Gil

Results: 3540



#Item
41Boa tarde. Bem-vindas, bem-vindos. Agradecemos à Inês Gil por nos ter trazido estas imagens de “Rafa”, que nos falam de como a arte nos pode trazer o conhecimento do outro, e de realidades que muitas vezes ignoramo

Boa tarde. Bem-vindas, bem-vindos. Agradecemos à Inês Gil por nos ter trazido estas imagens de “Rafa”, que nos falam de como a arte nos pode trazer o conhecimento do outro, e de realidades que muitas vezes ignoramo

Add to Reading List

Source URL: escutaracidade.files.wordpress.com

- Date: 2015-06-29 11:01:50
    42Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev†  Abstract

    Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-09-15 01:20:37
      43The Power of Knowledge in Games Rohit Parikh1,2 , C ¸ a˘gıl Ta¸sdemir2 , and Andreas Witzel3 1  Brooklyn College of the City University of New York,

      The Power of Knowledge in Games Rohit Parikh1,2 , C ¸ a˘gıl Ta¸sdemir2 , and Andreas Witzel3 1 Brooklyn College of the City University of New York,

      Add to Reading List

      Source URL: ceur-ws.org

      - Date: 2011-07-05 04:11:46
        44Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

        Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2010-03-19 16:16:22
          451  COORDINACIÓN Y EDICIÓN Erick Monterrosas Castrejón & José Ángel Aguilar Gil / Demysex Flor Hunt / IPPF/RHO AUTORES

          1 COORDINACIÓN Y EDICIÓN Erick Monterrosas Castrejón & José Ángel Aguilar Gil / Demysex Flor Hunt / IPPF/RHO AUTORES

          Add to Reading List

          Source URL: prevenirconeducacion.org

          - Date: 2013-10-08 13:01:52
            46Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

            Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2012-11-29 11:47:05
              47Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

              Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-01-10 04:13:59
                48Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

                Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-11-02 14:33:31
                  49Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

                  Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-10-22 01:56:45
                    50David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗  Gil Segev∗

                    David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2008-01-31 10:30:41