Calculated based on number of publications stored in Pure and citations from Scopus
20062025

Research activity per year

Filter
Conference contribution

Search results

  • 2025

    From One-Time to Two-Round Reusable Multi-signatures Without Nested Forking

    Rotem, L., Segev, G. & Yogev, E., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 371-399 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15366 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2024

    Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods

    Shafran, A., Malach, E., Ristenpart, T., Segev, G. & Tessaro, S., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 37-71 35 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14925 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Rogue-Instance Security for Batch Knowledge Proofs

    Segev, G., Sharabi, A. & Yogev, E., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 121-157 37 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2022

    A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff

    Rotem, L. & Segev, G., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 12:1-12:16 16 p. 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Generic-group identity-based encryption: A tight impossibility result

    Schul-Ganz, G. & Segev, G., 1 Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 26:1-26:23 23 p. 26. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Non-malleable Vector Commitments via Local Equivocability

    Rotem, L. & Segev, G., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 415-446 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ -Protocols

    Rotem, L. & Segev, G., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 222-250 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2020

    Accumulators in (and beyond) generic groups: Non-trivial batch verification requires interaction

    Schul-Ganz, G. & Segev, G., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 77-107 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Algebraic distinguishers: From discrete logarithms to decisional uber assumptions

    Rotem, L. & Segev, G., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 366-389 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption

    Shahaf, I., Ordentlich, O. & Segev, G., Jun 2020, 2020 IEEE International Symposium on Information Theory, ISIT 2020 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 858-863 6 p. 9174331. (IEEE International Symposium on Information Theory - Proceedings; vol. 2020-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Generically speeding-up repeated squaring is equivalent to factoring: Sharp thresholds for all generic-ring delay functions

    Rotem, L. & Segev, G., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 481-509 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Generic-group delay functions require hidden-order groups

    Rotem, L., Segev, G. & Shahaf, I., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 155-180 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Hardness vs. (Very Little) structure in cryptography: A multi-prover interactive proofs perspective

    Segev, G. & Shahaf, I., 1 Jun 2020, 1st Conference on Information-Theoretic Cryptography, ITC 2020. Kalai, Y. T., Smith, A. D. & Wichs, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 163).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Multidisciplinary research in e-Health: Challenges and thoughts

    Richardson, A., Raz, H., Segev, G. & Rosenblum, S., 2020, ICT4AWE 2020 - Proceedings of the 6th International Conference on Information and Communication Technologies for Ageing Well and e-Health. Guldemond, N., Ziefle, M., Maciaszek, L. & Maciaszek, L. (eds.). SciTePress, p. 244-249 6 p. (ICT4AWE 2020 - Proceedings of the 6th International Conference on Information and Communication Technologies for Ageing Well and e-Health).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Out-of-band authenticated group key exchange: From strong authentication to immediate key delivery

    Naor, M., Rotem, L. & Segev, G., 1 Jun 2020, 1st Conference on Information-Theoretic Cryptography, ITC 2020. Kalai, Y. T., Smith, A. D. & Wichs, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 9. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 163).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    A clinical decision support system based on an unobtrusive mobile app

    Richardson, A., Perl, A., Natan, S. & Segev, G., 2019, ICT4AWE 2019 - Proceedings of the 5th International Conference on Information and Communication Technologies for Ageing Well and e-Health. Ziefle, M., Maciaszek, L. & Maciaszek, L. (eds.). SciTePress, p. 167-173 7 p. (ICT4AWE 2019 - Proceedings of the 5th International Conference on Information and Communication Technologies for Ageing Well and e-Health).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Mobile applications for stroke: A survey and a speech classification approach

    Richardson, A., Ari, S. B., Sinai, M., Atsmon, A., Conley, E. S., Gat, Y. & Segev, G., 2019, ICT4AWE 2019 - Proceedings of the 5th International Conference on Information and Communication Technologies for Ageing Well and e-Health. Ziefle, M., Maciaszek, L. & Maciaszek, L. (eds.). SciTePress, p. 159-166 8 p. (ICT4AWE 2019 - Proceedings of the 5th International Conference on Information and Communication Technologies for Ageing Well and e-Health).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • 2018

    Anonymous IBE, leakage resilience and circular security from new assumptions

    Brakerski, Z., Lombardi, A., Segev, G. & Vaikuntanathan, V., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 535-564 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    61 Scopus citations
  • Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound

    Segev, G. & Shahaf, I., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 177-191 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11240 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Injective trapdoor functions via derandomization: How strong is Rudich’s black-box barrier?

    Rotem, L. & Segev, G., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 421-447 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Out-of-band authentication in group messaging: Computational, statistical, optimal

    Rotem, L. & Segev, G., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 63-89 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Securing Abe’s mix-net against malicious verifiers via witness indistinguishability

    Boyle, E., Klein, S., Rosen, A. & Segev, G., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 274-291 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • The Security of Lazy Users in Out-of-Band Authentication

    Naor, M., Rotem, L. & Segev, G., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 575-599 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11240 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Tight tradeoffs in searchable symmetric encryption

    Asharov, G., Segev, G. & Shahaf, I., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 407-436 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • 2017

    Can PPAD hardness be based on standard cryptographic assumptions?

