Prof. Yehuda Lindell

Prof.
Prof. Yehuda Lindell
Telephone: 
Office: 

Publications

  1. Lindell, Yehuda "Lower Bounds and Impossibility Results for Concurrent Self Composition" Journal of Cryptology (in press).
     
  2. Gennaro, Rosario, Lindell, Yehuda. "A Framework for Password-Based Authenticated Key Exchange" ACM Transactions On Information And System Security (in press).
     
  3. Kalai, Yael, Lindell, Yehuda, Prabhakaran, Manoj. "Concurrent Composition of Secure Protocols in the Timing Model" Journal of Cryptology (in press).
     
  4. Katz, Jonathan, Lindell, Yehuda. "Handling Expected Polynomial-Time Strategies in Simulation-Based Proofs" Journal of Cryptology (in press).
     
  5. Lindell, Yehuda, Pinkas, Benny. "A Proof of Security of Yao's Protocol for Secure Two-Party Computation" Journal of Cryptology (in press).
     
  6. Katz, Jonathan, Lindell, Yehuda. ; Introduction to Modern Cryptography , 528 pp., CRC Press, 2007.
     
  7. Barak, Boaz, Lindell, Yehuda, Vadhan, Salil. "Lower-Bounds for Non-Black-Box Zero Knowledge" Journal of Computer And System Sciences, vol. 72, 2006, p. 321-391.
     
  8. Canetti, Ran , Kushilevitz, Eyal, Lindell, Yehuda. "On the Limitations of Universally-Composable Two-Party Computation Without Set-Up Assumptions" Journal of Cryptology, vol. 19, 2006, p. 135-167.
     
  9. Lindell, Yehuda. "A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions" Journal of Cryptology, vol. 19, 2006, p. 359-377.
     
  10. Goldreich, Oded, Lindell, Yehuda. "Session-Key Generation Using Human Passwords Only" Journal of Cryptology, vol. 19, 2006, p. 241-340.
     
  11. Lindell, Yehuda "Protocols for Bounded-Concurrent Secure Two-Party Computation Without Setup Assumptions" Chicago Journal of Theoretical Computer Science, vol. 2006, 2006, p. 1-50.
     
  12. Lindell, Yehuda, Lysyanskaya, Anna, Rabin, Tal. "On the Composition of Authenticated Byzantine Agreement" Journal of the ACM, vol. 53, 2006, p. 881-917.
     
  13. Goldwasser, Shafi, Lindell, Yehuda. "Secure Computation Without Agreement" Journal of Cryptology, vol. 18, 2005, p. 247-287.
     
  14. Lindell, Yehuda. "Secure Computation for Privacy Preserving Data Mining" (ed.) Encyclopedia of Data Warehousing And Mining, Idea Group Publishing, 2005. Available: http://www.idea-group.com/encyclopedia/details.asp?ID=4465.
     
  15. Barak, Boaz, Lindell, Yehuda. "Strict Polynomial-Time in Simulation and Extraction" SIAM Journal On Computing, vol. 33, 2004, p. 783-818.
     
  16. Lindell, Yehuda. "Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation" Journal of Cryptology, vol. 16, 2003, p. 143-184.
     
  17. Aumann, Yonatan, Lindell, Yehuda. "A Statistical Theory for Quantitative Association Rules" Journal of Intelligent Information Systems, vol. 20, 2003, p. 255-283.
     
  18. Lindell, Yehuda. ; (ed.) Composition of Secure Multi-Party Protocols - A Comprehensive Study , 192 pp., Springer-Verlag, 2003. Available: http://www.springeronline.com/3-540-20105-X.
     
  19. Lindell, Yehuda, Pinkas, Benny. "Privacy Preserving Data Mining" Journal of Cryptology, vol. 15, 2002, p. 177-206.

Research

 Cryptography, Secure Protocols, Theoretical Foundations