Toggle navigation
Home
About
Members
Research
Research Interests
External Grants
Funded Grants
Programs
Graduate Programs
Undergraduate Programs
Publication Prizes to Students
International Summer Program
Publications
Events
List of events
Events Calendar
Colloquium Seminars
Photos
Videos
Winter Schools
11th BIU Winter School
School Overview
Speaker:
Zvika Brakerski and Nir Bitansky
12th BIU Winter School
Function Secret Sharing (part 1)
Speaker:
Elette Boyle
13th BIU Winter School
What are Blockchains and What Are They For?
Speaker:
Dan Boneh
11th BIU Winter School
Crash Course (Part 1A)
Speaker:
Henry Yuen
12th BIU Winter School
Function Secret Sharing (part 2)
Speaker:
Elette Boyle
13th BIU Winter School
An Overview of PoW and PoS Consensus
Speaker:
Valeria Nikolaenko
11th BIU Winter School
Crash Course (Part 1B)
Speaker:
Henry Yuen
12th BIU Winter School
Function Secret Sharing (part 3)
Speaker:
Elette Boyle
13th BIU Winter School
An Overview of the Ethereum Execution Layer
Speaker:
Dan Boneh
11th BIU Winter School
Crash Course (Part 2)
Speaker:
Henry Yuen
12th BIU Winter School
Private Analytics Techniques and Applications (part 1)
Speaker:
Henry Corrigan-Gibbs
10th BIU Winter School
School Overview
Speaker:
Benny Applebaum
13th BIU Winter School
CeFi Versus DeFi
Speaker:
Arthur Gervais
11th BIU Winter School
Crash Course (Part 3)
Speaker:
Henry Yuen
12th BIU Winter School
Private Analytics Techniques and Applications (part 2)
Speaker:
Henry Corrigan-Gibbs
10th BIU Winter School
Threshold Secret Sharing
Speaker:
Gilad Asharov
13th BIU Winter School
Hard Problems in Blockchains
Speaker:
Valeria Nikolaenko
11th BIU Winter School
Quantum Key-Distribution (Part 1A)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 1)
Speaker:
Gilad Asharov
10th BIU Winter School
Threshold Secret Sharing (part 2)
Speaker:
Gilad Asharov
13th BIU Winter School
The Risk of Censorship and De-Anonymization
Speaker:
Arthur Gervais
11th BIU Winter School
Quantum Key-Distribution (Part 1B)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 2)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 1
Speaker:
Yuval Ishai
13th BIU Winter School
What Are Snarks and What Are They Good For?
Speaker:
Dan Boneh
13th BIU Winter School
A Cambrian Explosion of Cryptographic Proofs
Speaker:
Eli Ben-Sasson
11th BIU Winter School
Quantum Key-Distribution (Part 2)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Oblivious RAM (part 3)
Speaker:
Gilad Asharov
10th BIU Winter School
Private Information Retrieval part 2
Speaker:
Yuval Ishai
10th BIU Winter School
Private Information Retrieval part 3
Speaker:
Klim Efremenko
13th BIU Winter School
Arithmetization – What’s Algebra Got to Do With It? + From Fri to Polynomial Commitment Schemes
Speaker:
Eli Ben-Sasson
11th BIU Winter School
Quantum Key-Distribution (Part 3)
Speaker:
Rotem Arnon-Friedman
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 1)
Speaker:
Peter Scholl
10th BIU Winter School
Private Information Retrieval part 4
Speaker:
Klim Efremenko
13th BIU Winter School
Proving Properties of Committed Polynomials, and the Derived Snarks
Speaker:
Dan Boneh
11th BIU Winter School
Security Reductions (Part 1)
Speaker:
Mark Zhandry
12th BIU Winter School
Vector Oblivious Linear Evaluation (part 2)
Speaker:
Peter Scholl
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 1
Speaker:
Benny Applebaum
13th BIU Winter School
