Toggle navigation
Home
About
Members
Research
Research Interests
External Grants
Funded Grants
Programs
Graduate Programs
Undergraduate Programs
Publication Prizes to Students
International Summer Program
Publications
Events
List of events
Events Calendar
Colloquium Seminars
Photos
Videos
Winter Schools
11th BIU Winter School
School Overview
Speaker:
Zvika Brakerski and Nir Bitansky
12th BIU Winter School
Function Secret Sharing (part 1)
Speaker:
Elette Boyle
11th BIU Winter School
Crash Course (Part 1A)
Speaker:
Henry Yuen
12th BIU Winter School
Function Secret Sharing (part 2)
Speaker:
Elette Boyle
11th BIU Winter School
Crash Course (Part 1B)
Speaker:
Henry Yuen
12th BIU Winter School
Function Secret Sharing (part 3)
Speaker:
Elette Boyle
11th BIU Winter School
Crash Course (Part 2)
Speaker:
Henry Yuen
12th BIU Winter School
Private Analytics Techniques and Applications (part 1)
Speaker:
Henry Corrigan-Gibbs
10th BIU Winter School
School Overview
Speaker:
Benny Applebaum
11th BIU Winter School
Crash Course (Part 3)
Speaker:
Henry Yuen
12th BIU Winter School
Private Analytics Techniques and Applications (part 2)
Speaker:
Henry Corrigan-Gibbs
10th BIU Winter School
Threshold Secret Sharing
Speaker:
Gilad Asharov
11th BIU Winter School
Quantum Key-Distribution (Part 1A)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 1)
Speaker:
Gilad Asharov
10th BIU Winter School
Threshold Secret Sharing (part 2)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 1
Speaker:
Yuval Ishai
11th BIU Winter School
Quantum Key-Distribution (Part 1B)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 2)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 2
Speaker:
Yuval Ishai
11th BIU Winter School
Quantum Key-Distribution (Part 2)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 3)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 3
Speaker:
Klim Efremenko
11th BIU Winter School
Quantum Key-Distribution (Part 3)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 1)
Speaker:
Peter Scholl
10th BIU Winter School
Private Information Retrieval part 4
Speaker:
Klim Efremenko
11th BIU Winter School
Security Reductions (Part 1)
Speaker:
Mark Zhandry
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 2)
Speaker:
Peter Scholl
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 1
Speaker:
Benny Applebaum
11th BIU Winter School
Security Reductions (Part 2)
Speaker:
Mark Zhandry
12th BIU Winter School
Pseudorandom Correlation Generators (part 1)
Speaker:
Yuval Ishai
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 2
Speaker:
Benny Applebaum
11th BIU Winter School
Delegation of Quantum Computations (Part 1)
Speaker:
Thomas Vidick
12th BIU Winter School
Pseudorandom Correlation Generators (part 2)
Speaker:
Yuval Ishai
12th BIU Winter School
Introduction to Private Information Retrieval
Speaker:
Dima Kogan
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 3
Speaker:
Benny Applebaum
11th BIU Winter School
Delegation of Quantum Computations (Part 2)
Speaker:
Thomas Vidick
12th BIU Winter School
Offline/Online Private Information Retrieval
Speaker:
Dima Kogan
10th BIU Winter School
Consensus part 1
Speaker:
Ittai Abraham
11th BIU Winter School
Delegation of Quantum Computations (Part 3)
Speaker:
Thomas Vidick
11th BIU Winter School
Security Reductions (Part 3)
Speaker:
Mark Zhandry
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 1)
Speaker:
Rosario Gennaro
10th BIU Winter School
Consensus part 2
Speaker:
Ittai Abraham
11th BIU Winter School
Quantum Random Oracle (Part 1)
Speaker:
Mark Zhandry
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 2)
Speaker:
Rosario Gennaro
10th BIU Winter School
Consensus part 3
Speaker:
Ittai Abraham
11th BIU Winter School
Quantum Random Oracle (Part 2)
Speaker:
Mark Zhandry
12th BIU Winter School
Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System
Speaker:
Benny Pinkas
10th BIU Winter School
Consensus part 4
Speaker:
Ittai Abraham
11th BIU Winter School
Quantum Random Oracle (Part 3)
Speaker:
Mark Zhandry
12th BIU Winter School
Private Set Intersection (PSI) – Malicious Security, and Probability Amplification
Speaker:
Benny Pinkas
