Yehuda Lindell

Professor (on leave)

Cryptography Research Group
BIU Center for Research in Applied Cryptography and Cyber Security
Department of Computer Science
Bar Ilan University
Ramat Gan 52900, Israel

Office: Building 206 (Nano), office 539
Email: firstname.lastname@biu.ac.il
ORCID iD iconorcid.org/0000-0002-8176-690X

A note about email: Due to spam filters and other general problems, I do not always receive emails that are sent to me (and the sender is not always notified of this). I typically acknowledge all emails, so if you did not receive an acknowledgement of some kind from me, please resend the mail.

Brief Biography | Research Interests | Publications | My Books | Videos | Professional Activities | Teaching | Students | Curriculum Vitae

Notice for students interested in working with me: I am on leave from the university, and so am not taking any students at this time.


Brief Biography

I am a professor in the Department of Computer Science at Bar Ilan University. Prior to coming to Bar-Ilan in 2004, I was a Raviv Postdoctoral fellow in the Cryptographic Research Group at the IBM T.J.Watson Research Center. I received my Ph.D. in 2002 from the Weizmann Institute of Science, under the supervision of Oded Goldreich and Moni Naor.

I was the co-founder of a company called Unbound Security that uses secure multiparty computation to protect cryptographic keys and secrets of all types. In January 2022, Unbound Security was acquired by Coinbase.


Research Interests

My main research interests are in the field of cryptography, with a focus on secure protocols. My research concentrates both on questions of feasibility and efficiency. The former question asks what cryptographic tasks can be realized and under what assumptions, and is related to the theoretical foundations of cryptography. The focus of the latter question is the construction of efficient cryptographic schemes and protocols that have rigorous proofs of security and correctness. This research includes the development of new models and definitions for secure computation that enable the construction of highly efficient protocols. A primary aim of my research in this area is to demonstrate that secure computation has potential for real-world use, and many real-world problems can already be solved today. In many cases, there is still a long way to go in order to obtain protocols that are efficient enough to be used in practice. In these cases, I am interested in the algorithmic process of finding more and more efficient protocols.

I have prepared a page with resources on how to get started with studying secure multiparty computation (MPC).

More about my research projects can be found here.

I am one of the co-inventors of the AES-GCM-SIV mode of operation; information can be found here.

See the Cryptography Research Group homepage for more information about cryptography research and activities at Bar-Ilan.


Publications (all available online)

At PKC 2013, I gave an invited talk on Techniques for Efficient Secure Computation Based on Yao's Protocol.


Videos

Some of my lectures and talks have been filmed and can be found online:

Professional Activities

Member of the ERC starting grant panel (PE6 - Computer Science and Informatics): 2015, 2017, and 2019.

Program chair for TCC 2014.

Program committee member for the following conferences:

Co-organizer of the following workshops:


Teaching

Webpages for courses:


Students, Postdocs and Visitors


My Books

Book Jacket for Introduction to Modern Cryptography 3rd Edition
Introduction to Modern Cryptography, 3rd Edition, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, December 2020.

The preface and table of contents is available for perusal. More details on the book, including errata and book reviews, can be found here.

See CRC and Amazon for purchase information.

Book Jacket for Tutorials on the Foundations of Cryptography
Tutorials on the Foundations of Cryptography (Dedicated to Oded Goldreich), Yehuda Lindell Ed.
Series on Information Security and Cryptography, Springer, 2017.

See Amazon for purchase information.

Go here for online access.

Book Jacket for Introduction to Modern Cryptography 2nd Edition
Introduction to Modern Cryptography, 2nd Edition, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, November 2014.

The preface and table of contents is available for perusal. More details on the book, including errata and book reviews, can be found here.

See CRC and Amazon for purchase information.

Book Jacket for LNCS 8349
11th International Conference on the Theory of Cryptography (TCC 2014), Yehuda Lindell Ed.
Lecture Notes in Computer Science, Volume 8349, Springer, 2014.

Go here for online access.

Book Jacket for Efficient Secure Two-Party Protocols
Efficient Secure Two-Party Protocols: Techniques and Constructions, by Carmit Hazay and Yehuda Lindell
Information Security and Cryptography Series, Springer-Verlag, 2010.

The preface, table of contents and introduction are available for perusal. More details on the book (including errata) can be found here, and a review of the book that appeared in SIGACT NEWS can be found here.

See the Springer website or Amazon for purchase information, and go here for online access.

Although this book is intended for those with background in cryptography, we were pleasantly surprised to see that it is being used by a more general audience, and even quite young readers seem to have enjoyed it. See examples here, here, and here.

Book Jacket for Introduction to Modern Cryptography
Introduction to Modern Cryptography, by Jonathan Katz and Yehuda Lindell.
Chapman and Hall/CRC Press, August 2007.

The preface, table of contents and index and introduction are available for perusal. More details on the book, including errata and book reviews, can be found here. A solutions manual, containing solutions to all of the exercises in the book, can be obtained directly from the publisher by any instructor who adopts the book.

See CRC and Amazon for purchase information, and download the promotional flyer.

Book Jacket for LNCS 2815
Composition of Secure Multi-Party Protocols - A Comprehensive Study, by Yehuda Lindell
Lecture Notes in Computer Science, Volume 2815, Springer-Verlag, 2003.

More details can be found here.

See purchase information and online access.