Shabsi Walfish

New York University
Courant Institute for Mathematical Sciences
Department of Computer Science

Phone: (available by request)
Email: walfish AT cs DOT nyu DOT edu  




Please note: As of January 2008, I have completed my Ph.D. studies at NYU. I am currently a member of Application Security group at Google (in Mountain View, California).

My research interests include Cryptography (both theoretical and applied aspects), and Computer Security. While at NYU, I was a member of the cryptography group. My Ph.D. thesis is titled Enhanced Security Models for Network Protocols (abstract), and it was written under the guidance of my advisor, Professor Yevgeniy Dodis. In addition to cryptography, I also maintain an active interest in topics related to Electrical Engineering, which I studied at Cooper Union, as well as general topics in Computer Science.

Please see my complete Curriculum Vitae (slightly out of date) for further details.

Teaching  at NYU

Courses I taught at NYU:
Courses I was a Teaching Assistant for:

Selected Publications (in reverse chronological order)

  1. Ph.D. thesis: "Enhanced Security Models for Network Protocols",
    New York University, December 2007.

  2. Ran Canetti, Yevgeniy Dodis, Rafael Pass, and Shabsi Walfish.
    "Universally Composable Security with Global Setup",
    Theory of Cryptography Conference (TCC 2007), February 2007.

    A full version is available from the Cryptology ePrint Archive, Report 2006/432.

  3. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard Lipton and Shabsi Walfish.
    "Intrusion-Resilient Key Exchange in the Bounded Retrieval Model",
    Theory of Cryptography Conference (TCC 2007), February 2007.

  4. Giovanni Di Crescenzo, Richard Lipton, and Shabsi Walfish.
    "Perfectly Secure Password Protocols in the Bounded Retrieval Model",
    Theory of Cryptography Conference (TCC 2006), March 2006.

  5. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki and Shabsi Walfish.
    "Versatile Padding Schemes for Joint Signature and Encryption",
    ACM Conference on Computer and Communication Security (CCS 2004), October 2004.

    A full version of this paper, without the key-exchange protocol, is available from the Cryptology ePrint Archive, Report 2004/020.