10th BIU Winter School
Introduction to Secure Multi Party Computation
Speaker:
Yuval Ishai
12th BIU Winter School
Silent OT and VOLE from LPN
Speaker:
Peter Scholl
10th BIU Winter School
Secure Multi Party Computation part 1
Speaker:
Gilad Asharov
12th BIU Winter School
Pseudorandom Correlation Functions from Paillier
Speaker:
Peter Scholl
10th BIU Winter School
Secure Multi Party Computation part 2
Speaker:
Yuval Ishai
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes – part 3
Speaker:
Rosario Gennaro
10th BIU Winter School
Secure Multi Party Computation part 3
Speaker:
Yuval Ishai
12th BIU Winter School
Threshold Signatures – RSA Signatures
Speaker:
Rosario Gennaro
10th BIU Winter School
Fully Linear PCPs and Their Cryptographic Applications
Speaker:
Niv Gilboa
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 1
Speaker:
Benny Applebaum
12th BIU Winter School
Threshold Signatures – Quantum Resistant Schemes
Speaker:
Rosario Gennaro
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 2
Speaker:
Benny Applebaum
Winter schools video clip
Speaker:
9th BIU Winter School
Introduction to Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
Zero Knowledge for All NP
Speaker:
Alon Rosen
9th BIU Winter School
Proofs of Knowledge
Speaker:
Yehuda lindell
9th BIU Winter School
Constant-Round Zero Knowledge Proofs
Speaker:
Alon Rosen
9th BIU Winter School
Witness Indistinguishability and Constant-Round Arguments
Speaker:
Alon Rosen
9th BIU Winter School
Non-Interactive Zero Knowledge
Speaker:
Ron Rothblum
9th BIU Winter School
The Fiat-Shamir Transform
Speaker:
Ron Rothblum
9th BIU Winter School
Lower Bounds and Limitations on Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
Non Black-Box Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
New Directions and/or Advanced Topics in the Foundations of Zero Knowledge
Speaker:
Ron Rothblum
9th BIU Winter School
Sigma Protocols (part1)
Speaker:
Benny Pinkas
9th BIU Winter School
Zero Knowledge for Sudoku
Speaker:
Benny Pinkas
9th BIU Winter School
Sigma Protocols (part 2)
Speaker:
Benny Pinkas
9th BIU Winter School
MPC in the Head – Compilers for Zero Knowledge
Speaker:
Yuval Ishai
9th BIU Winter School
ZK from MPC: Constructions and Applications
Speaker:
Carmit Hazay
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 2)
Speaker:
Jens Groth
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 3)
Speaker:
Jens Groth
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part1)
Speaker:
Jens Groth
9th BIU Winter School
Short ZK – SNARKs STARKs (part 1)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 2)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 3)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 4)
Speaker:
Eli Ben- Sasson
7th BIU Winter School
The Anonymization/ De-identification Paradigm
Speaker:
Shmatikov V.
8th BIU Winter School
What Are Key Exchange Protocols?
Speaker:
Hugo Krawczyk
8th BIU Winter School
Overview of Security Definitions
Speaker:
Hugo Krawczyk
7th BIU Winter School
Re-identification Attacks
Speaker:
Shmatikov V.
8th BIU Winter School
Diffie- Hellman Protocols and Authenticators
Speaker:
Hugo Krawczyk
7th BIU Winter School
Inference Attacks
Speaker:
Shmatikov V.
7th BIU Winter School
Introduction to Differential Privacy, Randomizaed Response, Basic Properties
Speaker:
Ligett K.
8th BIU Winter School
STS, SIGMA and IKA (IPsec’s Key Exchange)
Speaker:
Hugo Krawczyk
7th BIU Winter School
Basic Tools- Laplace Mechanism, Exponential Mechanism
Speaker:
Ligett K.
8th BIU Winter School
Implicitly Authenticated KEPs
Speaker:
Hugo Krawczyk
8th BIU Winter School
More on Implicit Authentication; Key Derivation
Speaker:
Hugo Krawczyk
7th BIU Winter School
Private Data Release
Speaker:
Ligett K.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (passive adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Packing Argument
Speaker:
Ullman J.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (active adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Reconstruction Attacks
Speaker:
Ullman J.
7th BIU Winter School
Advanced Tools: Tree Algorithm, Advanced Composition
Speaker:
Nissim K.
