Yehuda Lindell

Professor

Cryptography Research Group
Department of Computer Science
Bar Ilan University
Ramat Gan 52900, Israel

Office: Building 408, office 002
Fax: +972-3-738 4193
Email: firstname.lastname@biu.ac.il

A note about email: Due to spam filters and other general problems, I do not always receive emails that are sent to me (and the sender is not always notified of this). I typically acknowledge all emails, so if you did not receive an acknowledgement of some kind from me, please resend the mail.

Brief Biography | Research Interests | Publications | My Books | Videos | Professional Activities | Teaching | Students | Tips | Curriculum Vitae

Notice for students interested in working with me


Brief Biography

I am a professor in the Department of Computer Science at Bar Ilan University. Prior to coming to Bar-Ilan in 2004, I was a Raviv Postdoctoral fellow in the Cryptographic Research Group at the IBM T.J.Watson Research Center. I received my Ph.D. in 2002 from the Weizmann Institute of Science, under the supervision of Oded Goldreich and Moni Naor.

I am currently involved in a new company called Dyadic Security that is involved in applying secure computation to the critical problem of server breach.


Research Interests

My main research interests are in the field of cryptography, with a focus on secure protocols. My research concentrates both on questions of feasibility and efficiency. The former question asks what cryptographic tasks can be realized and under what assumptions, and is related to the theoretical foundations of cryptography. The focus of the latter question is the construction of efficient cryptographic schemes and protocols that have rigorous proofs of security and correctness. This research includes the development of new models and definitions for secure computation that enable the construction of highly efficient protocols. A primary aim of my research in this area is to demonstrate that secure computation has potential for real-world use, and many real-world problems can already be solved today. In many cases, there is still a long way to go in order to obtain protocols that are efficient enough to be used in practice. In these cases, I am interested in the algorithmic process of finding more and more efficient protocols.

More about my research projects can be found here.

See the Cryptography Research Group homepage for more information about cryptography research and activities at Bar-Ilan.

Detailed descriptions of my research in secure multiparty computation and secure protocol composition (last updated 2008), with online references to my papers, can be found here: I also have a tutorial paper on Secure Multiparty Computation for Privacy Preserving Data Mining. I also have a shorter article aimed at a general audience that discusses the basics of secure multiparty computation, and how they apply to the specific problem of privacy preserving data mining.


Publications (all available online)

At PKC 2013, I gave an invited talk on Techniques for Efficient Secure Computation Based on Yao's Protocol.


Videos

Some of my lectures and talks have been filmed and can be found online:

Professional Activities

I will be the program chair for TCC 2014; download the call for papers.

I was a program committee member for the following conferences:

Co-organizer of the following workshops:


Teaching (2011-2012)

Webpages for courses:



Students, Postdocs and Visitors


My Books

Book Jacket for Introduction to Modern Cryptography 2nd Edition
Introduction to Modern Cryptography, 2nd Edition, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, November 2014.

The preface and table of contents is available for perusal. More details on the book, including errata and book reviews, can be found here.

See CRC and Amazon for purchase information.

Book Jacket for Introduction to Modern Cryptography
Introduction to Modern Cryptography, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, August 2007.

The preface, table of contents and index and introduction are available for perusal. More details on the book, including errata and book reviews, can be found here. A solutions manual, containing solutions to all of the exercises in the book, can be obtained directly from the publisher by any instructor who adopts the book.

See CRC and Amazon for purchase information, and download the promotional flyer.

Book Jacket for LNCS 8349
11th International Conference on the Theory of Cryptography (TCC 2014), Yehuda Lindell Ed.
Lecture Notes in Computer Science, Volume 8349, Springer, 2014.

Go here for online access.

Book Jacket for Efficient Secure Two-Party Protocols
Efficient Secure Two-Party Protocols: Techniques and Constructions, by Carmit Hazay and Yehuda Lindell
Information Security and Cryptography Series, Springer-Verlag, 2010.

The preface, table of contents and introduction are available for perusal. More details on the book can be found here, and a review of the book that appeared in SIGACT NEWS can be found here.

See the Springer website or Amazon for purchase information, and go here for online access.

Although this book is intended for those with background in cryptography, we were pleasantly surprised to see that it is being used by a more general audience, and even quite young readers seem to have enjoyed it. See examples here, here, and here.

Book Jacket for LNCS 2815
Composition of Secure Multi-Party Protocols - A Comprehensive Study, by Yehuda Lindell
Lecture Notes in Computer Science, Volume 2815, Springer-Verlag, 2003.

More details can be found here.

See purchase information and online access.


Tips