Cryptography Research Group
Department of Computer Science
Bar Ilan University
Ramat Gan 52900, Israel
Office: Building 408, office 002
Fax: +972-3-738 4193
A note about email: Due to spam filters and other general problems, I do not always receive emails that are sent to me (and the sender is not always notified of this). I typically acknowledge all emails, so if you did not receive an acknowledgement of some kind from me, please resend the mail.
| Research Interests
| Publications | My Books | Professional Activities | Teaching | Students | Tips | Curriculum Vitae
Notice for students interested in working with me
I am a professor in the Department of Computer Science at Bar Ilan University.
Prior to coming to Bar-Ilan in 2004, I was a Raviv Postdoctoral fellow in the
Research Group at the IBM T.J.Watson Research Center.
I received my Ph.D. in 2002 from the Weizmann Institute of Science, under the supervision of
Oded Goldreich and Moni Naor.
My main research interests are in the field of cryptography, with a focus on secure protocols. My research concentrates both on questions of feasibility and efficiency. The former question asks what cryptographic tasks can be realized and under what assumptions, and is related to the theoretical foundations of cryptography. The focus of the latter question is the construction of efficient cryptographic schemes and protocols that have rigorous proofs of security and correctness. This research includes the development of new models and definitions for secure computation that enable the construction of highly efficient protocols. A primary aim of my research in this area is to demonstrate that secure computation has potential for real-world use, and many real-world problems can already be solved today. In many cases, there is still a long way to go in order to obtain protocols that are efficient enough to be used in practice. In these cases, I am interested in the algorithmic process of finding more and more efficient protocols.
More about my research can be found here in postscript
or pdf format (note, however, that this file is updated infrequently).
See the Cryptography Research Group homepage for more information about cryptography research and activities at Bar-Ilan.
Detailed descriptions of my research in secure multiparty computation
and secure protocol composition (last updated 2008), with online references
to my papers, can be found here:
I also have a tutorial paper on Secure Multiparty Computation for Privacy Preserving Data Mining. I also have a shorter article aimed at a general audience that discusses the basics of secure multiparty computation, and how they apply to the specific problem of privacy preserving data mining.
Publications (all available online)
At PKC 2013, I gave an invited talk on Techniques for Efficient Secure Computation Based on Yao's Protocol.
I will be the program chair for TCC 2014; download the call for papers.
I was a program committee member for the following conferences:
Co-organizer of the following workshops:
Webpages for courses:
Past Courses (not given this year):
Students, Postdocs and Visitors
Tali Oberman (Current)
Asaf Cohen (Current)
Eli Oxman (Graduated 2011)
Dafna Kidron (Graduated 2007)
Claudio Orlandi (2011-2012; now a Postdoc in the Computer Science Department at Aarhus)
Eran Omri (2009-2012; now a member of the Computer Science Department at Ariel)
Arpita Patra (January-March 2013)
Kobbi Nissim (2012)
Introduction to Modern Cryptography, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, August 2007.
The preface, table of contents and index and introduction are available for perusal.
More details on the book, including errata and book reviews, can be found here. A solutions manual, containing solutions to all of the exercises in the book, can be obtained directly from the publisher by any instructor who adopts the book.
See CRC and Amazon for purchase information, and download the promotional flyer.
Efficient Secure Two-Party Protocols: Techniques and Constructions, by Carmit Hazay and Yehuda Lindell
Information Security and Cryptography Series, Springer-Verlag, 2010.
The preface, table of contents and introduction are available for perusal. More details on the book can be found here, and a review of the book that appeared in SIGACT NEWS can be found here.
See the Springer website or Amazon for purchase information, and go here for online access.
Although this book is intended for those with background in cryptography, we were pleasantly surprised to see that it is being used by a more general audience, and even quite young readers seem to have enjoyed it. See examples here, here, and here.