Toggle navigation
Home
About
Members
Research
Research Interests
External Grants
Funded Grants
Programs
Graduate Programs
Undergraduate Programs
Publication Prizes to Students
International Summer Program
Publications
Events
List of events
Events Calendar
Colloquium Seminars
Photos
Videos
Videos
Colloquium seminar - 15/06/2020
Flow Label: Exploiting IPv6 Flow Label
Speaker:
Jonathan Berger
Blockchain and Consensus
Speaker:
Abraham I.
13th BIU Winter School
What are Blockchains and What Are They For?
Speaker:
Dan Boneh
12th BIU Winter School
Function Secret Sharing (part 1)
Speaker:
Elette Boyle
Colloquium seminar - 18/05/2020
SPARKS: Succinct Parallelizable Arguments of Knowledge
Speaker:
Cody Freitag, Cornell Tech
11th BIU Winter School
School Overview
Speaker:
Zvika Brakerski and Nir Bitansky
13th BIU Winter School
An Overview of PoW and PoS Consensus
Speaker:
Valeria Nikolaenko
Colloquium seminar- 04/05/2020
From IP ID to Device ID and KASLR Bypass
Speaker:
Amit Klein
11th BIU Winter School
Crash Course (Part 1A)
Speaker:
Henry Yuen
12th BIU Winter School
Function Secret Sharing (part 2)
Speaker:
Elette Boyle
13th BIU Winter School
An Overview of the Ethereum Execution Layer
Speaker:
Dan Boneh
Colloquium seminar - 27/04/2020
Is Information-Theoretic Topology-Hiding Computation possible?
Speaker:
Ran Cohen
12th BIU Winter School
Function Secret Sharing (part 3)
Speaker:
Elette Boyle
11th BIU Winter School
Crash Course (Part 1B)
Speaker:
Henry Yuen
11th BIU Winter School
Crash Course (Part 2)
Speaker:
Henry Yuen
13th BIU Winter School
CeFi Versus DeFi
Speaker:
Arthur Gervais
12th BIU Winter School
Private Analytics Techniques and Applications (part 1)
Speaker:
Henry Corrigan-Gibbs
10th BIU Winter School
School Overview
Speaker:
Benny Applebaum
11th BIU Winter School
Crash Course (Part 3)
Speaker:
Henry Yuen
13th BIU Winter School
Hard Problems in Blockchains
Speaker:
Valeria Nikolaenko
10th BIU Winter School
Threshold Secret Sharing
Speaker:
Gilad Asharov
12th BIU Winter School
Private Analytics Techniques and Applications (part 2)
Speaker:
Henry Corrigan-Gibbs
12th BIU Winter School
Oblivious RAM (part 1)
Speaker:
Gilad Asharov
11th BIU Winter School
Quantum Key-Distribution (Part 1A)
Speaker:
Rotem Arnon-Friedman
10th BIU Winter School
Threshold Secret Sharing (part 2)
Speaker:
Gilad Asharov
13th BIU Winter School
The Risk of Censorship and De-Anonymization
Speaker:
Arthur Gervais
10th BIU Winter School
Private Information Retrieval part 1
Speaker:
Yuval Ishai
11th BIU Winter School
Quantum Key-Distribution (Part 1B)
Speaker:
Rotem Arnon-Friedman
13th BIU Winter School
What Are Snarks and What Are They Good For?
