Orr Dunkelman's CV Updated: November 2015 Curriculum Vitae Orr Dunkelman Updated: November 2015 Department of Computer Science Tel:+972-4-828-8447, +972-54-529-1912 University of Haifa Fax: +972-4-824-9331 Haifa 31905 Email: [email protected] Israel Web page: http://www.cs.haifa.ac.il/~orrd/ Born: Israel, 2th of December, 1980 Family status: Married + 2 Citizenship: Israeli Research and Professional Experience Department of Computer Science { UNIVERSITY OF HAIFA Feb. 2011{present Associate professor. Faculty of Mathematics and Computer Science { WEIZMANN IN- Feb. 2011{present STITUTE OF SCIENCE Associated researcher. Faculty of Mathematics and Computer Science { WEIZMANN IN- Oct. 2009{Jan. 2011 STITUTE OF SCIENCE Post-doctoral researcher position. D´epartement d'Informatique { ECOLE´ NORMALE SUPERIEURE´ Apr. 2008{Sep. 2009 Post-doctoral researcher position. { Part of the ECRYPT 2 research effort (Apr. 2008{Sep. 2009). Dept. Elektrotechniek-ESAT SCD/COSIC { KATHOLIEKE UNI- Oct. 2006{Mar. 2008 VERSITEIT LEUVEN Post-doctoral researcher position. { Part of the ECRYPT research effort (Oct. 2006{Mar. 2008). TECHNION { ISRAEL INSTITUTE OF TECHNOLOGY Jun. 1998{Oct. 2006 Research as part of the Ph.D. studies. { Part of the NESSIE research effort (Feb. 2000{Mar. 2003). Research Interests Design and cryptanalysis of symmetric key primitives. Cryptanalytic methods and techniques. Privacy in the digital world. Computer security. 1 Orr Dunkelman's CV Updated: November 2015 Education TECHNION { ISRAEL INSTITUTE OF TECHNOLOGY Mar. 2000{Feb. 2006 Ph.D. in Computer Science. Dissertation: Techniques for Cryptanalysis of Block Ciphers. Studied in the direct program towards Ph.D., formal enrollment Feb. 2002. Advisor: Prof. Eli Biham TECHNION { ISRAEL INSTITUTE OF TECHNOLOGY Oct. 1997{Mar. 2000 B.A. in Computer Science. Studied in the Technion's excellence program. Graduated \Summa cum laude" Teaching Experience LECTURER Oct. 2003{Oct. 2006 & Mar. 2010{present UNIVERSITY OF HAIFA: G Introduction to Cryptography (203.4444): { Winter 2015/16 (lecturer in charge) { Winter 2014/15 (lecturer in charge) { Winter 2013/14 (lecturer in charge) { Winter 2012/13 (lecturer in charge) { Spring 2011 (lecturer in charge) G Computer and Network Security (203.4448): { Winter 2015/16 (lecturer in charge) { Winter 2014/15 (lecturer in charge) { Winter 2013/14 (lecturer in charge) { Winter 2012/13 (In conjuction with the Technion's course) { Winter 2011/12 (lecturer in charge) U Computer Networks (203.3210): { Spring 2015 (lecturer in charge) { Spring 2014 (lecturer in charge) { Spring 2013 (lecturer in charge) G Seminar in Block Cipher Cryptanalysis (203.4325): { Spring 2013 (lecturer in charge) U Seminar in Computer Security (203.3365): { Spring 2015 (lecturer in charge) { Spring 2014 (lecturer in charge) { Winter 2012/3 (lecturer in charge) U Discrete Mathematics (203.1850): { Spring 2012 (lecturer in charge) G Seminar in Cryptanalysis of Hash Functions (203.4485): { Spring 2012 (lecturer in charge) WEIZMANN INSTITUTE OF SCIENCE: G Design and Analysis of Hash Functions: { Winter 2010/11 (along with Prof. Shamir) G Secret Key Cryptography and Cryptanalysis: { Spring 2010 (along with Prof. Shamir) TECHNION { ISRAEL INSTITUTE OF TECHNOLOGY: G Advanced Topics in Computer Security (236602): { Winter 2005/6 (lecturer in charge: Prof. Biham) G Computer Security (236350): { Winter 2013 (lecturer in charge: Dr. Bitan) 2 Orr Dunkelman's CV Updated: November 2015 { Spring 2010 (lecturer in charge: Dr. Bitan) { Spring 2006 (as lecturer in charge) { Spring 2005 (lecturer in charge: Prof. Biham) { Winter 2004/5 (lecturer in charge: Dr. Bitan) { Spring 2004 (lecturer in charge: Dr. Bitan) { Winter 2003/4 (lecturer in charge: Dr. Bitan) TEACHING ASSISTANT Oct. 1999{Oct. 2003 TECHNION { ISRAEL INSTITUTE OF TECHNOLOGY: G Modern Cryptology (236506): { Winter 2002/3 (lecturer in charge: Prof. Biham) { Winter 2001/2 (lecturer in charge: Prof. Biham) { Winter 2000/1 (lecturer in charge: Prof. Biham) { Winter 1999/2000 (lecturer in charge: Prof. Even) G Advanced Topics in Cryptology: { Spring 2003 (236612, lecturer in charge: Prof. Biham) { Spring 2002 (236612, lecturer in charge: Prof. Biham) { Spring 2001 (236612, lecturer in charge: Prof. Biham) { Spring 2000 (236606, lecturer in charge: Prof. Biham) G Numerical Analysis 2 (236320): { Spring 2003 (exercise checking, lecturer in charge: Prof. Sidi) { Spring 2002 (exercise checking, lecturer in charge: Prof. Sidi) G Computer Security (236350): { Spring 2003 (lecturer in charge: Dr. Bitan) SCHOOL TEACHER Oct. 1998{Jun. 1999 HA'REALI SCHOOL, HAIFA, ISRAEL Tutoring mathematics and cryptography for gifted children. (U stands for an undergraduate course, G stands for a graduate course) Research Grants 1. Transfer Learning/Domain Adaptation and Advance Behavioral Analysis in sparse data for Fraud De- tection Applications, joint research project with R. El-Yaniv, S. Manor, C. Crammer (all four of us PIs), 26,500 USD, 2012{2013. 