Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Gil Segev
Search web for home page
Program Committees
1
2012
PKC
pc
2
2011
TCC
pc
Publications
year
title
booktitle
pages
1
2012
Lossy Functions Do Not Amplify Well
tcc
458-475
2
2012
Incremental Deterministic Public-Key Encryption
eurocrypt
628-644
3
2011
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
crypto
539
4
2011
Fully Leakage-Resilient Signatures
eurocrypt
89
5
2011
Limits On The Power of Zero-Knowledge Proofs in Cryptographic Constructions
tcc
559
6
2010
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
tcc
382-400
7
2010
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
pkc
279-295
8
2010
Public-Key Encryption in the Bounded-Retrieval Model
eurocrypt
113-134
9
2009
Public-Key Cryptosystems Resilient to Key Leakage
crypto
18-35
10
2009
Hedged Public-Key Encryption: How to Protect against Bad Randomness
asiacrypt
232-249
11
2009
An Optimally Fair Coin Toss
tcc
1-18
12
2009
Chosen-Ciphertext Security via Correlated Products
tcc
419-436
13
2008
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
tcc
445-464
14
2008
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
eprint
online
15
2008
History-Independent Cuckoo Hashing
eprint
online
16
2008
Chosen-Ciphertext Security via Correlated Products
eprint
online
17
2008
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
eprint
online
18
2008
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
eurocrypt
527-544
19
2007
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
eprint
online
20
2007
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
eprint
online
21
2007
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
eprint
online
22
2006
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
crypto
online
23
2006
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
eprint
online
Coauthors of Gil Segev
Joël Alwen
Mihir Bellare
Elette Boyle
Zvika Brakerski
Yevgeniy Dodis
David Freeman
Oded Goldreich
Iftach Haitner
Jonathan J. Hoch
Jonathan Katz
Eike Kiltz
Vadim Lyubashevsky
Ilya Mironov
Tal Moran
Moni Naor
Adriana Palacio
Omkant Pandey
Krzysztof Pietrzak
Omer Reingold
Thomas Ristenpart
Alon Rosen
Hovav Shacham
Adam Smith
Shabsi Walfish
Daniel Wichs
Udi Wieder
Arkady Yerukhimovich
Scott Yilek