Speaker:
Dan Boneh
12th BIU Winter School
Oblivious RAM (part 2)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 2
Speaker:
Yuval Ishai
12th BIU Winter School
Oblivious RAM (part 3)
Speaker:
Gilad Asharov
13th BIU Winter School
A Cambrian Explosion of Cryptographic Proofs
Speaker:
Eli Ben-Sasson
11th BIU Winter School
Quantum Key-Distribution (Part 2)
Speaker:
Rotem Arnon-Friedman
10th BIU Winter School
Private Information Retrieval part 3
Speaker:
Klim Efremenko
11th BIU Winter School
Quantum Key-Distribution (Part 3)
Speaker:
Rotem Arnon-Friedman
13th BIU Winter School
Arithmetization – What’s Algebra Got to Do With It? + From Fri to Polynomial Commitment Schemes
Speaker:
Eli Ben-Sasson
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 1)
Speaker:
Peter Scholl
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 2)
Speaker:
Peter Scholl
13th BIU Winter School
Proving Properties of Committed Polynomials, and the Derived Snarks
Speaker:
Dan Boneh
10th BIU Winter School
Private Information Retrieval part 4
Speaker:
Klim Efremenko
11th BIU Winter School
Security Reductions (Part 1)
Speaker:
Mark Zhandry
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 1
Speaker:
Benny Applebaum
11th BIU Winter School
Security Reductions (Part 2)
Speaker:
Mark Zhandry
13th BIU Winter School
How Custom Gates Are Used During Arithmetization
Speaker:
Mary Maller
12th BIU Winter School
Pseudorandom Correlation Generators (part 1)
Speaker:
Yuval Ishai
13th BIU Winter School
A Close Look at a Lookup Argument
Speaker:
Mary Maller
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 2
Speaker:
Benny Applebaum
12th BIU Winter School
Pseudorandom Correlation Generators (part 2)
Speaker:
Yuval Ishai
11th BIU Winter School
Delegation of Quantum Computations (Part 1)
Speaker:
Thomas Vidick
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 3
Speaker:
Benny Applebaum
11th BIU Winter School
Delegation of Quantum Computations (Part 2)
Speaker:
Thomas Vidick
12th BIU Winter School
Introduction to Private Information Retrieval
Speaker:
Dima Kogan
13th BIU Winter School
Permissionless Consensus I
Speaker:
Rafael Pass
10th BIU Winter School
Consensus part 1
Speaker:
Ittai Abraham
13th BIU Winter School
Permissionless Consensus II
Speaker:
Rafael Pass
11th BIU Winter School
Delegation of Quantum Computations (Part 3)
Speaker:
Thomas Vidick
12th BIU Winter School
Offline/Online Private Information Retrieval
Speaker:
Dima Kogan
13th BIU Winter School
Data Availability Sampling, Data Dispersal and Reconstruction
Speaker:
Valeria Nikolaenko
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 1)
Speaker:
Rosario Gennaro
11th BIU Winter School
Security Reductions (Part 3)
Speaker:
Mark Zhandry
10th BIU Winter School
Consensus part 2
Speaker:
Ittai Abraham
10th BIU Winter School
Consensus part 3
Speaker:
Ittai Abraham
13th BIU Winter School
DAG meets BFT & Theory Meets Practice
Speaker:
Alexander Spiegelman
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 2)
Speaker:
Rosario Gennaro
11th BIU Winter School
Quantum Random Oracle (Part 1)
Speaker:
Mark Zhandry
13th BIU Winter School
Decentralized Exchanges, Sandwich, Arbitrage
Speaker:
Arthur Gervais
12th BIU Winter School
Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System
Speaker:
Benny Pinkas
10th BIU Winter School
Consensus part 4
Speaker:
Ittai Abraham
11th BIU Winter School
Quantum Random Oracle (Part 2)
Speaker:
Mark Zhandry
11th BIU Winter School
Quantum Random Oracle (Part 3)
Speaker:
Mark Zhandry
13th BIU Winter School
Lending, Liquidations, Stablecoins
Speaker:
Arthur Gervais
12th BIU Winter School
Private Set Intersection (PSI) – Malicious Security, and Probability Amplification
Speaker:
Benny Pinkas
10th BIU Winter School
Introduction to Secure Multi Party Computation
Speaker:
Yuval Ishai
13th BIU Winter School
MEV and Fair Ordering
Speaker:
Valeria Nikolaenko and Dan Boneh
10th BIU Winter School
Secure Multi Party Computation part 1
Speaker:
Gilad Asharov
12th BIU Winter School
Silent OT and VOLE from LPN
Speaker:
Peter Scholl
10th BIU Winter School
Secure Multi Party Computation part 2
Speaker:
Yuval Ishai
12th BIU Winter School
Pseudorandom Correlation Functions from Paillier
Speaker:
Peter Scholl
13th BIU Winter School
DeFi Attacks
Speaker:
Arthur Gervais
13th BIU Winter School
Building Blockchain Wallets – Challenges and Solutions
Speaker:
Yehuda Lindell
10th BIU Winter School
Secure Multi Party Computation part 3
Speaker:
Yuval Ishai
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes – part 3
Speaker:
Rosario Gennaro
13th BIU Winter School
Building Blockchain Wallets – Technical Details
Speaker:
Yehuda Lindell
12th BIU Winter School
Threshold Signatures – RSA Signatures
Speaker:
Rosario Gennaro
10th BIU Winter School
Fully Linear PCPs and Their Cryptographic Applications
Speaker:
Niv Gilboa
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 1
Speaker:
Benny Applebaum
12th BIU Winter School
Threshold Signatures – Quantum Resistant Schemes
Speaker:
Rosario Gennaro
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 2
Speaker:
Benny Applebaum
Hacking Deep Learning 2
Cryptopraphy for Privacy- Preserving Machine Learning
Speaker:
Morten Dahl
Hacking Deep Learning 2
Learning with Perturbations
Speaker:
Tamir Hazan
Hacking Deep Learning 2
Privacy-Preserving Data Analysis:Proofs,Algorithms,and Systems
Speaker:
Adria Gascon
Hacking Deep Learning 2
Tutorial on Adversrial Machine Learning
Speaker:
Battista Biggio
Winter schools video clip
Speaker:
9th BIU Winter School
Introduction to Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
Zero Knowledge for All NP
Speaker:
Alon Rosen
A General Introduction to Secure Multiparty Computation
Speaker:
Lindell Y.
