Winter Schools

11th BIU Winter School

School Overview

Speaker: Zvika Brakerski and Nir Bitansky
12th BIU Winter School

Function Secret Sharing (part 1)

Speaker: Elette Boyle
11th BIU Winter School

Crash Course (Part 1A)

Speaker: Henry Yuen
12th BIU Winter School

Function Secret Sharing (part 2)

Speaker: Elette Boyle
11th BIU Winter School

Crash Course (Part 1B)

Speaker: Henry Yuen
12th BIU Winter School

Function Secret Sharing (part 3)

Speaker: Elette Boyle
11th BIU Winter School

Crash Course (Part 2)

Speaker: Henry Yuen
12th BIU Winter School

Private Analytics Techniques and Applications (part 1)

Speaker: Henry Corrigan-Gibbs
10th BIU Winter School

School Overview

Speaker: Benny Applebaum
11th BIU Winter School

Crash Course (Part 3)

Speaker: Henry Yuen
12th BIU Winter School

Private Analytics Techniques and Applications (part 2)

Speaker: Henry Corrigan-Gibbs
10th BIU Winter School

Threshold Secret Sharing

Speaker: Gilad Asharov
11th BIU Winter School

Quantum Key-Distribution (Part 1A)

Speaker: Rotem Arnon-Friedman
12th BIU Winter School

Oblivious RAM (part 1)

Speaker: Gilad Asharov
10th BIU Winter School

Threshold Secret Sharing (part 2)

Speaker: Gilad Asharov
11th BIU Winter School

Quantum Key-Distribution (Part 1B)

Speaker: Rotem Arnon-Friedman
12th BIU Winter School

Oblivious RAM (part 2)

Speaker: Gilad Asharov
10th BIU Winter School

Private Information Retrieval part 1

Speaker: Yuval Ishai
11th BIU Winter School

Quantum Key-Distribution (Part 2)

Speaker: Rotem Arnon-Friedman
12th BIU Winter School

Oblivious RAM (part 3)

Speaker: Gilad Asharov
10th BIU Winter School

Private Information Retrieval part 2

Speaker: Yuval Ishai
10th BIU Winter School

Private Information Retrieval part 3

Speaker: Klim Efremenko
11th BIU Winter School

Quantum Key-Distribution (Part 3)

Speaker: Rotem Arnon-Friedman
12th BIU Winter School

Vector Oblivious Linear Evaluation (part 1)

Speaker: Peter Scholl
10th BIU Winter School

Private Information Retrieval part 4

Speaker: Klim Efremenko
11th BIU Winter School

Security Reductions (Part 1)

Speaker: Mark Zhandry
12th BIU Winter School

Vector Oblivious Linear Evaluation (part 2)

Speaker: Peter Scholl
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 1

Speaker: Benny Applebaum
11th BIU Winter School

Security Reductions (Part 2)

Speaker: Mark Zhandry
12th BIU Winter School

Pseudorandom Correlation Generators (part 1)

Speaker: Yuval Ishai
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 2

Speaker: Benny Applebaum
11th BIU Winter School

Delegation of Quantum Computations (Part 1)

Speaker: Thomas Vidick
12th BIU Winter School

Pseudorandom Correlation Generators (part 2)

Speaker: Yuval Ishai
10th BIU Winter School

General Secret Sharing + Conditional Disclosure of Secrets part 3

Speaker: Benny Applebaum
11th BIU Winter School

Delegation of Quantum Computations (Part 2)

Speaker: Thomas Vidick
12th BIU Winter School

Introduction to Private Information Retrieval

Speaker: Dima Kogan
10th BIU Winter School

Consensus part 1

Speaker: Ittai Abraham
11th BIU Winter School

Delegation of Quantum Computations (Part 3)

Speaker: Thomas Vidick
12th BIU Winter School

Offline/Online Private Information Retrieval

Speaker: Dima Kogan
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes (part 1)

Speaker: Rosario Gennaro
10th BIU Winter School

Consensus part 2

Speaker: Ittai Abraham
11th BIU Winter School

Security Reductions (Part 3)

Speaker: Mark Zhandry
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes (part 2)

Speaker: Rosario Gennaro
10th BIU Winter School

Consensus part 3

Speaker: Ittai Abraham
11th BIU Winter School

Quantum Random Oracle (Part 1)

Speaker: Mark Zhandry
11th BIU Winter School

Quantum Random Oracle (Part 2)

Speaker: Mark Zhandry
12th BIU Winter School

Private Set Intersection (PSI) – ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System

Speaker: Benny Pinkas
10th BIU Winter School

Consensus part 4

Speaker: Ittai Abraham
11th BIU Winter School

Quantum Random Oracle (Part 3)

