image description

גיל שגב 2008-2009

מוסד לימודים לדוקטורט:
מכון ויצמן למדע
תחום אקדמי:
מדעי המחשב
מנחה/מנחים בדוקטורט:
פרופ' מוני נאור
נושא הדוקטורט:
The Design of Public-Key Cryptosystems Resilient to Chosen-Ciphertext and Key-Leakage Attacks
שנת קבלת הדוקטורט:
מוסד בתר-דוקטורט:
מייקרוסופט מחקר
מוסד נוכחי:
האוניברסיטה העברית בירושלים
משרה אקדמית נוכחית:
מרצה בכיר
כתובת דוא"ל:
עמוד הבית

Gil Segev is a computer scientist and senior lecturer (assistant professor) at the School of Computer Science and Engineering, The Hebrew University of Jerusalem. His main interest is in cryptography and its interplay with various other areas in the foundations of computer science.

Dr. Gil Segev joined the Hebrew University’s School of Engineering and Computer Science as in 2013. After earning his PhD in computer science from the Weizmann Institute of Science in 2010, Dr. Segev spent two years as a postdoctoral fellow at Microsoft Research Silicon Valley, and one year as a visiting faculty member at Stanford University. He received his master’s degree in computer science from the Weizmann Institute of Science and his bachelor’s degree in mathematics and computer science from Tel Aviv University.

Dr. Segev is the recipient of various awards for his achievements in research: most notable are the Gad Resheff Memorial Prize for outstanding PhD research awarded by the Weizmann Institute of Science, and the Adams Fellowship awarded by the Israel Academy of Sciences and Humanities.

Dr. Segev’s current research focuses on cryptography and its interplay with other areas in the foundations of computer science. Cryptography, the study of techniques for designing systems that withstand malicious behavior, is instrumental in preserving privacy in our daily usage of social networks, on-line banking, various cloud-based applications, and many more new and evolving technologies. When dealing with sensitive data, the deployment of such evolving technologies becomes extremely challenging. For example, whenever sensitive data is transmitted over the Internet, encryption is used to ensure its security. In such cases, the traditional cryptographic approach, viewing encrypted data as completely useless unless a decryption key is provided for recovering the entire data, would jeopardize the entire premise of these technologies.