Videos

Colloquium seminar - 15/06/2020

Flow Label: Exploiting IPv6 Flow Label

Speaker: Jonathan Berger

Blockchain and Consensus

Speaker: Abraham I.
13th BIU Winter School

What are Blockchains and What Are They For?

Speaker: Dan Boneh
12th BIU Winter School

Function Secret Sharing (part 1)

Speaker: Elette Boyle
Colloquium seminar - 18/05/2020

SPARKS: Succinct Parallelizable Arguments of Knowledge

Speaker: Cody Freitag, Cornell Tech
11th BIU Winter School

School Overview

Speaker: Zvika Brakerski and Nir Bitansky
13th BIU Winter School

An Overview of PoW and PoS Consensus

Speaker: Valeria Nikolaenko
Colloquium seminar- 04/05/2020

From IP ID to Device ID and KASLR Bypass

Speaker: Amit Klein
11th BIU Winter School

Crash Course (Part 1A)

Speaker: Henry Yuen
12th BIU Winter School

Function Secret Sharing (part 2)

Speaker: Elette Boyle
13th BIU Winter School

An Overview of the Ethereum Execution Layer

Speaker: Dan Boneh
Colloquium seminar - 27/04/2020

Is Information-Theoretic Topology-Hiding Computation possible?

Speaker: Ran Cohen
12th BIU Winter School

Function Secret Sharing (part 3)

Speaker: Elette Boyle
11th BIU Winter School

Crash Course (Part 1B)

Speaker: Henry Yuen
11th BIU Winter School

Crash Course (Part 2)

Speaker: Henry Yuen
13th BIU Winter School

CeFi Versus DeFi

Speaker: Arthur Gervais
12th BIU Winter School

Private Analytics Techniques and Applications (part 1)

Speaker: Henry Corrigan-Gibbs
10th BIU Winter School

School Overview

Speaker: Benny Applebaum
11th BIU Winter School

Crash Course (Part 3)

Speaker: Henry Yuen
13th BIU Winter School

Hard Problems in Blockchains

Speaker: Valeria Nikolaenko
10th BIU Winter School

Threshold Secret Sharing

Speaker: Gilad Asharov
12th BIU Winter School

Private Analytics Techniques and Applications (part 2)

Speaker: Henry Corrigan-Gibbs
12th BIU Winter School

Oblivious RAM (part 1)

Speaker: Gilad Asharov
11th BIU Winter School

Quantum Key-Distribution (Part 1A)

Speaker: Rotem Arnon-Friedman
10th BIU Winter School

Threshold Secret Sharing (part 2)

Speaker: Gilad Asharov
13th BIU Winter School

The Risk of Censorship and De-Anonymization

Speaker: Arthur Gervais
10th BIU Winter School

Private Information Retrieval part 1

Speaker: Yuval Ishai
11th BIU Winter School

Quantum Key-Distribution (Part 1B)

Speaker: Rotem Arnon-Friedman
13th BIU Winter School

What Are Snarks and What Are They Good For?

Speaker: Dan Boneh
12th BIU Winter School

Oblivious RAM (part 2)

Speaker: Gilad Asharov
10th BIU Winter School

Private Information Retrieval part 2

Speaker: Yuval Ishai
12th BIU Winter School

Oblivious RAM (part 3)

Speaker: Gilad Asharov
13th BIU Winter School

A Cambrian Explosion of Cryptographic Proofs

Speaker: Eli Ben-Sasson
11th BIU Winter School

Quantum Key-Distribution (Part 2)

Speaker: Rotem Arnon-Friedman
10th BIU Winter School

Private Information Retrieval part 3

Speaker: Klim Efremenko
11th BIU Winter School

Quantum Key-Distribution (Part 3)

Speaker: Rotem Arnon-Friedman
13th BIU Winter School

Arithmetization – What’s Algebra Got to Do With It? + From Fri to Polynomial Commitment Schemes

Speaker: Eli Ben-Sasson
12th BIU Winter School

Vector Oblivious Linear Evaluation (part 1)

Speaker: Peter Scholl
12th BIU Winter School

Vector Oblivious Linear Evaluation (part 2)

Speaker: Peter Scholl
13th BIU Winter School

Proving Properties of Committed Polynomials, and the Derived Snarks

Speaker: Dan Boneh
10th BIU Winter School

Private Information Retrieval part 4

Speaker: Klim Efremenko
11th BIU Winter School

Security Reductions (Part 1)

Speaker: Mark Zhandry
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 1

Speaker: Benny Applebaum
11th BIU Winter School

Security Reductions (Part 2)