8th BIU Winter School
Forward Secrecy
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Sparse Vector
Speaker:
Ligett K.
8th BIU Winter School
TLS 1.3 and other protocols
Speaker:
Fischlin M
7th BIU Winter School
Private Multiplicative Weights
Speaker:
Ullman J.
8th BIU Winter School
Zero Round-Trip Time (0-RTT)
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism
Speaker:
Smith A.
8th BIU Winter School
Universally Composable Key Exchange
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Fingerprinting Codes
Speaker:
Ullman J.
8th BIU Winter School
Man-in-the-Middle Attacks on Authenticated Key Exchange
Speaker:
Bhargavan K
8th BIU Winter School
Downgrade Attacks on Agile Real-World Protocols
Speaker:
Bhargavan K
7th BIU Winter School
Local Algorithms
Speaker:
Smith A.
8th BIU Winter School
Automated Symbolic Protocol Verification
Speaker:
Bhargavan K
7th BIU Winter School
Privacy- What It Is and What It Isn’t?
Speaker:
Shmatikov V.
8th BIU Winter School
Mechanized Computational Protocol Proofs
Speaker:
Bhargavan K
7th BIU Winter School
Privacy Meets Machine Learning
Speaker:
Shmatikov V.
7th BIU Winter School
Generalization and Privacy
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Libraries
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 1
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Protocol Implementations
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 2
Speaker:
Nissim K.
7th BIU Winter School
Private ERM
Speaker:
Smith A.
7th BIU Winter School
Privacy and Statistics
Speaker:
Smith A.
7th BIU Winter School
Tracing Attacks 1
Speaker:
Ullman J.
7th BIU Winter School
Tracing Attacks 2
Speaker:
Ullman J.
7th BIU Winter School
Analyzing Graphs
Speaker:
Smith A.
7th BIU Winter School
Privacy and Game Theory 1
Speaker:
Ligett K.
7th BIU Winter School
Privacy and Game Theory 2
Speaker:
Ligett K.
6th BIU Winter School
Introduction and Overview of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 1
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 2
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 3
Speaker:
Kalai Y.
6th BIU Winter School
Interactive Arguments with Preprocessing
Speaker:
Walfish M.
6th BIU Winter School
SNARKs with Preprocessing
Speaker:
Tromer E.
6th BIU Winter School
Interactive Proofs and Program Representations 1
Speaker:
Walfish M.
6th BIU Winter School
Program Representations 2
Speaker:
Tromer E.
6th BIU Winter School
SNARKs (Without Preprocessing) and Their Applications
Speaker:
Tromer E.
6th BIU Winter School
Additional Applications and Summary of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Introduction to Searchable Encryption (models and motivation)
Speaker:
Boldyreva A.
6th BIU Winter School
Format-Preserving Encryption 1
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 2
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 3
Speaker:
Weiss M.
6th BIU Winter School
Order-Preserving Encryption 1
Speaker:
Boldyreva A.
6th BIU Winter School
Order-Preserving Encryption 2
Speaker:
Boldyreva A.
6th BIU Winter School
Statistical Attacks on Deterministic and Order-Preserving Encryption
Speaker:
Boldyreva A.
6th BIU Winter School
Probabilistic Searchable Symmetric Encryption
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 1
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 2
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 3
Speaker:
Krawczyk H.
6th BIU Winter School
Searchable Encryption Using ORAM
Speaker:
Pinkas B.
5th BIU Winter School
Definitions and Obilivious Transfer
Speaker:
Lindell Y.
5th BIU Winter School
Yao’s Two-Party Protocol and the BMR Multi-Party Protocol
Speaker:
Pinkas B.
5th BIU Winter School
The GMW Multi-Party Protocol and Oblivious Transfer Extension
Speaker:
Pinkas B.
5th BIU Winter School
Efficient Zero-Knowledge
Speaker:
Lindell Y.
5th BIU Winter School
Security against Malicious Adversaries
Speaker:
Lindell Y.
5th BIU Winter School
Optimizing Yao and GMWl for Semi-Honest Adversaries
Speaker:
Lindell Y.
5th BIU Winter School
Security for Malicious Adversaries with Yao’s Protocol – part 1
Speaker:
shelat a.
5th BIU Winter School
Security for Malicious Adversaries with Yao’s Protocol – part 2
Speaker:
shelat a.
5th BIU Winter School
Implementation Issues and Optimizations
Speaker:
shelat a.
