Cryptographers' World
 

Gil Segev



8 papers in database with 124 citations 

H-number: 5

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mihir Bellare,  Zvika Brakerski,  Moni Naor,  Thomas Ristenpart,  Gil Segev,  Hovav Shacham,  Scott Yilek,  Hedged Public-Key Encryption: How to Protect against Bad Randomness, pp. 232 - 249, ASIACRYPT 2009.

[Electronic Edition][Cited 4 times ]

2. Moni Naor,  Gil Segev,  Public-Key Cryptosystems Resilient to Key Leakage, pp. 18 - 35, CRYPTO 2009.

[Electronic Edition][Cited 39 times ]

3. Tal Moran,  Moni Naor,  Gil Segev,  An Optimally Fair Coin Toss, pp. 1 - 18, TCC 2009.

[Electronic Edition][Cited 11 times ]

4. Alon Rosen,  Gil Segev,  Chosen-Ciphertext Security via Correlated Products, pp. 419 - 436, TCC 2009.

[Electronic Edition][Cited 30 times ]

5. Ilya Mironov,  Moni Naor,  Gil Segev,  Sketching in adversarial environments, pp. 651 - 660, STOC 2008.

[Electronic Edition][Cited 1 times ]

6. Tal Moran,  Gil Segev,  David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware, pp. 527 - 544, EUROCRYPT 2008.

[Electronic Edition][Cited 14 times ]

7. Iftach Haitner,  Jonathan J. Hoch,  Gil Segev,  A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval, pp. 445 - 464, TCC 2008.

[Electronic Edition][Cited 5 times ]

8. Moni Naor,  Gil Segev,  Adam Smith,  Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models, pp. 214 - 231, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...