Speaker: Mark Zhandry
13th BIU Winter School

How Custom Gates Are Used During Arithmetization

Speaker: Mary Maller
12th BIU Winter School

Pseudorandom Correlation Generators (part 1)

Speaker: Yuval Ishai
13th BIU Winter School

A Close Look at a Lookup Argument

Speaker: Mary Maller
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 2

Speaker: Benny Applebaum
12th BIU Winter School

Pseudorandom Correlation Generators (part 2)

Speaker: Yuval Ishai
11th BIU Winter School

Delegation of Quantum Computations (Part 1)

Speaker: Thomas Vidick
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 3

Speaker: Benny Applebaum
11th BIU Winter School

Delegation of Quantum Computations (Part 2)

Speaker: Thomas Vidick
12th BIU Winter School

Introduction to Private Information Retrieval

Speaker: Dima Kogan
13th BIU Winter School

Permissionless Consensus I

Speaker: Rafael Pass
10th BIU Winter School

Consensus part 1

Speaker: Ittai Abraham
13th BIU Winter School

Permissionless Consensus II

Speaker: Rafael Pass
11th BIU Winter School

Delegation of Quantum Computations (Part 3)

Speaker: Thomas Vidick
12th BIU Winter School

Offline/Online Private Information Retrieval

Speaker: Dima Kogan
13th BIU Winter School

Data Availability Sampling, Data Dispersal and Reconstruction

Speaker: Valeria Nikolaenko
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes (part 1)

Speaker: Rosario Gennaro
11th BIU Winter School

Security Reductions (Part 3)

Speaker: Mark Zhandry
10th BIU Winter School

Consensus part 2

Speaker: Ittai Abraham
10th BIU Winter School

Consensus part 3

Speaker: Ittai Abraham
13th BIU Winter School

DAG meets BFT & Theory Meets Practice

Speaker: Alexander Spiegelman
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes (part 2)

Speaker: Rosario Gennaro
11th BIU Winter School

Quantum Random Oracle (Part 1)

Speaker: Mark Zhandry
13th BIU Winter School

Decentralized Exchanges, Sandwich, Arbitrage

Speaker: Arthur Gervais
12th BIU Winter School

Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System

Speaker: Benny Pinkas
10th BIU Winter School

Consensus part 4

Speaker: Ittai Abraham
11th BIU Winter School

Quantum Random Oracle (Part 2)

Speaker: Mark Zhandry
11th BIU Winter School

Quantum Random Oracle (Part 3)

Speaker: Mark Zhandry
13th BIU Winter School

Lending, Liquidations, Stablecoins

Speaker: Arthur Gervais
12th BIU Winter School

Private Set Intersection (PSI) – Malicious Security, and Probability Amplification

Speaker: Benny Pinkas
10th BIU Winter School

Introduction to Secure Multi Party Computation

Speaker: Yuval Ishai
13th BIU Winter School

MEV and Fair Ordering

Speaker: Valeria Nikolaenko and Dan Boneh
10th BIU Winter School

Secure Multi Party Computation part 1

Speaker: Gilad Asharov
12th BIU Winter School

Silent OT and VOLE from LPN

Speaker: Peter Scholl
10th BIU Winter School

Secure Multi Party Computation part 2

Speaker: Yuval Ishai
12th BIU Winter School

Pseudorandom Correlation Functions from Paillier

Speaker: Peter Scholl
13th BIU Winter School

DeFi Attacks

Speaker: Arthur Gervais
13th BIU Winter School

Building Blockchain Wallets – Challenges and Solutions

Speaker: Yehuda Lindell
10th BIU Winter School

Secure Multi Party Computation part 3

Speaker: Yuval Ishai
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes – part 3

