Videos

7th BIU Winter School

The Anonymization/ De-identification Paradigm

Speaker: Shmatikov V.
7th BIU Winter School

Re-identification Attacks

Speaker: Shmatikov V.
7th BIU Winter School

Inference Attacks

Speaker: Shmatikov V.
7th BIU Winter School

Introduction to Differential Privacy, Randomizaed Response, Basic Properties

Speaker: Ligett K.
7th BIU Winter School

Basic Tools- Laplace Mechanism, Exponential Mechanism

Speaker: Ligett K.
7th BIU Winter School

Private Data Release

Speaker: Ligett K.
7th BIU Winter School

Lowerbound Techniques: Packing Argument

Speaker: Ullman J.
7th BIU Winter School

Reconstruction Attacks

Speaker: Ullman J.
7th BIU Winter School

Advanced Tools: Tree Algorithm, Advanced Composition

Speaker: Nissim K.
7th BIU Winter School

Advanced Tools- Sparse Vector

Speaker: Ligett K.
7th BIU Winter School

Private Multiplicative Weights

Speaker: Ullman J.
7th BIU Winter School

Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism

Speaker: Smith A.
7th BIU Winter School

Lowerbound Techniques: Fingerprinting Codes

Speaker: Ullman J.
7th BIU Winter School

Local Algorithms

Speaker: Smith A.
7th BIU Winter School

Privacy- What It Is and What It Isn’t?

Speaker: Shmatikov V.
7th BIU Winter School

Privacy Meets Machine Learning

Speaker: Shmatikov V.
7th BIU Winter School

Generalization and Privacy

Speaker: Nissim K.
7th BIU Winter School

Private Learning 1

Speaker: Nissim K.
7th BIU Winter School

Private Learning 2

Speaker: Nissim K.
7th BIU Winter School

Private ERM

Speaker: Smith A.
7th BIU Winter School

Privacy and Statistics

Speaker: Smith A.
7th BIU Winter School

Tracing Attacks 1

Speaker: Ullman J.
7th BIU Winter School

Tracing Attacks 2

Speaker: Ullman J.
7th BIU Winter School

Analyzing Graphs

Speaker: Smith A.
7th BIU Winter School

Privacy and Game Theory 1

Speaker: Ligett K.
7th BIU Winter School

Privacy and Game Theory 2

Speaker: Ligett K.
6th BIU Winter School

Introduction and Overview of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 1

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 2

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 3

Speaker: Kalai Y.
6th BIU Winter School

Interactive Arguments with Preprocessing

Speaker: Walfish M.
6th BIU Winter School

SNARKs with Preprocessing

Speaker: Tromer E.
6th BIU Winter School

Interactive Proofs and Program Representations 1

Speaker: Walfish M.
6th BIU Winter School

Program Representations 2

Speaker: Tromer E.
6th BIU Winter School

SNARKs (Without Preprocessing) and Their Applications

Speaker: Tromer E.
6th BIU Winter School

Additional Applications and Summary of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Introduction to Searchable Encryption (models and motivation)

Speaker: Boldyreva A.
6th BIU Winter School

Format-Preserving Encryption 1

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 2

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 3

Speaker: Weiss M.
6th BIU Winter School

Order-Preserving Encryption 1

Speaker: Boldyreva A.
6th BIU Winter School

Order-Preserving Encryption 2

Speaker: Boldyreva A.
6th BIU Winter School

Statistical Attacks on Deterministic and Order-Preserving Encryption

Speaker: Boldyreva A.
6th BIU Winter School

Probabilistic Searchable Symmetric Encryption

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 1

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 2

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 3

Speaker: Krawczyk H.
6th BIU Winter School

Searchable Encryption Using ORAM

Speaker: Pinkas B.
5th BIU Winter School

Definitions and Obilivious Transfer

Speaker: Lindell Y.
5th BIU Winter School

Yao’s Two-Party Protocol and the BMR Multi-Party Protocol

Speaker: Pinkas B.
5th BIU Winter School

The GMW Multi-Party Protocol and Oblivious Transfer Extension

Speaker: Pinkas B.
5th BIU Winter School

Efficient Zero-Knowledge

Speaker: Lindell Y.
5th BIU Winter School

Security against Malicious Adversaries

Speaker: Lindell Y.
5th BIU Winter School

Optimizing Yao and GMWl for Semi-Honest Adversaries

Speaker: Lindell Y.
5th BIU Winter School

Security for Malicious Adversaries with Yao’s Protocol – part 1

Speaker: shelat a.
5th BIU Winter School

Security for Malicious Adversaries with Yao’s Protocol – part 2

Speaker: shelat a.
5th BIU Winter School

Implementation Issues and Optimizations

Speaker: shelat a.
5th BIU Winter School

The TinyOT Protocol – part 1

Speaker: Orlandi C.
5th BIU Winter School

The TinyOT Protocol – part 2

Speaker: Orlandi C.
5th BIU Winter School

The SPDZ Protocol – part 1

Speaker: Damgard I.
5th BIU Winter School

The SPDZ Protocol – part 2

Speaker: Damgard I.
5th BIU Winter School

ORAM

Speaker: Pinkas B.
5th BIU Winter School

Set Intersection

Speaker: Pinkas B.
5th BIU Winter School

UC Secure Commitments with Optimal Amortized Overhead

Speaker: Damgard I.
5th BIU Winter School

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

Speaker: Asharov G.
5th BIU Winter School

Large-Scale Secure Computation: MPC for Parallel RAM Programs

Speaker: Boyle E.
5th BIU Winter School

Rethinking for Secure Computation – A Greedy Approach

Speaker: Venkitasubramaniam M.
5th BIU Winter School

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs

Speaker: Hazay C.
5th BIU Winter School

A Tutorial on SCAPI

Speaker: Lindell Y.
5th BIU Winter School

How to Implement Anything in MPC

Speaker: Keller M.
5th BIU Winter School

ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Speaker: Zohner M.
5th BIU Winter School