How Custom Gates Are Used During Arithmetization
Speaker:
Mary Maller
11th BIU Winter School
Security Reductions (Part 2)
Speaker:
Mark Zhandry
12th BIU Winter School
Pseudorandom Correlation Generators (part 1)
Speaker:
Yuval Ishai
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 2
Speaker:
Benny Applebaum
13th BIU Winter School
A Close Look at a Lookup Argument
Speaker:
Mary Maller
11th BIU Winter School
Delegation of Quantum Computations (Part 1)
Speaker:
Thomas Vidick
12th BIU Winter School
Pseudorandom Correlation Generators (part 2)
Speaker:
Yuval Ishai
10th BIU Winter School
General Secret Sharing + Conditional Disclosure of Secrets part 3
Speaker:
Benny Applebaum
13th BIU Winter School
Permissionless Consensus I
Speaker:
Rafael Pass
11th BIU Winter School
Delegation of Quantum Computations (Part 2)
Speaker:
Thomas Vidick
12th BIU Winter School
Introduction to Private Information Retrieval
Speaker:
Dima Kogan
10th BIU Winter School
Consensus part 1
Speaker:
Ittai Abraham
13th BIU Winter School
Permissionless Consensus II
Speaker:
Rafael Pass
11th BIU Winter School
Delegation of Quantum Computations (Part 3)
Speaker:
Thomas Vidick
12th BIU Winter School
Offline/Online Private Information Retrieval
Speaker:
Dima Kogan
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 1)
Speaker:
Rosario Gennaro
10th BIU Winter School
Consensus part 2
Speaker:
Ittai Abraham
13th BIU Winter School
Data Availability Sampling, Data Dispersal and Reconstruction
Speaker:
Valeria Nikolaenko
11th BIU Winter School
Security Reductions (Part 3)
Speaker:
Mark Zhandry
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes (part 2)
Speaker:
Rosario Gennaro
10th BIU Winter School
Consensus part 3
Speaker:
Ittai Abraham
13th BIU Winter School
DAG meets BFT & Theory Meets Practice
Speaker:
Alexander Spiegelman
11th BIU Winter School
Quantum Random Oracle (Part 1)
Speaker:
Mark Zhandry
11th BIU Winter School
Quantum Random Oracle (Part 2)
Speaker:
Mark Zhandry
12th BIU Winter School
Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System
Speaker:
Benny Pinkas
10th BIU Winter School
Consensus part 4
Speaker:
Ittai Abraham
13th BIU Winter School
Decentralized Exchanges, Sandwich, Arbitrage
Speaker:
Arthur Gervais
11th BIU Winter School
Quantum Random Oracle (Part 3)
Speaker:
Mark Zhandry
12th BIU Winter School
Private Set Intersection (PSI) – Malicious Security, and Probability Amplification
Speaker:
Benny Pinkas
10th BIU Winter School
Introduction to Secure Multi Party Computation
Speaker:
Yuval Ishai
13th BIU Winter School
Lending, Liquidations, Stablecoins
Speaker:
Arthur Gervais
12th BIU Winter School
Silent OT and VOLE from LPN
Speaker:
Peter Scholl
10th BIU Winter School
Secure Multi Party Computation part 1
Speaker:
Gilad Asharov
13th BIU Winter School
MEV and Fair Ordering
Speaker:
Valeria Nikolaenko and Dan Boneh
12th BIU Winter School
Pseudorandom Correlation Functions from Paillier
Speaker:
Peter Scholl
10th BIU Winter School
Secure Multi Party Computation part 2
Speaker:
Yuval Ishai
13th BIU Winter School
DeFi Attacks
Speaker:
Arthur Gervais
12th BIU Winter School
Threshold Signatures – Discrete Log Based Schemes – part 3
Speaker:
Rosario Gennaro
10th BIU Winter School
Secure Multi Party Computation part 3
Speaker:
Yuval Ishai
13th BIU Winter School
Building Blockchain Wallets – Challenges and Solutions
Speaker:
Yehuda Lindell
12th BIU Winter School
Threshold Signatures – RSA Signatures