Speaker: Rosario Gennaro
13th BIU Winter School

Building Blockchain Wallets – Technical Details

Speaker: Yehuda Lindell
12th BIU Winter School

Threshold Signatures – RSA Signatures

Speaker: Rosario Gennaro
10th BIU Winter School

Fully Linear PCPs and Their Cryptographic Applications

Speaker: Niv Gilboa
10th BIU Winter School

Randomized Encoding of Functions and Constant Round MPC part 1

Speaker: Benny Applebaum
12th BIU Winter School

Threshold Signatures – Quantum Resistant Schemes

Speaker: Rosario Gennaro
10th BIU Winter School

Randomized Encoding of Functions and Constant Round MPC part 2

Speaker: Benny Applebaum
Hacking Deep Learning 2

Cryptopraphy for Privacy- Preserving Machine Learning

Speaker: Morten Dahl
Hacking Deep Learning 2

Learning with Perturbations

Speaker: Tamir Hazan
Hacking Deep Learning 2

Privacy-Preserving Data Analysis:Proofs,Algorithms,and Systems

Speaker: Adria Gascon
Hacking Deep Learning 2

Tutorial on Adversrial Machine Learning

Speaker: Battista Biggio

Winter schools video clip

Speaker:
9th BIU Winter School

Introduction to Zero Knowledge

Speaker: Alon Rosen
9th BIU Winter School

Zero Knowledge for All NP

Speaker: Alon Rosen

A General Introduction to Secure Multiparty Computation

Speaker: Lindell Y.
9th BIU Winter School

Proofs of Knowledge

Speaker: Yehuda lindell

Adversarial Examples

Speaker: Baruch M
9th BIU Winter School

Constant-Round Zero Knowledge Proofs

Speaker: Alon Rosen

Alternative cryptocurrencies

Speaker: Dziembowski S
9th BIU Winter School

Witness Indistinguishability and Constant-Round Arguments

Speaker: Alon Rosen

Alternative Cryptocurrencies (cont.)

Speaker: Dziembowski S
9th BIU Winter School

Non-Interactive Zero Knowledge

Speaker: Ron Rothblum

Automated Analysis of TLS 1.3

Speaker: Van der Merwe T
9th BIU Winter School

The Fiat-Shamir Transform

Speaker: Ron Rothblum

Center Open Day- 2016

Speaker:
9th BIU Winter School

Lower Bounds and Limitations on Zero Knowledge

Speaker: Alon Rosen

Deep Learning in the Land of Adversity: Attacks, Defenses and Beyond

Speaker: Moustapha Cisse
9th BIU Winter School

Non Black-Box Zero Knowledge

Speaker: Alon Rosen

DeepCAPTCHA- Protection Mechanisms Based on Adversarial Example

Speaker: Rita Osadchy
9th BIU Winter School

New Directions and/or Advanced Topics in the Foundations of Zero Knowledge

Speaker: Ron Rothblum

Differential Privacy and Collaborative Learning

Speaker: Anand Sarwate
9th BIU Winter School

Sigma Protocols (part1)

Speaker: Benny Pinkas

DROWN: Breaking TLS using SSLv2

Speaker: Aviram N
9th BIU Winter School

Zero Knowledge for Sudoku

Speaker: Benny Pinkas

Fake news spreading in Social Networks

Speaker: Levy O
9th BIU Winter School

Sigma Protocols (part 2)

Speaker: Benny Pinkas

Introduction

Speaker: Dziembowski S
9th BIU Winter School

MPC in the Head – Compilers for Zero Knowledge

Speaker: Yuval Ishai
9th BIU Winter School

ZK from MPC: Constructions and Applications

Speaker: Carmit Hazay

Introduction (cont.)

Speaker: Dziembowski S
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part 2)

Speaker: Jens Groth

Mining Pools and Attacks

Speaker: Dziembowski S
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part 3)

Speaker: Jens Groth
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part1)

Speaker: Jens Groth

Mining Pools and Attacks (cont.)

Speaker: Dziembowski S
9th BIU Winter School

Short ZK – SNARKs STARKs (part 1)

Speaker: Eli Ben- Sasson

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Speaker: Jager T
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 2)

Speaker: Eli Ben- Sasson

On the Security of TLS-DHE in the Standard Model

Speaker: Jager T
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 3)

Speaker: Eli Ben- Sasson

Open Day- 2017

Speaker:
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 4)

Speaker: Eli Ben- Sasson

Security and Privacy in Machine Learning

Speaker: Nicolas Papernot

Security Research In Action

Speaker: Barak A

Smart contracts and applications

Speaker: Dziembowski S

Smart Contracts and Applications (cont.)

Speaker: Dziembowski S

TLS: Past , Present , Future

Speaker: Van Der Merwe T

What is in the Human Voice? Profiling Humans from Their Voice

Speaker: Rita Singh
7th BIU Winter School

The Anonymization/ De-identification Paradigm

Speaker: Shmatikov V.
8th BIU Winter School

What Are Key Exchange Protocols?