Speaker: Mark Zhandry
12th BIU Winter School

Private Set Intersection (PSI) – Malicious Security, and Probability Amplification

Speaker: Benny Pinkas
10th BIU Winter School

Introduction to Secure Multi Party Computation

Speaker: Yuval Ishai
12th BIU Winter School

Silent OT and VOLE from LPN

Speaker: Peter Scholl
10th BIU Winter School

Secure Multi Party Computation part 1

Speaker: Gilad Asharov
12th BIU Winter School

Pseudorandom Correlation Functions from Paillier

Speaker: Peter Scholl
10th BIU Winter School

Secure Multi Party Computation part 2

Speaker: Yuval Ishai
12th BIU Winter School

Threshold Signatures – Discrete Log Based Schemes – part 3

Speaker: Rosario Gennaro
10th BIU Winter School

Secure Multi Party Computation part 3

Speaker: Yuval Ishai
12th BIU Winter School

Threshold Signatures – RSA Signatures

Speaker: Rosario Gennaro
10th BIU Winter School

Fully Linear PCPs and Their Cryptographic Applications

Speaker: Niv Gilboa
12th BIU Winter School

Threshold Signatures – Quantum Resistant Schemes

Speaker: Rosario Gennaro
10th BIU Winter School

Randomized Encoding of Functions and Constant Round MPC part 1

Speaker: Benny Applebaum
10th BIU Winter School

Randomized Encoding of Functions and Constant Round MPC part 2

Speaker: Benny Applebaum

Winter schools video clip

Speaker:
9th BIU Winter School

Introduction to Zero Knowledge

Speaker: Alon Rosen
9th BIU Winter School

Zero Knowledge for All NP

Speaker: Alon Rosen
9th BIU Winter School

Proofs of Knowledge

Speaker: Yehuda lindell
9th BIU Winter School

Constant-Round Zero Knowledge Proofs

Speaker: Alon Rosen
9th BIU Winter School

Witness Indistinguishability and Constant-Round Arguments

Speaker: Alon Rosen
9th BIU Winter School

Non-Interactive Zero Knowledge

Speaker: Ron Rothblum
9th BIU Winter School

The Fiat-Shamir Transform

Speaker: Ron Rothblum
9th BIU Winter School

Lower Bounds and Limitations on Zero Knowledge

Speaker: Alon Rosen
9th BIU Winter School

Non Black-Box Zero Knowledge

Speaker: Alon Rosen
9th BIU Winter School

New Directions and/or Advanced Topics in the Foundations of Zero Knowledge

Speaker: Ron Rothblum
9th BIU Winter School

Sigma Protocols (part1)

Speaker: Benny Pinkas
9th BIU Winter School

Zero Knowledge for Sudoku

Speaker: Benny Pinkas
9th BIU Winter School

Sigma Protocols (part 2)

Speaker: Benny Pinkas
9th BIU Winter School

MPC in the Head – Compilers for Zero Knowledge

Speaker: Yuval Ishai
9th BIU Winter School

ZK from MPC: Constructions and Applications

Speaker: Carmit Hazay
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part 2)

Speaker: Jens Groth
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part 3)

Speaker: Jens Groth
9th BIU Winter School

ZK and NIZK from Bilinear Maps (part1)

Speaker: Jens Groth
9th BIU Winter School

Short ZK – SNARKs STARKs (part 1)

Speaker: Eli Ben- Sasson
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 2)

Speaker: Eli Ben- Sasson
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 3)

Speaker: Eli Ben- Sasson
9th BIU Winter School

Short ZK – SNARKs and STARKs (part 4)

Speaker: Eli Ben- Sasson
7th BIU Winter School

The Anonymization/ De-identification Paradigm

Speaker: Shmatikov V.
8th BIU Winter School

What Are Key Exchange Protocols?

Speaker: Hugo Krawczyk
8th BIU Winter School

Overview of Security Definitions

Speaker: Hugo Krawczyk
7th BIU Winter School

Re-identification Attacks

Speaker: Shmatikov V.
8th BIU Winter School

Diffie- Hellman Protocols and Authenticators

Speaker: Hugo Krawczyk
7th BIU Winter School

Inference Attacks

Speaker: Shmatikov V.
7th BIU Winter School

Introduction to Differential Privacy, Randomizaed Response, Basic Properties

Speaker: Ligett K.
8th BIU Winter School

STS, SIGMA and IKA (IPsec’s Key Exchange)

Speaker: Hugo Krawczyk
7th BIU Winter School

Basic Tools- Laplace Mechanism, Exponential Mechanism

Speaker: Ligett K.
8th BIU Winter School

Implicitly Authenticated KEPs

Speaker: Hugo Krawczyk
8th BIU Winter School

More on Implicit Authentication; Key Derivation

Speaker: Hugo Krawczyk
7th BIU Winter School

Private Data Release

Speaker: Ligett K.
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (passive adversaries)

