Segev

Results: 41



#Item
1A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-10-14 18:59:05
2Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-03-14 11:17:07
    3Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-07-29 01:21:17
      4Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev†  Abstract

      Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-15 01:20:37
        5Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

        Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2010-03-19 16:16:22
          6Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

          Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2012-11-29 11:47:05
            7Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

            Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan∗ Gil Segev†

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-01-10 04:13:59
              8Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

              Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-11-02 14:33:31
                9Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

                Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-10-22 01:56:45
                  10David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗  Gil Segev∗

                  David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-01-31 10:30:41