Speaker: Hugo Krawczyk
8th BIU Winter School

Overview of Security Definitions

Speaker: Hugo Krawczyk
7th BIU Winter School

Re-identification Attacks

Speaker: Shmatikov V.
8th BIU Winter School

Diffie- Hellman Protocols and Authenticators

Speaker: Hugo Krawczyk
7th BIU Winter School

Inference Attacks

Speaker: Shmatikov V.
7th BIU Winter School

Introduction to Differential Privacy, Randomizaed Response, Basic Properties

Speaker: Ligett K.
8th BIU Winter School

STS, SIGMA and IKA (IPsec’s Key Exchange)

Speaker: Hugo Krawczyk
7th BIU Winter School

Basic Tools- Laplace Mechanism, Exponential Mechanism

Speaker: Ligett K.
8th BIU Winter School

Implicitly Authenticated KEPs

Speaker: Hugo Krawczyk
8th BIU Winter School

More on Implicit Authentication; Key Derivation

Speaker: Hugo Krawczyk
7th BIU Winter School

Private Data Release

Speaker: Ligett K.
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (passive adversaries)

Speaker: Fischlin M
7th BIU Winter School

Lowerbound Techniques: Packing Argument

Speaker: Ullman J.
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (active adversaries)

Speaker: Fischlin M
7th BIU Winter School

Reconstruction Attacks

Speaker: Ullman J.
7th BIU Winter School

Advanced Tools: Tree Algorithm, Advanced Composition

Speaker: Nissim K.
8th BIU Winter School

Forward Secrecy

Speaker: Fischlin M
7th BIU Winter School

Advanced Tools- Sparse Vector

Speaker: Ligett K.
8th BIU Winter School

TLS 1.3 and other protocols

Speaker: Fischlin M
7th BIU Winter School

Private Multiplicative Weights

Speaker: Ullman J.
8th BIU Winter School

Zero Round-Trip Time (0-RTT)

Speaker: Fischlin M
7th BIU Winter School

Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism

Speaker: Smith A.
8th BIU Winter School

Universally Composable Key Exchange

Speaker: Fischlin M
7th BIU Winter School

Lowerbound Techniques: Fingerprinting Codes

Speaker: Ullman J.
8th BIU Winter School

Man-in-the-Middle Attacks on Authenticated Key Exchange

Speaker: Bhargavan K
8th BIU Winter School

Downgrade Attacks on Agile Real-World Protocols

Speaker: Bhargavan K
7th BIU Winter School

Local Algorithms

Speaker: Smith A.
8th BIU Winter School

Automated Symbolic Protocol Verification

Speaker: Bhargavan K
7th BIU Winter School

Privacy- What It Is and What It Isn’t?

Speaker: Shmatikov V.
8th BIU Winter School

Mechanized Computational Protocol Proofs

Speaker: Bhargavan K
7th BIU Winter School

Privacy Meets Machine Learning

Speaker: Shmatikov V.
7th BIU Winter School

Generalization and Privacy

Speaker: Nissim K.
8th BIU Winter School

Verified Cryptographic Libraries

Speaker: Bhargavan K
7th BIU Winter School

Private Learning 1

Speaker: Nissim K.
8th BIU Winter School

Verified Cryptographic Protocol Implementations

Speaker: Bhargavan K
7th BIU Winter School

Private Learning 2

Speaker: Nissim K.
7th BIU Winter School

Private ERM

Speaker: Smith A.
7th BIU Winter School

Privacy and Statistics

Speaker: Smith A.
7th BIU Winter School

Tracing Attacks 1

Speaker: Ullman J.
7th BIU Winter School

Tracing Attacks 2

Speaker: Ullman J.
7th BIU Winter School

Analyzing Graphs

Speaker: Smith A.
7th BIU Winter School

Privacy and Game Theory 1

Speaker: Ligett K.
7th BIU Winter School

Privacy and Game Theory 2

Speaker: Ligett K.
6th BIU Winter School

Introduction and Overview of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 1

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 2

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 3

Speaker: Kalai Y.
6th BIU Winter School

Interactive Arguments with Preprocessing

Speaker: Walfish M.
6th BIU Winter School

SNARKs with Preprocessing

Speaker: Tromer E.
6th BIU Winter School

Interactive Proofs and Program Representations 1

Speaker: Walfish M.
6th BIU Winter School

Program Representations 2

Speaker: Tromer E.
6th BIU Winter School

SNARKs (Without Preprocessing) and Their Applications

Speaker: Tromer E.
6th BIU Winter School

Additional Applications and Summary of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Introduction to Searchable Encryption (models and motivation)

Speaker: Boldyreva A.
6th BIU Winter School

Format-Preserving Encryption 1

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 2

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 3

Speaker: Weiss M.
6th BIU Winter School

Order-Preserving Encryption 1

Speaker: Boldyreva A.
6th BIU Winter School

Order-Preserving Encryption 2

Speaker: Boldyreva A.