Building Blockchain Wallets – Challenges and Solutions (13th BIU Winter School), 2023
Sigma Protocols and Zero Knowledge (85 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
Secure Two-Party Computation for Malicious Adversaries (90 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
The Yao Construction and its Proof of Security (70 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
Secure Computation: Background and Definitions (90 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
The IPS Compiler: Optimizations, Variants and Concrete Efficiency (20 minutes), CRYPTO conference, 2011.
Secure Computation on the Web: Computing without Simultaneous Interaction (20 minutes), CRYPTO conference, 2011.
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries (11 minutes), CRYPTO conference, 2013.
Secure Two-Party Computation in Practice: Part 3 (40 minutes). Technion Summer School on Security, 2013.
Secure Two-Party Computation in Practice: Part 2 (50 minutes). Technion Summer School on Security, 2013.
Secure Two-Party Computation in Practice: Part 1 (60 minutes). Technion Summer School on Security, 2013.
Invited Talk: Efficient Two-Party Secure Computation for Semi-Honest and Malicious Adversaries (60 minutes), Microsoft Workshop on Applied Multiparty Computation, 2014.
Optimizing Yao and GMW for Semi Honest Adversaries (53 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Secure Computation Tutorial: Security Against Malicious Adversaries (40 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Secure Computation Tutorial: Efficient Zero-Knowledge (53 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Secure Computation Tutorial: Definitions and Oblivious Transfer (90 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Fast Garbling of Circuits Under Standard Assumptions (35 minutes), Simons Institute Workshop on Securing Computation, 2015.
High-Throughput Secure Three-Party Computation with an Honest Majority (45 minutes), I-CORE day, 2017.
Fast Secure Two Party ECDSA Signing (22 minutes), CRYPTO conference, 2017.
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation (30 minutes), ACM CCS 2017 (winner of best paper award).
Introduction to Cryptography (in Hebrew), course given at Bar-Ilan University in 2018-2019.