Skip to main content

Showing 1–7 of 7 results for author: Segev, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.01417  [pdf, ps, other

    cs.CR

    Finding Collisions in Interactive Protocols -- Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments

    Authors: Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev

    Abstract: We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations, and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as sin… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: The full version was published in the SIAM Journal on Computing 2015. Extended abstracts of this work appeared in the Annual Symposium on Foundations of Computer Science (FOCS) 2007 and in the Theory of Cryptography Conference (TCC) 2013

  2. arXiv:2004.09935  [pdf, ps, other

    cs.IT cs.CR

    An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption

    Authors: Ido Shahaf, Or Ordentlich, Gil Segev

    Abstract: Motivated by a fundamental paradigm in cryptography, we consider a recent variant of the classic problem of bounding the distinguishing advantage between a random function and a random permutation. Specifically, we consider the problem of deciding whether a sequence of $q$ values was sampled uniformly with or without replacement from $[N]$, where the decision is made by a streaming algorithm restr… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  3. arXiv:1911.12322  [pdf, other

    cs.LG cs.CR stat.ML

    Crypto-Oriented Neural Architecture Design

    Authors: Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen

    Abstract: As neural networks revolutionize many applications, significant privacy conflicts between model users and providers emerge. The cryptography community developed a variety of techniques for secure computation to address such privacy issues. As generic techniques for secure computation are typically prohibitively ineffective, many efforts focus on optimizing their underlying cryptographic tools. Dif… ▽ More

    Submitted 16 February, 2021; v1 submitted 27 November, 2019; originally announced November 2019.

    Comments: Full version (shorter version published in ICASSP'21)

  4. arXiv:1502.07391  [pdf

    cs.ET cond-mat.mes-hall

    Multiple State EFN Transistors

    Authors: Gideon Segev, Iddo Amit, Andrey Godkin, Alex Henning, Yossi Rosenwaks

    Abstract: Electrostatically Formed Nanowire (EFN) based transistors have been suggested in the past as gas sensing devices. These transistors are multiple gate transistors in which the source to drain conduction path is determined by the bias applied to the back gate, and two junction gates. If a specific bias is applied to the side gates, the conduction band electrons between them are confined to a well-de… ▽ More

    Submitted 19 March, 2015; v1 submitted 25 February, 2015; originally announced February 2015.

  5. arXiv:1304.1188  [pdf, ps, other

    cs.DS

    How to Approximate A Set Without Knowing Its Size In Advance

    Authors: Rasmus Pagh, Gil Segev, Udi Wieder

    Abstract: The dynamic approximate membership problem asks to represent a set S of size n, whose elements are provided in an on-line fashion, supporting membership queries without false negatives and with a false positive rate at most epsilon. That is, the membership algorithm must be correct on each x in S, and may err with probability at most epsilon on each x not in S. We study a well-motivated, yet ins… ▽ More

    Submitted 11 April, 2013; v1 submitted 3 April, 2013; originally announced April 2013.

    Comments: Clarified a point in the lower bound proof

  6. arXiv:0912.5424  [pdf, ps, other

    cs.DS

    Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation

    Authors: Yuriy Arbitman, Moni Naor, Gil Segev

    Abstract: The performance of a dynamic dictionary is measured mainly by its update time, lookup time, and space consumption. In terms of update time and lookup time there are known constructions that guarantee constant-time operations in the worst case with high probability, and in terms of space consumption there are known constructions that use essentially optimal space. However, although the first analys… ▽ More

    Submitted 16 August, 2010; v1 submitted 30 December, 2009; originally announced December 2009.

    Comments: FOCS 2010

  7. arXiv:0903.0391  [pdf, ps, other

    cs.DS

    De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results

    Authors: Yuriy Arbitman, Moni Naor, Gil Segev

    Abstract: Cuckoo hashing is a highly practical dynamic dictionary: it provides amortized constant insertion time, worst case constant deletion time and lookup time, and good memory utilization. However, with a noticeable probability during the insertion of n elements some insertion requires Ω(log n) time. Whereas such an amortized guarantee may be suitable for some applications, in other applications (suc… ▽ More

    Submitted 2 March, 2009; originally announced March 2009.