Speaker:
Rosario Gennaro
10th BIU Winter School
Fully Linear PCPs and Their Cryptographic Applications
Speaker:
Niv Gilboa
13th BIU Winter School
Building Blockchain Wallets – Technical Details
Speaker:
Yehuda Lindell
12th BIU Winter School
Threshold Signatures – Quantum Resistant Schemes
Speaker:
Rosario Gennaro
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 1
Speaker:
Benny Applebaum
10th BIU Winter School
Randomized Encoding of Functions and Constant Round MPC part 2
Speaker:
Benny Applebaum
Winter schools video clip
Speaker:
9th BIU Winter School
Introduction to Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
Zero Knowledge for All NP
Speaker:
Alon Rosen
9th BIU Winter School
Proofs of Knowledge
Speaker:
Yehuda lindell
9th BIU Winter School
Constant-Round Zero Knowledge Proofs
Speaker:
Alon Rosen
9th BIU Winter School
Witness Indistinguishability and Constant-Round Arguments
Speaker:
Alon Rosen
9th BIU Winter School
Non-Interactive Zero Knowledge
Speaker:
Ron Rothblum
9th BIU Winter School
The Fiat-Shamir Transform
Speaker:
Ron Rothblum
9th BIU Winter School
Lower Bounds and Limitations on Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
Non Black-Box Zero Knowledge
Speaker:
Alon Rosen
9th BIU Winter School
New Directions and/or Advanced Topics in the Foundations of Zero Knowledge
Speaker:
Ron Rothblum
9th BIU Winter School
Sigma Protocols (part1)
Speaker:
Benny Pinkas
9th BIU Winter School
Zero Knowledge for Sudoku
Speaker:
Benny Pinkas
9th BIU Winter School
Sigma Protocols (part 2)
Speaker:
Benny Pinkas
9th BIU Winter School
MPC in the Head – Compilers for Zero Knowledge
Speaker:
Yuval Ishai
9th BIU Winter School
ZK from MPC: Constructions and Applications
Speaker:
Carmit Hazay
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 2)
Speaker:
Jens Groth
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part 3)
Speaker:
Jens Groth
9th BIU Winter School
ZK and NIZK from Bilinear Maps (part1)
Speaker:
Jens Groth
9th BIU Winter School
Short ZK – SNARKs STARKs (part 1)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 2)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 3)
Speaker:
Eli Ben- Sasson
9th BIU Winter School
Short ZK – SNARKs and STARKs (part 4)
Speaker:
Eli Ben- Sasson
7th BIU Winter School
The Anonymization/ De-identification Paradigm
Speaker:
Shmatikov V.
8th BIU Winter School
What Are Key Exchange Protocols?
Speaker:
Hugo Krawczyk
8th BIU Winter School
Overview of Security Definitions
Speaker:
Hugo Krawczyk
7th BIU Winter School
Re-identification Attacks
Speaker:
Shmatikov V.
8th BIU Winter School
Diffie- Hellman Protocols and Authenticators
Speaker:
Hugo Krawczyk
7th BIU Winter School
Inference Attacks
Speaker:
Shmatikov V.
7th BIU Winter School
Introduction to Differential Privacy, Randomizaed Response, Basic Properties
Speaker:
Ligett K.
8th BIU Winter School
STS, SIGMA and IKA (IPsec’s Key Exchange)
Speaker:
Hugo Krawczyk
7th BIU Winter School
Basic Tools- Laplace Mechanism, Exponential Mechanism
Speaker:
Ligett K.
8th BIU Winter School
Implicitly Authenticated KEPs
Speaker:
Hugo Krawczyk
8th BIU Winter School
More on Implicit Authentication; Key Derivation
Speaker:
Hugo Krawczyk
7th BIU Winter School
Private Data Release
Speaker:
Ligett K.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (passive adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Packing Argument
Speaker:
Ullman J.