Speaker: Fischlin M
7th BIU Winter School

Lowerbound Techniques: Packing Argument

Speaker: Ullman J.
8th BIU Winter School

Bellare-Rogaway-Security of Key Exchange (active adversaries)

Speaker: Fischlin M
7th BIU Winter School

Reconstruction Attacks

Speaker: Ullman J.
7th BIU Winter School

Advanced Tools: Tree Algorithm, Advanced Composition

Speaker: Nissim K.
8th BIU Winter School

Forward Secrecy

Speaker: Fischlin M
7th BIU Winter School

Advanced Tools- Sparse Vector

Speaker: Ligett K.
8th BIU Winter School

TLS 1.3 and other protocols

Speaker: Fischlin M
7th BIU Winter School

Private Multiplicative Weights

Speaker: Ullman J.
8th BIU Winter School

Zero Round-Trip Time (0-RTT)

Speaker: Fischlin M
7th BIU Winter School

Advanced Tools- Stability Based Techniques, Choosing/Gap Mechanism

Speaker: Smith A.
8th BIU Winter School

Universally Composable Key Exchange

Speaker: Fischlin M
7th BIU Winter School

Lowerbound Techniques: Fingerprinting Codes

Speaker: Ullman J.
8th BIU Winter School

Man-in-the-Middle Attacks on Authenticated Key Exchange

Speaker: Bhargavan K
8th BIU Winter School

Downgrade Attacks on Agile Real-World Protocols

Speaker: Bhargavan K
7th BIU Winter School

Local Algorithms

Speaker: Smith A.
8th BIU Winter School

Automated Symbolic Protocol Verification

Speaker: Bhargavan K
7th BIU Winter School

Privacy- What It Is and What It Isn’t?

Speaker: Shmatikov V.
8th BIU Winter School

Mechanized Computational Protocol Proofs

Speaker: Bhargavan K
7th BIU Winter School

Privacy Meets Machine Learning

Speaker: Shmatikov V.
7th BIU Winter School

Generalization and Privacy

Speaker: Nissim K.
8th BIU Winter School

Verified Cryptographic Libraries

Speaker: Bhargavan K
7th BIU Winter School

Private Learning 1

Speaker: Nissim K.
8th BIU Winter School

Verified Cryptographic Protocol Implementations

Speaker: Bhargavan K
7th BIU Winter School

Private Learning 2

Speaker: Nissim K.
7th BIU Winter School

Private ERM

Speaker: Smith A.
7th BIU Winter School

Privacy and Statistics

Speaker: Smith A.
7th BIU Winter School

Tracing Attacks 1

Speaker: Ullman J.
7th BIU Winter School

Tracing Attacks 2

Speaker: Ullman J.
7th BIU Winter School

Analyzing Graphs

Speaker: Smith A.
7th BIU Winter School

Privacy and Game Theory 1

Speaker: Ligett K.
7th BIU Winter School

Privacy and Game Theory 2

Speaker: Ligett K.
6th BIU Winter School

Introduction and Overview of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 1

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 2

Speaker: Kalai Y.
6th BIU Winter School

Short Proofs of Delegated Computation: Foundations and Feasibility 3

Speaker: Kalai Y.
6th BIU Winter School

Interactive Arguments with Preprocessing

Speaker: Walfish M.
6th BIU Winter School

SNARKs with Preprocessing

Speaker: Tromer E.
6th BIU Winter School

Interactive Proofs and Program Representations 1

Speaker: Walfish M.
6th BIU Winter School

Program Representations 2

Speaker: Tromer E.
6th BIU Winter School

SNARKs (Without Preprocessing) and Their Applications

Speaker: Tromer E.
6th BIU Winter School

Additional Applications and Summary of Verifiable Computation

Speaker: Walfish M.
6th BIU Winter School

Introduction to Searchable Encryption (models and motivation)

