Gil Segev
Orcid: 0000-0002-8073-579XAffiliations:
- Hebrew University, Israel
According to our database1,
Gil Segev
authored at least 80 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
5
3
1
5
8
1
8
4
4
5
4
6
2
3
2
3
4
2
2
1
1
1
2
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on gilsegev.net
-
on orcid.org
On csauthors.net:
Bibliography
2024
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols.
J. Cryptol., September, 2024
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures.
IACR Commun. Cryptol., 2024
2023
J. Cryptol., October, 2023
Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity.
Commun. ACM, May, 2023
2022
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff.
IACR Cryptol. ePrint Arch., 2022
2021
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations.
SIAM J. Comput., 2021
Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
ACM Trans. Priv. Secur., 2020
J. Cryptol., 2020
An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020
Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective.
IACR Cryptol. ePrint Arch., 2020
Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions.
IACR Cryptol. ePrint Arch., 2020
2019
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery.
IACR Cryptol. ePrint Arch., 2019
2018
J. Cryptol., 2018
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
J. Cryptol., 2018
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
J. Cryptol., 2018
J. Cryptol., 2018
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
2016
SIAM J. Comput., 2016
Electron. Colloquium Comput. Complex., 2016
Electron. Colloquium Comput. Complex., 2016
2015
Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
SIAM J. Comput., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
SIAM J. Comput., 2014
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
J. Cryptol., 2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014
The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically.
IACR Cryptol. ePrint Arch., 2014
2013
J. Cryptol., 2013
IACR Cryptol. ePrint Arch., 2013
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Electron. Colloquium Comput. Complex., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
2010
Approximate <i>k</i>-Steiner Forests via the Lagrangian Relaxation Technique with Internal Preprocessing.
Algorithmica, 2010
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
2009
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
Theory Comput., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results.
Proceedings of the Automata, Languages and Programming, 36th International Colloquium, 2009
2008
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2008
2007
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2007
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Electron. Colloquium Comput. Complex., 2007