9th BIU Winter School
Proofs of Knowledge
Speaker:
Yehuda lindell
Adversarial Examples
Speaker:
Baruch M
9th BIU Winter School
Constant-Round Zero Knowledge Proofs
Speaker:
Alon Rosen
Alternative cryptocurrencies
Speaker:
Dziembowski S
9th BIU Winter School
Witness Indistinguishability and Constant-Round Arguments
Speaker:
Alon Rosen
Alternative Cryptocurrencies (cont.)
Speaker:
Dziembowski S
9th BIU Winter School
Non-Interactive Zero Knowledge
Speaker:
Ron Rothblum
Automated Analysis of TLS 1.3
Speaker:
Van der Merwe T
9th BIU Winter School
The Fiat-Shamir Transform
Speaker:
Ron Rothblum
Center Open Day- 2016
Speaker:
9th BIU Winter School
Lower Bounds and Limitations on Zero Knowledge
Speaker:
Alon Rosen
Deep Learning in the Land of Adversity: Attacks, Defenses and Beyond
Speaker:
Moustapha Cisse
9th BIU Winter School
Non Black-Box Zero Knowledge
Speaker:
Alon Rosen
DeepCAPTCHA- Protection Mechanisms Based on Adversarial Example
Speaker:
Rita Osadchy
9th BIU Winter School
New Directions and/or Advanced Topics in the Foundations of Zero Knowledge
Speaker:
Ron Rothblum
Differential Privacy and Collaborative Learning
Speaker:
Anand Sarwate
9th BIU Winter School
Sigma Protocols (part1)
Speaker:
Benny Pinkas
DROWN: Breaking TLS using SSLv2
Speaker:
Aviram N
9th BIU Winter School
Zero Knowledge for Sudoku
Speaker:
Benny Pinkas
Fake news spreading in Social Networks
Speaker:
Levy O
9th BIU Winter School
Sigma Protocols (part 2)
Speaker:
Benny Pinkas
Introduction
Speaker:
Dziembowski S
9th BIU Winter School
MPC in the Head – Compilers for Zero Knowledge
Speaker:
Yuval Ishai
9th BIU Winter School
ZK from MPC: Constructions and Applications
Speaker:
Carmit Hazay
Introduction (cont.)
Speaker:
Dziembowski S
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 2)
Speaker:
Jens Groth
Mining Pools and Attacks
Speaker:
Dziembowski S
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 3)
Speaker:
Jens Groth
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part1)
Speaker:
Jens Groth
Mining Pools and Attacks (cont.)
Speaker:
Dziembowski S
9th BIU Winter School
Short ZK – SNARKs STARKs (part 1)
Speaker:
Eli Ben- Sasson
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
Speaker:
Jager T
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 2)
Speaker:
Eli Ben- Sasson
On the Security of TLS-DHE in the Standard Model
Speaker:
Jager T
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 3)
Speaker:
Eli Ben- Sasson
Open Day- 2017
Speaker:
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 4)
Speaker:
Eli Ben- Sasson
Security and Privacy in Machine Learning
Speaker:
Nicolas Papernot
Security Research In Action
Speaker:
Barak A
Smart contracts and applications
Speaker:
Dziembowski S
Smart Contracts and Applications (cont.)
Speaker:
Dziembowski S
TLS: Past , Present , Future
Speaker:
Van Der Merwe T
What is in the Human Voice? Profiling Humans from Their Voice
Speaker:
Rita Singh
7th BIU Winter School
The Anonymization/ De-identification Paradigm
Speaker:
Shmatikov V.
8th BIU Winter School
What Are Key Exchange Protocols?
Speaker:
Hugo Krawczyk
8th BIU Winter School
Overview of Security Definitions
Speaker:
Hugo Krawczyk
7th BIU Winter School
Re-identification Attacks
Speaker:
Shmatikov V.
8th BIU Winter School
Diffie- Hellman Protocols and Authenticators
Speaker:
Hugo Krawczyk
7th BIU Winter School
Inference Attacks
Speaker:
Shmatikov V.