8th BIU Winter School
Bellare-Rogaway-Security of Key Exchange (active adversaries)
Speaker:
Fischlin M
7th BIU Winter School
Reconstruction Attacks
Speaker:
Ullman J.
7th BIU Winter School
Advanced Tools: Tree Algorithm, Advanced Composition
Speaker:
Nissim K.
8th BIU Winter School
Forward Secrecy
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Sparse Vector
Speaker:
Ligett K.
8th BIU Winter School
TLS 1.3 and other protocols
Speaker:
Fischlin M
7th BIU Winter School
Private Multiplicative Weights
Speaker:
Ullman J.
8th BIU Winter School
Zero Round-Trip Time (0-RTT)
Speaker:
Fischlin M
7th BIU Winter School
Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism
Speaker:
Smith A.
8th BIU Winter School
Universally Composable Key Exchange
Speaker:
Fischlin M
7th BIU Winter School
Lowerbound Techniques: Fingerprinting Codes
Speaker:
Ullman J.
8th BIU Winter School
Man-in-the-Middle Attacks on Authenticated Key Exchange
Speaker:
Bhargavan K
8th BIU Winter School
Downgrade Attacks on Agile Real-World Protocols
Speaker:
Bhargavan K
7th BIU Winter School
Local Algorithms
Speaker:
Smith A.
8th BIU Winter School
Automated Symbolic Protocol Verification
Speaker:
Bhargavan K
7th BIU Winter School
Privacy- What It Is and What It Isn’t?
Speaker:
Shmatikov V.
8th BIU Winter School
Mechanized Computational Protocol Proofs
Speaker:
Bhargavan K
7th BIU Winter School
Privacy Meets Machine Learning
Speaker:
Shmatikov V.
7th BIU Winter School
Generalization and Privacy
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Libraries
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 1
Speaker:
Nissim K.
8th BIU Winter School
Verified Cryptographic Protocol Implementations
Speaker:
Bhargavan K
7th BIU Winter School
Private Learning 2
Speaker:
Nissim K.
7th BIU Winter School
Private ERM
Speaker:
Smith A.
7th BIU Winter School
Privacy and Statistics
Speaker:
Smith A.
7th BIU Winter School
Tracing Attacks 1
Speaker:
Ullman J.
7th BIU Winter School
Tracing Attacks 2
Speaker:
Ullman J.
7th BIU Winter School
Analyzing Graphs
Speaker:
Smith A.
7th BIU Winter School
Privacy and Game Theory 1
Speaker:
Ligett K.
7th BIU Winter School
Privacy and Game Theory 2
Speaker:
Ligett K.
6th BIU Winter School
Introduction and Overview of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 1
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 2
Speaker:
Kalai Y.
6th BIU Winter School
Short Proofs of Delegated Computation: Foundations and Feasibility 3
Speaker:
Kalai Y.
6th BIU Winter School
Interactive Arguments with Preprocessing
Speaker:
Walfish M.
6th BIU Winter School
SNARKs with Preprocessing
Speaker:
Tromer E.
6th BIU Winter School
Interactive Proofs and Program Representations 1
Speaker:
Walfish M.
6th BIU Winter School
Program Representations 2
Speaker:
Tromer E.
6th BIU Winter School
SNARKs (Without Preprocessing) and Their Applications
Speaker:
Tromer E.
6th BIU Winter School
Additional Applications and Summary of Verifiable Computation
Speaker:
Walfish M.
6th BIU Winter School
Introduction to Searchable Encryption (models and motivation)
Speaker:
Boldyreva A.
6th BIU Winter School
Format-Preserving Encryption 1
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 2
Speaker:
Weiss M.
6th BIU Winter School
Format-Preserving Encryption 3
Speaker:
Weiss M.
