Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ... Advances in Cryptology – EUROCRYPT 2014, 533-556, 2014 | 516 | 2014 |
Public-Key Cryptosystems Resilient to Key Leakage M Naor, G Segev Advances in Cryptology – CRYPTO 2009, 18-35, 2009 | 471 | 2009 |
Phasing: Private Set Intersection Using Permutation-based Hashing B Pinkas, T Schneider, G Segev, M Zohner USENIX Security Symposium, 515-530, 2015 | 354 | 2015 |
Public-Key Encryption in the Bounded-Retrieval Model J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs Advances in Cryptology – EUROCRYPT 2010, 113-134, 2010 | 258 | 2010 |
Chosen-Ciphertext Security via Correlated Products A Rosen, G Segev SIAM Journal on Computing 39 (7), 3058-3088, 2010 | 207 | 2010 |
Hedged Public-Key Encryption: How to Protect Against Bad Randomness M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ... Advances in Cryptology – ASIACRYPT 2009, 232-249, 2009 | 176 | 2009 |
Message-Locked Encryption for Lock-Dependent Messages M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev Advances in Cryptology – CRYPTO 2013, 374-391, 2013 | 170 | 2013 |
From Selective to Adaptive Security in Functional Encryption P Ananth, Z Brakerski, G Segev, V Vaikuntanathan Advances in Cryptology – CRYPTO 2015, 657-677, 2015 | 167* | 2015 |
Fully Leakage-Resilient Signatures E Boyle, G Segev, D Wichs Journal of cryptology 26 (3), 513-558, 2013 | 146 | 2013 |
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption D Boneh, A Raghunathan, G Segev Advances in Cryptology – CRYPTO 2013, 461-478, 2013 | 146 | 2013 |
More constructions of lossy and correlation-secure trapdoor functions DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 140 | 2010 |
Function-Private Functional Encryption in the Private-Key Setting Z Brakerski, G Segev Theory of Cryptography Conference (TCC), 306-324, 2015 | 133 | 2015 |
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Y Arbitman, M Naor, G Segev IEEE Symposium on Foundations of Computer Science (FOCS), 787-796, 2010 | 132 | 2010 |
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Z Brakerski, A Lombardi, G Segev, V Vaikuntanathan Advances in Cryptology – EUROCRYPT 2018, 535-564, 2018 | 122 | 2018 |
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations G Asharov, M Naor, G Segev, I Shahaf ACM Symposium on Theory of Computing (STOC), 1101-1114, 2016 | 116 | 2016 |
Public-Key Cryptosystems Resilient to Key Leakage M Naor, G Segev SIAM Journal on Computing 41 (4), 772-814, 2012 | 111 | 2012 |
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum V Lyubashevsky, A Palacio, G Segev Theory of Cryptography Conference (TCC), 382-400, 2010 | 109 | 2010 |
An Optimally Fair Coin Toss T Moran, M Naor, G Segev Theory of Cryptography Conference (TCC), 1-18, 2009 | 101 | 2009 |
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware T Moran, G Segev Advances in Cryptology – EUROCRYPT 2008, 527-544, 2008 | 101 | 2008 |
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments I Haitner, JJ Hoch, O Reingold, G Segev IEEE Symposium on Foundations of Computer Science (FOCS), 669-679, 2007 | 101 | 2007 |