7th BIU Winter School
Introduction to Differential Privacy, Randomizaed Response, Basic Properties
Speaker:
Ligett K.
8th BIU Winter School
STS, SIGMA and IKA (IPsec’s Key Exchange)
Speaker:
Hugo Krawczyk
7th BIU Winter School
Basic Tools- Laplace Mechanism, Exponential Mechanism
Speaker:
Ligett K.
8th BIU Winter School
Implicitly Authenticated KEPs
Speaker:
Hugo Krawczyk
8th BIU Winter School
More on Implicit Authentication; Key Derivation
Speaker:
Hugo Krawczyk
7th BIU Winter School
Private Data Release
Speaker:
Ligett K.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (passive adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Packing Argument
Speaker:
Ullman J.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (active adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Reconstruction Attacks
Speaker:
Ullman J.
7th BIU Winter School
Advanced Tools: Tree Algorithm, Advanced Composition
Speaker:
Nissim K.
8th BIU Winter School
Forward Secrecy
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Sparse Vector
Speaker:
Ligett K.
8th BIU Winter School
TLS 1.3 and other protocols
Speaker:
Fischlin M
7th BIU Winter School
Private Multiplicative Weights
Speaker:
Ullman J.
8th BIU Winter School
Zero Round-Trip Time (0-RTT)
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism
Speaker:
Smith A.
8th BIU Winter School
Universally Composable Key Exchange
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Fingerprinting Codes
Speaker:
Ullman J.
8th BIU Winter School
Man-in-the-Middle Attacks on Authenticated Key Exchange
Speaker:
Bhargavan K
8th BIU Winter School
Downgrade Attacks on Agile Real-World Protocols
Speaker:
Bhargavan K
7th BIU Winter School
Local Algorithms
Speaker:
Smith A.
8th BIU Winter School
Automated Symbolic Protocol Verification
Speaker:
Bhargavan K
7th BIU Winter School
Privacy- What It Is and What It Isn’t?
Speaker:
Shmatikov V.
8th BIU Winter School
Mechanized Computational Protocol Proofs
Speaker:
Bhargavan K
7th BIU Winter School
Privacy Meets Machine Learning
Speaker:
Shmatikov V.
7th BIU Winter School
Generalization and Privacy
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Libraries
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 1
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Protocol Implementations
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 2
Speaker:
Nissim K.
7th BIU Winter School
Private ERM
Speaker:
Smith A.
7th BIU Winter School
Privacy and Statistics
Speaker:
Smith A.
7th BIU Winter School
Tracing Attacks 1
Speaker:
Ullman J.
7th BIU Winter School
Tracing Attacks 2
Speaker:
Ullman J.
7th BIU Winter School
Analyzing Graphs
Speaker:
Smith A.
7th BIU Winter School
Privacy and Game Theory 1
Speaker:
Ligett K.
7th BIU Winter School
Privacy and Game Theory 2
Speaker:
Ligett K.
6th BIU Winter School
Introduction and Overview of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 1
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 2
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 3
Speaker:
Kalai Y.
6th BIU Winter School
Interactive Arguments with Preprocessing
Speaker:
Walfish M.
6th BIU Winter School
SNARKs with Preprocessing
Speaker:
Tromer E.
6th BIU Winter School
Interactive Proofs and Program Representations 1
Speaker:
Walfish M.
6th BIU Winter School
Program Representations 2
Speaker:
Tromer E.
6th BIU Winter School
SNARKs (Without Preprocessing) and Their Applications
Speaker:
Tromer E.
6th BIU Winter School
Additional Applications and Summary of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Introduction to Searchable Encryption (models and motivation)
Speaker:
Boldyreva A.
6th BIU Winter School
Format-Preserving Encryption 1
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 2
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 3
Speaker:
Weiss M.
6th BIU Winter School
Order-Preserving Encryption 1
Speaker:
Boldyreva A.
6th BIU Winter School
Order-Preserving Encryption 2
Speaker:
Boldyreva A.
13th BIU Winter School
Colloquium seminars
Events
Open Day
Prof. Benny Pinkas
Prof. Yehuda Lindell
Winter Schools
10th BIU Winter School
11th BIU Winter School on Cryptography
12th BIU Winter School
13th BIU Winter School
1st BIU Winter School
2nd BIU Winter School
3rd BIU Winter School
4th BIU Winter School
5th BIU Winter School
6th BIU Winter School
7th BIU Winter School
8th BIU Winter School
9th BIU Winter School
Workshops
Bitcoin
Hacking Deep Learning
Hacking Deep Learning 2
TLS Security