Speaker: Boldyreva A.
6th BIU Winter School

Format-Preserving Encryption 1

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 2

Speaker: Weiss M.
6th BIU Winter School

Format-Preserving Encryption 3

Speaker: Weiss M.
6th BIU Winter School

Order-Preserving Encryption 1

Speaker: Boldyreva A.
6th BIU Winter School

Order-Preserving Encryption 2

Speaker: Boldyreva A.
6th BIU Winter School

Statistical Attacks on Deterministic and Order-Preserving Encryption

Speaker: Boldyreva A.
6th BIU Winter School

Probabilistic Searchable Symmetric Encryption

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 1

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 2

Speaker: Krawczyk H.
6th BIU Winter School

Practical Searchable Encryption on Large Datasets 3

Speaker: Krawczyk H.
6th BIU Winter School

Searchable Encryption Using ORAM

Speaker: Pinkas B.
5th BIU Winter School

Definitions and Obilivious Transfer

Speaker: Lindell Y.
5th BIU Winter School

Yao’s Two-Party Protocol and the BMR Multi-Party Protocol

Speaker: Pinkas B.
5th BIU Winter School

The GMW Multi-Party Protocol and Oblivious Transfer Extension

Speaker: Pinkas B.
5th BIU Winter School

Efficient Zero-Knowledge

Speaker: Lindell Y.
5th BIU Winter School

Security against Malicious Adversaries

Speaker: Lindell Y.
5th BIU Winter School

Optimizing Yao and GMWl for Semi-Honest Adversaries

Speaker: Lindell Y.
5th BIU Winter School

Security for Malicious Adversaries with Yao’s Protocol – part 1

Speaker: shelat a.
5th BIU Winter School

Security for Malicious Adversaries with Yao’s Protocol – part 2

Speaker: shelat a.
5th BIU Winter School

Implementation Issues and Optimizations

Speaker: shelat a.
5th BIU Winter School

The TinyOT Protocol – part 1

Speaker: Orlandi C.
5th BIU Winter School

The TinyOT Protocol – part 2

Speaker: Orlandi C.
5th BIU Winter School

The SPDZ Protocol – part 1

Speaker: Damgard I.
5th BIU Winter School

The SPDZ Protocol – part 2

Speaker: Damgard I.
5th BIU Winter School

ORAM

Speaker: Pinkas B.
5th BIU Winter School

Set Intersection

Speaker: Pinkas B.
5th BIU Winter School

UC Secure Commitments with Optimal Amortized Overhead

Speaker: Damgard I.
5th BIU Winter School

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

Speaker: Asharov G.
5th BIU Winter School

Large-Scale Secure Computation: MPC for Parallel RAM Programs

Speaker: Boyle E.
5th BIU Winter School

Rethinking for Secure Computation – A Greedy Approach

Speaker: Venkitasubramaniam M.
5th BIU Winter School

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs

Speaker: Hazay C.
5th BIU Winter School

A Tutorial on SCAPI

Speaker: Lindell Y.
5th BIU Winter School

How to Implement Anything in MPC

Speaker: Keller M.
5th BIU Winter School

ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Speaker: Zohner M.
5th BIU Winter School

New Consistency Checks and Implementing Online/Offline Yao

Speaker: Riva B.
5th BIU Winter School

Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge

Speaker: Orlandi C.
4th BIU Winter School

One-Way Functions and Hard Core Predicates

Speaker: Haitner I.
4th BIU Winter School

Pseudorandomness

Speaker: Applebaum B.
4th BIU Winter School

Pseudorandom Functions & Permutations

Speaker: Haitner I.
4th BIU Winter School

Symmetric encryption and MACs

Speaker: Applebaum B.
4th BIU Winter School

Generic Cryptanalytic Attacks

Speaker: Dunkelman O.
4th BIU Winter School

Differential Cryptanalysis

Speaker: Biham E.
4th BIU Winter School

Cryptanalysis of Hash Functions

Speaker: Biham E.
4th BIU Winter School

Related Key-Attacks

Speaker: Dunkelman O.
4th BIU Winter School

Symmetric Encryption – Definitions, Modes and MACs

Speaker: Paterson K.
4th BIU Winter School

Generic Composition & Pitfalls

Speaker: Paterson K.
4th BIU Winter School

Attacks Against Record Layers

Speaker: Paterson K.
4th BIU Winter School

Record Layer Security

Speaker: Paterson K.
4th BIU Winter School

A Contemporary View of Symmetric Encryption

Speaker: Ristenpart T.
4th BIU Winter School

Authenticated Encyption Schemes and Misuse-Resistance

Speaker: Ristenpart T.
4th BIU Winter School

Format-Preserving Encryption and Special Cases

Speaker: Ristenpart T.
4th BIU Winter School

Advanced Symmetric Primitives

Speaker: Ristenpart T.
3rd BIU Winter School

School Overview

Speaker: Boneh D.
3rd BIU Winter School

The Basics of Elliptic Curves

Speaker: Smart N.
3rd BIU Winter School

The Discrete Log Problem on Elliptic Curves

Speaker: Smart N.
3rd BIU Winter School

Applications of Elliptic Curves to Cryptography

Speaker: Smart N.
3rd BIU Winter School

The Basics of Pairings

Speaker: Boneh D.
3rd BIU Winter School

Identity-Based Encryption and Variants

Speaker: Boneh D.
3rd BIU Winter School

Attribute-Based Encryption

Speaker: Bishop Lewko A.
3rd BIU Winter School

Broadcast Encryption and Traitor Tracing

Speaker: Boneh D.