5th BIU Winter School
The TinyOT Protocol – part 1
Speaker:
Orlandi C.
5th BIU Winter School
The TinyOT Protocol – part 2
Speaker:
Orlandi C.
5th BIU Winter School
The SPDZ Protocol – part 1
Speaker:
Damgard I.
5th BIU Winter School
The SPDZ Protocol – part 2
Speaker:
Damgard I.
5th BIU Winter School
ORAM
Speaker:
Pinkas B.
5th BIU Winter School
Set Intersection
Speaker:
Pinkas B.
5th BIU Winter School
UC Secure Commitments with Optimal Amortized Overhead
Speaker:
Damgard I.
5th BIU Winter School
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Speaker:
Asharov G.
5th BIU Winter School
Large-Scale Secure Computation: MPC for Parallel RAM Programs
Speaker:
Boyle E.
5th BIU Winter School
Rethinking for Secure Computation – A Greedy Approach
Speaker:
Venkitasubramaniam M.
5th BIU Winter School
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Speaker:
Hazay C.
5th BIU Winter School
A Tutorial on SCAPI
Speaker:
Lindell Y.
5th BIU Winter School
How to Implement Anything in MPC
Speaker:
Keller M.
5th BIU Winter School
ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Speaker:
Zohner M.
5th BIU Winter School
New Consistency Checks and Implementing Online/Offline Yao
Speaker:
Riva B.
5th BIU Winter School
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Speaker:
Orlandi C.
4th BIU Winter School
One-Way Functions and Hard Core Predicates
Speaker:
Haitner I.
4th BIU Winter School
Pseudorandomness
Speaker:
Applebaum B.
4th BIU Winter School
Pseudorandom Functions & Permutations
Speaker:
Haitner I.
4th BIU Winter School
Symmetric encryption and MACs
Speaker:
Applebaum B.
4th BIU Winter School
Generic Cryptanalytic Attacks
Speaker:
Dunkelman O.
4th BIU Winter School
Differential Cryptanalysis
Speaker:
Biham E.
4th BIU Winter School
Cryptanalysis of Hash Functions
Speaker:
Biham E.
4th BIU Winter School
Related Key-Attacks
Speaker:
Dunkelman O.
4th BIU Winter School
Symmetric Encryption – Definitions, Modes and MACs
Speaker:
Paterson K.
4th BIU Winter School
Generic Composition & Pitfalls
Speaker:
Paterson K.
4th BIU Winter School
Attacks Against Record Layers
Speaker:
Paterson K.
4th BIU Winter School
Record Layer Security
Speaker:
Paterson K.
4th BIU Winter School
A Contemporary View of Symmetric Encryption
Speaker:
Ristenpart T.
4th BIU Winter School
Authenticated Encyption Schemes and Misuse-Resistance
Speaker:
Ristenpart T.
4th BIU Winter School
Format-Preserving Encryption and Special Cases
Speaker:
Ristenpart T.
4th BIU Winter School
Advanced Symmetric Primitives
Speaker:
Ristenpart T.
3rd BIU Winter School
School Overview
Speaker:
Boneh D.
3rd BIU Winter School
The Basics of Elliptic Curves
Speaker:
Smart N.
3rd BIU Winter School
The Discrete Log Problem on Elliptic Curves
Speaker:
Smart N.
3rd BIU Winter School
Applications of Elliptic Curves to Cryptography
Speaker:
Smart N.
3rd BIU Winter School
The Basics of Pairings
Speaker:
Boneh D.
3rd BIU Winter School
Identity-Based Encryption and Variants
Speaker:
Boneh D.
3rd BIU Winter School
Attribute-Based Encryption
Speaker:
Bishop Lewko A.
3rd BIU Winter School
Broadcast Encryption and Traitor Tracing
Speaker:
Boneh D.
Colloquium seminars
Events
Open Day
Prof. Benny Pinkas
Prof. Yehuda Lindell
Winter Schools
10th BIU Winter School
11th BIU Winter School on Cryptography
12th BIU Winter School
1st BIU Winter School
2nd BIU Winter School
3rd BIU Winter School
4th BIU Winter School
5th BIU Winter School
6th BIU Winter School
7th BIU Winter School
8th BIU Winter School
9th BIU Winter School
Workshops
Bitcoin
Hacking Deep Learning
Hacking Deep Learning 2
TLS Security