    Rosen, A., Segev, G. & Shahaf, I., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 747-776 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • From minicrypt to obfustopia via private-key functional encryption

    Komargodski, I. & Segev, G., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Nielsen, J. B. & Coron, J.-S. (eds.). Springer Verlag, p. 122-151 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • Hierarchical functional encryption

    Brakerski, Z., Chandran, N., Goyal, V., Jain, A., Sahai, A. & Segev, G., 1 Nov 2017, 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. Papadimitriou, C. H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 67).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Strengthening the security of encrypted databases: Non-transitive JOINs

    Mironov, I., Segev, G. & Shahaf, I., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 631-661 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2016

    Multi-input functional encryption in the private-key setting: Stronger security from weaker assumptions

    Brakerski, Z., Komargodski, I. & Segev, G., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer Verlag, p. 852-880 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    34 Scopus citations
  • On constructing one-way permutations from indistinguishability obfuscation

    Asharov, G. & Segev, G., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 512-541 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Searchable symmetric encryption: Optimal locality in linear space via two-dimensional balanced allocations

    Asharov, G., Naor, M., Segev, G. & Shahaf, I., 19 Jun 2016, STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. Mansour, Y. & Wichs, D. (eds.). Association for Computing Machinery, p. 1101-1114 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 19-21-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    82 Scopus citations
  • 2015

    From selective to adaptive security in functional encryption

    Ananth, P., Brakerski, Z., Segev, G. & Vaikuntanathan, V., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 657-677 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    95 Scopus citations
  • Functional encryption for randomized functionalities in the private-key setting from minimal assumptions

    Komargodski, I., Segev, G. & Yogev, E., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 352-377 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Function-private functional encryption in the private-key setting

    Brakerski, Z. & Segev, G., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 306-324 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Scopus citations
  • Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

    Asharov, G. & Segev, G., 11 Dec 2015, Proceedings - 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015. IEEE Computer Society, p. 191-209 19 p. 7354395. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    47 Scopus citations
  • Phasing: Private Set Intersection using Permutation-based Hashing

    Pinkas, B., Schneider, T., Segev, G. & Zohner, M., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 515-530 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    218 Scopus citations
  • 2014

    Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits

    Boneh, D., Gentry, C., Gorbunov, S., Halevi, S., Nikolaenko, V., Segev, G., Vaikuntanathan, V. & Vinayagamurthy, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 533-556 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    289 Scopus citations
  • 2013

    Deterministic public-key encryption for adaptively chosen plaintext distributions

    Raghunathan, A., Segev, G. & Vadhan, S., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    34 Scopus citations
  • Function-private identity-based encryption: Hiding the function in functional encryption

    Boneh, D., Raghunathan, A. & Segev, G., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 461-478 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    97 Scopus citations
  • Function-private subspace-membership encryption and its applications

    Boneh, D., Raghunathan, A. & Segev, G., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 255-275 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
  • How to approximate a set without knowing its size in advance

    Pagh, R., Segev, G. & Wieder, U., 2013, Proceedings - 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, FOCS 2013. p. 80-89 10 p. 6686143. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Message-locked encryption for lock-dependent messages

    Abadi, M., Boneh, D., Mironov, I., Raghunathan, A. & Segev, G., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 1 ed. p. 374-391 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8042 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    102 Scopus citations
  • 2012

    A new approach to interdomain routing based on secure multi-party computation

    Gupta, D., Segal, A., Panda, A., Segev, G., Schapira, M., Feigenbaum, J., Rexford, J. & Shenker, S., 2012, Proceedings of the 11th ACM Workshop on Hot Topics in Networks, HotNets-11. Association for Computing Machinery, p. 37-42 6 p. (Proceedings of the 11th ACM Workshop on Hot Topics in Networks, HotNets-11).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    40 Scopus citations
  • Incremental deterministic public-key encryption

    Mironov, I., Pandey, O., Reingold, O. & Segev, G., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 628-644 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
  • Lossy functions do not amplify well

    Pietrzak, K., Rosen, A. & Segev, G., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 458-475 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • Non-malleable extractors with short seeds and applications to privacy amplification

    Cohen, G., Raz, R. & Segev, G., 2012, Proceedings - 2012 IEEE 27th Conference on Computational Complexity, CCC 2012. p. 298-308 11 p. 6243406. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Targeted malleability: Homomorphic encryption for restricted computations

    Boneh, D., Segev, G. & Waters, B., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 350-366 17 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    38 Scopus citations
  • 2011

    Balls and bins: Smaller Hash families and faster evaluation

    Celis, L. E., Reingold, O., Segev, G. & Wieder, U., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 599-608 10 p. 6108221. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • Better security for deterministic public-key encryption: The auxiliary-input setting

    Brakerski, Z. & Segev, G., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 543-560 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    58 Scopus citations
  • Fully leakage-resilient signatures

    Boyle, E., Segev, G. & Wichs, D., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    67 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.