Segev

Results: 41



#Item
11Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-11-02 14:33:31
    12Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev†  Abstract

    Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-05-30 13:55:48
      13Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev†  Daniel Wichs‡

      Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2012-10-07 22:37:50
        14Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko†  Gil Segev‡

        Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2013-10-21 19:18:05
          15An Optimally Fair Coin Toss Tal Moran∗ Moni Naor†  Gil Segev‡

          An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-01-04 03:07:02
            16On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov∗ Gil Segev∗

            On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov∗ Gil Segev∗

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-10-11 04:16:04
              17History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡  Udi Wieder§

              History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2008-08-18 02:50:19
                18A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker

                A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker

                Add to Reading List

                Source URL: work.debayangupta.com

                - Date: 2012-10-06 01:34:09
                  19History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡  Udi Wieder§

                  History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

                  Add to Reading List

                  Source URL: www.wisdom.weizmann.ac.il

                  - Date: 2008-04-22 13:39:01
                    20Photonic engineering As a first step toward measuring localization, Segev and company prepared a 2D photonic crystal—a periodic lattice that diffracts light in much the same way that a semiconductor diffracts electrons

                    Photonic engineering As a first step toward measuring localization, Segev and company prepared a 2D photonic crystal—a periodic lattice that diffracts light in much the same way that a semiconductor diffracts electrons

                    Add to Reading List

                    Source URL: www.phy.ohiou.edu

                    Language: English - Date: 2007-05-02 11:07:56