New Consistency Checks and Implementing Online/Offline Yao

Speaker: Riva B.
5th BIU Winter School

Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge

Speaker: Orlandi C.
4th BIU Winter School

One-Way Functions and Hard Core Predicates

Speaker: Haitner I.
4th BIU Winter School

Pseudorandomness

Speaker: Applebaum B.
4th BIU Winter School

Pseudorandom Functions & Permutations

Speaker: Haitner I.
4th BIU Winter School

Symmetric encryption and MACs

Speaker: Applebaum B.
4th BIU Winter School

Generic Cryptanalytic Attacks

Speaker: Dunkelman O.
4th BIU Winter School

Differential Cryptanalysis

Speaker: Biham E.
4th BIU Winter School

Cryptanalysis of Hash Functions

Speaker: Biham E.
4th BIU Winter School

Related Key-Attacks

Speaker: Dunkelman O.
4th BIU Winter School

Symmetric Encryption – Definitions, Modes and MACs

Speaker: Paterson K.
4th BIU Winter School

Generic Composition & Pitfalls

Speaker: Paterson K.
4th BIU Winter School

Attacks Against Record Layers

Speaker: Paterson K.
4th BIU Winter School

Record Layer Security

Speaker: Paterson K.
4th BIU Winter School

A Contemporary View of Symmetric Encryption

Speaker: Ristenpart T.
4th BIU Winter School

Authenticated Encyption Schemes and Misuse-Resistance

Speaker: Ristenpart T.
4th BIU Winter School

Format-Preserving Encryption and Special Cases

Speaker: Ristenpart T.
4th BIU Winter School

Advanced Symmetric Primitives

Speaker: Ristenpart T.
3rd BIU Winter School

School Overview

Speaker: Boneh D.
3rd BIU Winter School

The Basics of Elliptic Curves

Speaker: Smart N.
3rd BIU Winter School

The Discrete Log Problem on Elliptic Curves

Speaker: Smart N.
3rd BIU Winter School

Applications of Elliptic Curves to Cryptography

Speaker: Smart N.
3rd BIU Winter School

The Basics of Pairings

Speaker: Boneh D.
3rd BIU Winter School

Identity-Based Encryption and Variants

Speaker: Boneh D.
3rd BIU Winter School

Attribute-Based Encryption

Speaker: Bishop Lewko A.
3rd BIU Winter School

Broadcast Encryption and Traitor Tracing

Speaker: Boneh D.
3rd BIU Winter School

Functional Encryption

Speaker: Bishop Lewko A.
3rd BIU Winter School

Non-Interactive Zero Knowledge

Speaker: Groth J.
3rd BIU Winter School

Non-Interactive Zero Knowledge from Pairings

Speaker: Groth J.
3rd BIU Winter School

Anonymous Credentials and eCash

Speaker: Lysyanskaya A.
3rd BIU Winter School

How Pairings Work

Speaker: Hess F.
3rd BIU Winter School

How Pairings Work (cont.)

Speaker: Hess F.
2nd BIU Winter School

Introduction and Basics

Speaker: Regev O.
2nd BIU Winter School

Worst-Case to Average-Case Reduction for SIS

Speaker: Lyubashevsky V.
2nd BIU Winter School

Learning with Errors

Speaker: Peikert C.
2nd BIU Winter School

Basic Cryptanalysis

Speaker: Lyubashevsky V.
2nd BIU Winter School

Cryptanalysis of GGH and NTRU Signatures

Speaker: Regev O.
2nd BIU Winter School

Trapdoors and Applications

Speaker: Peikert C.
2nd BIU Winter School

Ideal Lattices and Applications

Speaker: Lyubashevsky V.
2nd BIU Winter School

Fully Homomorphic Encryption

Speaker: Gentry C.
2nd BIU Winter School

Fully Homomorphic Encryption and the Bootstrapping

Speaker: Gentry C.
2nd BIU Winter School

Fully Homomorphic Encryption

Speaker: Gentry C.
2nd BIU Winter School

Proving Hardness of LWE

Speaker: Regev O.
2nd BIU Winter School

A History of Lattice-Based Encryption

Speaker: Lyubashevsky V.
1st BIU Winter School

Fully Homomorphic Encryption (2)

Speaker: Halevi S.
1st BIU Winter School

Constructions for Specific Functions of Interest

Speaker: Pinkas B.
1st BIU Winter School

Sigma Protocols and Zero Knowledge

Speaker: Lindell Y.
1st BIU Winter School

The Yao Construction and its Proof of Security

Speaker: Lindell Y.
1st BIU Winter School

Fully Homomorphic Encryption (1)

Speaker: Halevi S.
1st BIU Winter School

Secure Computation: Oblivious Transfer

Speaker: Pinkas B.
1st BIU Winter School

The IPS Compiler and Related Construction

Speaker: Ishai Y.
1st BIU Winter School

Efficient Secure Computation with an Honest Majority

Speaker: Ishai Y.
1st BIU Winter School

Two-Party Secure Computation for Malicious Adversaries

Speaker: Lindell Y.
1st BIU Winter School

Unconditionally Secure Multi-Party Computation

Speaker: Pinkas B.
1st BIU Winter School

Secure Computation in the Multi-Party Setting

Speaker: Pinkas B.
1st BIU Winter School

The Yao Construction and Its Proof of Security

Speaker: Lindell Y.