient to Key Leakage
M Naor, G Segev
Advances in Cryptology – CRYPTO 2009, 18-35, 2009
4432009
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ...
Advances in Cryptology – EUROCRYPT 2014, 533-556, 2014
4182014
Phasing: Private Set Intersection Using Permutation-based Hashing
B Pinkas, T Schneider, G Segev, M Zohner
USENIX Security Symposium, 515-530, 2015
2662015
Public-Key Encryption in the Bounded-Retrieval Model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Advances in Cryptology – EUROCRYPT 2010, 113-134, 2010
2492010
Chosen-Ciphertext Security via Correlated Products
A Rosen, G Segev
SIAM Journal on Computing 39 (7), 3058-3088, 2010
1972010
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
Journal of Cryptology 26 (1), 39-74, 2013
1782013
Hedged Public-Key Encryption: How to Protect Against Bad Randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
Advances in Cryptology – ASIACRYPT 2009, 232-249, 2009
1682009
Message-Locked Encryption for Lock-Dependent Messages
M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev
Advances in Cryptology – CRYPTO 2013, 374-391, 2013
1562013
From Selective to Adaptive Security in Functional Encryption
P Ananth, Z Brakerski, G Segev, V Vaikuntanathan
Advances in Cryptology – CRYPTO 2015, 657-677, 2015
150*2015
Fully Leakage-Resilient Signatures
E Boyle, G Segev, D Wichs
Journal of cryptology 26 (3), 513-558, 2013
1382013
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
D Boneh, A Raghunathan, G Segev
Advances in Cryptology – CRYPTO 2013, 461-478, 2013
1322013
Function-Private Functional Encryption in the Private-Key Setting
Z Brakerski, G Segev
Theory of Cryptography Conference (TCC), 306-324, 2015
1112015
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Z Brakerski, G Segev
Journal of Cryptology 27 (2), 210-247, 2014
1052014
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
Y Arbitman, M Naor, G Segev
IEEE Symposium on Foundations of Computer Science (FOCS), 787-796, 2010
1022010
Public-Key Cryptosystems Resilient to Key Leakage
M Naor, G Segev
SIAM Journal on Computing 41 (4), 772-814, 2012
982012
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
T Moran, G Segev
Advances in Cryptology – EUROCRYPT 2008, 527-544, 2008
972008
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
I Haitner, JJ Hoch, O Reingold, G Segev
IEEE Symposium on Foundations of Computer Science (FOCS), 669-679, 2007
972007
An Optimally Fair Coin Toss
T Moran, M Naor, G Segev
Theory of Cryptography Conference (TCC), 1-18, 2009
962009
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
G Asharov, M Naor, G Segev, I Shahaf
ACM Symposium on Theory of Computing (STOC), 1101-1114, 2016
952016
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
Z Brakerski, A Lombardi, G Segev, V Vaikuntanathan
Advances in Cryptology – EUROCRYPT 2018, 535-564, 2018
942018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20