YehudaLindell

Yehuda Lindell

Head of Cryptography at Coinbase
Professor at Bar-Ilan University (on leave)

Yehuda Lindell

YehudaLindell

Head of Cryptography at Coinbase
Professor at Bar-Ilan University (on leave)

Videos

Building MPC Wallets (EthCC 2023)
Building Blockchain Wallets – Challenges and Solutions (13th BIU Winter School), 2023
Building Blockchain Wallets – Technical Details (13th BIU Winter School), 2023
Conservative Cryptographic Design for Threshold Signing and More, Stanford Science of Blockchain Conference 2022
The MPC Journey from Theoretical Foundations to Commercial Technology Invited Talk at CRYPTO 2022
OMG! People are actually implementing my papers! Invited Talk at TPMPC 2022
Introduction to MPC, virtual meetup, January 2021
Introduction to Cryptography (in Hebrew), course given at Bar-Ilan University in 2018-2019.
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation (30 minutes), ACM CCS 2017 (winner of best paper award).
Fast Secure Two Party ECDSA Signing (22 minutes), CRYPTO conference, 2017.
High-Throughput Secure Three-Party Computation with an Honest Majority (45 minutes), I-CORE day, 2017.
Fast Garbling of Circuits Under Standard Assumptions (35 minutes), Simons Institute Workshop on Securing Computation, 2015.
Secure Computation Tutorial: Definitions and Oblivious Transfer (90 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Secure Computation Tutorial: Efficient Zero-Knowledge (53 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Secure Computation Tutorial: Security Against Malicious Adversaries (40 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Optimizing Yao and GMW for Semi Honest Adversaries (53 minutes), 5th BIU Winter School – Advances in Practical Secure Computation, 2015.
Invited Talk: Efficient Two-Party Secure Computation for Semi-Honest and Malicious Adversaries (60 minutes), Microsoft Workshop on Applied Multiparty Computation, 2014.
Secure Two-Party Computation in Practice: Part 1 (60 minutes). Technion Summer School on Security, 2013.
Secure Two-Party Computation in Practice: Part 2 (50 minutes). Technion Summer School on Security, 2013.
Secure Two-Party Computation in Practice: Part 3 (40 minutes). Technion Summer School on Security, 2013.
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries (11 minutes), CRYPTO conference, 2013.
Secure Computation on the Web: Computing without Simultaneous Interaction (20 minutes), CRYPTO conference, 2011.
The IPS Compiler: Optimizations, Variants and Concrete Efficiency (20 minutes), CRYPTO conference, 2011.
Secure Computation: Background and Definitions (90 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
The Yao Construction and its Proof of Security (70 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
Secure Two-Party Computation for Malicious Adversaries (90 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
Sigma Protocols and Zero Knowledge (85 minutes), 1st BIU Winter School – Secure Computation and Efficiency, 2011.
Skip to content