1![A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke](https://www.pdfsearch.io/img/21530049f34c6c1a8132635d9ba761c0.jpg) | Add to Reading ListSource URL: people.eecs.berkeley.eduLanguage: English - Date: 2012-10-14 18:59:05
|
---|
2![Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract](https://www.pdfsearch.io/img/343f7ad81c21af0b4474621027f06b00.jpg) | Add to Reading ListSource URL: www.eecs.harvard.eduLanguage: English - Date: 2008-03-14 11:17:07
|
---|
3![Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗](https://www.pdfsearch.io/img/ae6fccdc0def6f567e7efaed5bd5b851.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-07-29 01:21:17
|
---|
4![Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract](https://www.pdfsearch.io/img/d6d918e736c4b414e729a4fdcfd2bb16.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-09-15 01:20:37
|
---|
5![Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract](https://www.pdfsearch.io/img/a30e9d3ac9e5f8ac4e8e78aa28abddb0.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2010-03-19 16:16:22
|
---|
6![Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev† Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†](https://www.pdfsearch.io/img/6c81ab49f034aaab6ea15ded93654214.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-11-29 11:47:05
|
---|
7![Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev† Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†](https://www.pdfsearch.io/img/757dddf28d15fe548be2cb6198b230cb.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-01-10 04:13:59
|
---|
8![Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev† Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†](https://www.pdfsearch.io/img/79d471844f342f981527d56f75d76ac3.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-11-02 14:33:31
|
---|
9![Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev† Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†](https://www.pdfsearch.io/img/7997505297511e28207a482b4a178171.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2014-10-22 01:56:45
|
---|
10![David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗ David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗](https://www.pdfsearch.io/img/f3142883a115add0ceb01f334536d968.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2008-01-31 10:30:41
|
---|