A note about email: Due to spam filters and other general problems, I do not always receive emails that are sent to me (and the sender is not always notified of this). I typically acknowledge all emails, so if you did not receive an acknowledgement of some kind from me, please resend the mail.
Brief Biography | Research Interests | Publications | My Books | Videos | Professional Activities | Teaching | Students | Tips | Curriculum Vitae
Notice for students interested in working with me
I am a professor in the Department of Computer Science at Bar Ilan University. Prior to coming to Bar-Ilan in 2004, I was a Raviv Postdoctoral fellow in the Cryptographic Research Group at the IBM T.J.Watson Research Center. I received my Ph.D. in 2002 from the Weizmann Institute of Science, under the supervision of Oded Goldreich and Moni Naor.
I am currently involved in a new company called Dyadic Security that is involved in applying secure computation to the critical problem of server breach.
More about my research projects can be found here.
See the Cryptography Research Group homepage for more information about cryptography research and activities at Bar-Ilan.Detailed descriptions of my research in secure multiparty computation and secure protocol composition (last updated 2008), with online references to my papers, can be found here:
I will be the program chair for TCC 2014; download the call for papers.
I was a program committee member for the following conferences:
Co-organizer of the following workshops:
Webpages for courses:
Introduction to Modern Cryptography, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, August 2007.
The preface, table of contents and index and introduction are available for perusal. More details on the book, including errata and book reviews, can be found here. A solutions manual, containing solutions to all of the exercises in the book, can be obtained directly from the publisher by any instructor who adopts the book.
See CRC and Amazon for purchase information, and download the promotional flyer.
11th International Conference on the Theory of Cryptography (TCC 2014), Yehuda Lindell Ed.
Lecture Notes in Computer Science, Volume 8349, Springer, 2014.
Go here for online access.
Efficient Secure Two-Party Protocols: Techniques and Constructions, by Carmit Hazay and Yehuda Lindell
Information Security and Cryptography Series, Springer-Verlag, 2010.
The preface, table of contents and introduction are available for perusal. More details on the book can be found here, and a review of the book that appeared in SIGACT NEWS can be found here.
See the Springer website or Amazon for purchase information, and go here for online access.
Although this book is intended for those with background in cryptography, we were pleasantly surprised to see that it is being used by a more general audience, and even quite young readers seem to have enjoyed it. See examples here, here, and here.
Composition of Secure Multi-Party Protocols - A Comprehensive Study, by Yehuda Lindell
Lecture Notes in Computer Science, Volume 2815, Springer-Verlag, 2003.
More details can be found here.
See purchase information and online access.