6th BIU Winter School
Order-Preserving Encryption 1
Speaker:
Boldyreva A.
6th BIU Winter School
Order-Preserving Encryption 2
Speaker:
Boldyreva A.
6th BIU Winter School
Statistical Attacks on Deterministic and Order-Preserving Encryption
Speaker:
Boldyreva A.
6th BIU Winter School
Probabilistic Searchable Symmetric Encryption
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 1
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 2
Speaker:
Krawczyk H.
6th BIU Winter School
Practical Searchable Encryption on Large Datasets 3
Speaker:
Krawczyk H.
6th BIU Winter School
Searchable Encryption Using ORAM
Speaker:
Pinkas B.
5th BIU Winter School
Definitions and Obilivious Transfer
Speaker:
Lindell Y.
5th BIU Winter School
Yao’s Two-Party Protocol and the BMR Multi-Party Protocol
Speaker:
Pinkas B.
5th BIU Winter School
The GMW Multi-Party Protocol and Oblivious Transfer Extension
Speaker:
Pinkas B.
5th BIU Winter School
Efficient Zero-Knowledge
Speaker:
Lindell Y.
5th BIU Winter School
Security against Malicious Adversaries
Speaker:
Lindell Y.
5th BIU Winter School
Optimizing Yao and GMWl for Semi-Honest Adversaries
Speaker:
Lindell Y.
5th BIU Winter School
Security for Malicious Adversaries with Yao’s Protocol – part 1
Speaker:
shelat a.
5th BIU Winter School
Security for Malicious Adversaries with Yao’s Protocol – part 2
Speaker:
shelat a.
5th BIU Winter School
Implementation Issues and Optimizations
Speaker:
shelat a.
5th BIU Winter School
The TinyOT Protocol – part 1
Speaker:
Orlandi C.
5th BIU Winter School
The TinyOT Protocol – part 2
Speaker:
Orlandi C.
5th BIU Winter School
The SPDZ Protocol – part 1
Speaker:
Damgard I.
5th BIU Winter School
The SPDZ Protocol – part 2
Speaker:
Damgard I.
5th BIU Winter School
ORAM
Speaker:
Pinkas B.
5th BIU Winter School
Set Intersection
Speaker:
Pinkas B.
5th BIU Winter School
UC Secure Commitments with Optimal Amortized Overhead
Speaker:
Damgard I.
5th BIU Winter School
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Speaker:
Asharov G.
5th BIU Winter School
Large-Scale Secure Computation: MPC for Parallel RAM Programs
Speaker:
Boyle E.
5th BIU Winter School
Rethinking for Secure Computation – A Greedy Approach
Speaker:
Venkitasubramaniam M.
5th BIU Winter School
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Speaker:
Hazay C.
5th BIU Winter School
A Tutorial on SCAPI
Speaker:
Lindell Y.
5th BIU Winter School
How to Implement Anything in MPC
Speaker:
Keller M.
5th BIU Winter School
ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Speaker:
Zohner M.
5th BIU Winter School
New Consistency Checks and Implementing Online/Offline Yao
Speaker:
Riva B.
5th BIU Winter School
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Speaker:
Orlandi C.
4th BIU Winter School
One-Way Functions and Hard Core Predicates
Speaker:
Haitner I.
4th BIU Winter School
Pseudorandomness
Speaker:
Applebaum B.
13th BIU Winter School
Colloquium seminars
Events
Open Day
Prof. Benny Pinkas
Prof. Yehuda Lindell
Winter Schools
10th BIU Winter School
11th BIU Winter School on Cryptography
12th BIU Winter School
13th BIU Winter School
1st BIU Winter School
2nd BIU Winter School
3rd BIU Winter School
4th BIU Winter School
5th BIU Winter School
6th BIU Winter School
7th BIU Winter School
8th BIU Winter School
9th BIU Winter School
Workshops
Bitcoin
Hacking Deep Learning
Hacking Deep Learning 2
TLS Security