11![Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev† Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen∗ Gil Segev†](https://www.pdfsearch.io/img/f9d54a51c99ac575596796fd4c6af24a.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-11-02 14:33:31
|
---|
12![Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract](https://www.pdfsearch.io/img/1e76260041e273c9295692dca379c9c6.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-05-30 13:55:48
|
---|
13![Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡ Fully Leakage-Resilient Signatures Elette Boyle∗ Gil Segev† Daniel Wichs‡](https://www.pdfsearch.io/img/78b81e5953a6af16928e22921e2495ba.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-10-07 22:37:50
|
---|
14![Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡ Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡](https://www.pdfsearch.io/img/841757497d49b7cebcd0abbf4984ae10.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2013-10-21 19:18:05
|
---|
15![An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡ An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡](https://www.pdfsearch.io/img/172cf4e0905307e9502bc9732ad26e1a.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-01-04 03:07:02
|
---|
16![On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov∗ Gil Segev∗ On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov∗ Gil Segev∗](https://www.pdfsearch.io/img/7dfb456c43b69de991b1b09038473d92.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-10-11 04:16:04
|
---|
17![History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§ History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§](https://www.pdfsearch.io/img/92c83282a9159f3b95f702dcd160b58a.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2008-08-18 02:50:19
|
---|
18![A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jenifer Rexford††, Scott Shenker](https://www.pdfsearch.io/img/82543c319998709084a6e6c8abf494e3.jpg) | Add to Reading ListSource URL: work.debayangupta.com- Date: 2012-10-06 01:34:09
|
---|
19![History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§ History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§](https://www.pdfsearch.io/img/0d76a96d9b780e80ec25c90862e96fff.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.il- Date: 2008-04-22 13:39:01
|
---|
20![Photonic engineering As a first step toward measuring localization, Segev and company prepared a 2D photonic crystal—a periodic lattice that diffracts light in much the same way that a semiconductor diffracts electrons Photonic engineering As a first step toward measuring localization, Segev and company prepared a 2D photonic crystal—a periodic lattice that diffracts light in much the same way that a semiconductor diffracts electrons](https://www.pdfsearch.io/img/1b1f2ae476a9f9bb06abd3df18af751e.jpg) | Add to Reading ListSource URL: www.phy.ohiou.eduLanguage: English - Date: 2007-05-02 11:07:56
|
---|