2. Secure Lightweight Cryptography, G.I.F. grant 2082/2011, 22,000 EUR, 2013. 3. Security Analysis of Cryptographic Hash Functions, I.S.F. grant, 190,000 ILS/year for four years, 2012{ 2016. In addition, a one-time equipment grant of 1,560,000 ILS was granted. 4. Privacy Enhancing Technologies for Biometric Data Usage and Storage, joing research project with M. Osadchy and M. Naor (I am the PI), Israel's Ministry of Science and Technology grant 3-9774, 659,699 ILS for three years, 2012{2016. 5. Biometric Key Generation, joint research project with M. Osadchy, Israel's Department of Defense Research & Development (MAFAT), 75,000 ILS/year for two years, 2014{2016. 6. Post-Quantum Cryptography for Long-Term Security, EU research project headed by T. Lange (with 11 participating universities), 161,500 EUR for three years, 2015{2018. 7. Improving Cyber Security using Realistic Synthetic Face Generation, joint research project with S. Gib- son, J. C. Hernandez-Castro, C. Solomon, M. Osadchy, 484,600 ILS for three years, 2015{2017. 3 Orr Dunkelman's CV Updated: November 2015 8. Title confidential at the request of the funding source, joint research with N. Keller, 53,000 USD for a year, 2015. (In joint grants, the amount reported is my share) Honors and Awards 1. 2014, Krill award. 2. 2012, Best Paper Award, CRYPTO 2012. 3. 2012, Best Paper Award, Fast Software Encryption 2012. 4. 2010{2011, Clore Post-Doctoral Fellowship. 5. 2010, Distinguished Lecturer (Top 12%), Technion. 6. 2008{2009, France Telecom Chaire (for postdoctoral studies). 7. 2006{2007, Rothschild Post-Doctoral Fellowship. 8. 2006, Distinguished Lecturer (Top 15%), Technion. 9. 2003{2006, Clore Ph.D. Scholarship. 10. 2000, Excellence Scholarship, Technion. Steering Committees 2008{2013, 2015 Selected Areas in Cryptography workshop board 2009{2012 Fast Software Encryption steering committee 2012{2014 Cryptographers' Track of RSA (CT-RSA) steering committee Editorial Boards 2009{present International Journal of Applied Cryptography (IJACT) 2010{present International Journal of Computer Mathematics (JCOM) Project Reviewer for 1. US-Israel Bi-National Science Foundation 2. US National Science Foundation 3. Research Foundation Flanders (FWO) (Belgium) 4. Israel's Ministry of Science and Technology (MOST) National Cyber Program Invited Panelist 1. NIST Hash Function Workshop | \SHA-256: A Suitable Replacement for SHA-1?", Gaithersburg, MD, USA, 31/10/05 2. Haifa Law & Technology Center's workshop Privacy Workshop: from Theory to Practice | commentator on \S-M-L-XL Data: Big Data as a New Informational Privacy Paradigm", University of Haifa, 12/12/13 4 Orr Dunkelman's CV Updated: November 2015 Invitation-Only Workshops (and talks given at them) Dagstuhl Seminars: Symmetric Cryptography Seminar { A Unified Approach for Related Key Attacks 07021 (Jan. 2007) Symmetric Cryptography Seminar { SHAvite-3 - A New and Secure Hash Function 09031 (Jan. 2009) International View of the State-of-the- A Somewhat Historic View of Lightweight Cryptography Art of Cryptography and Security and its Use in Practice { 11262 (Jun. 2011) Symmetric Cryptography Seminar { 1. An IDEA to Consider 12031 (Jan. 2012) 2. Multiple Results on Multiple Encryption Symmetric Cryptography Seminar { Sweet16: YALWBC, But Slightly Different 14021 (Jan. 2014) Other Events: Early Symmetric Crypto, Echternach, 1. Improved Meet-in-the-Middle Attacks on Reduced-Round Luxembourg (Jan. 2008) DES 2. What is the Best Attack? Hash functions in cryptology: theory Re-Visiting HAIFA and why you should Visit too and practice, Lorentz Center, Leiden, The Netherlands (Jun. 2008) Early Symmetric Crypto, Remich, Lux- 1. Attacks of Practical Time Complexity on the A5/3 Underly- embourg (Jan. 2010) ing Block Cipher 2. Low Data Complexity Attacks on AES 3. And Now for Something Completely Impossible Early Symmetric Crypto, Mondorf-les- New Directions in Dividing: Le Fabuleux Destin d'MISTY1 Bains, Luxembourg (Jan. 2013) (The Case of MISTY1) International State of the Art in Cryp- Does Lightweight Cryptography Imply Slightsecurity? tography | Security (May 2013) Invited Talks International Venues: 1 Hash Functions | Much Ado about Something | given at Elliptic Curves Cryptography 2008, Utrecht, The Netherlands, 23/9/08. 2 Key Recovery Attacks of Practical Complexity on AES Variants | given at IWCNS 2009, Taipei, Taiwan, 15/12/09. 3 The Hitchhiker's Guide to the SHA-3 Competition | given at Latincrypt 2010, Puebla, Mexico, 10/8/10. 4 From Multiple Encryption to Knapsacks Efficient Dissection of Composite Problems, given at IN-
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages16 Page
-
File Size-