Back to the list of the institutes
Publications
Stefan Dziembowski
Number of publications: 542024
- Gianluca Brian, Stefan Dziembowski , Sebastian Faust, From Random Probing to Noisy Leakages Without Field-Size Dependence, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, 26 May 2024 - 30 May 2024. See in PBN
2023
- Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski , Małgorzata Gałązka, Tomasz Lizurej , Krzysztof Pietrzak, Efficiently Testable Circuits, 14th Innovations in Theoretical Computer Science Conference, Cambridge, the United States of America, 10 January 2023 - 13 January 2023, 251 2023, p. 10:1-10:23. See in PBN
- Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski , Małgorzata Gałązka, Tomasz Lizurej , Krzysztof Pietrzak, Efficiently Testable Circuits Without Conductivity, Theory of Cryptography, Taipei, Taiwan (Province of China), 29 November 2023 - 2 December 2023. See in PBN
- Stefan Dziembowski , Sebastian Faust, Tomasz Lizurej , Individual Cryptography, 43rd Annual International Cryptology Conference, Santa Barbara, the United States of America, 19 August 2023 - 24 August 2023. See in PBN
- Stefan Dziembowski , Paweł Kędzior , Non-Atomic Payment Splitting in Channel Networks, 5th International Conference on Advances in Financial Technologies, Princeton, the United States of America, 23 October 2023 - 25 October 2023, 282 2023, p. 17:1-17:23. See in PBN
- Tomasz Lizurej , Tomasz Michalak , Stefan Dziembowski , On Manipulating Weight Predictions in Signed Weighted Networks, Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Washington, the United States of America, 7 February 2023 - 14 February 2023, 37 (4) 2023, p. 5222-5229. See in PBN
2021
- Grzegorz Fabiański , Stefan Dziembowski , Siavash Riahi, Sebastian Faust, Lower bounds for off-chain protocols: Exploring the limits of plasma, 12th Innovations in Theoretical Computer Science, virtual, ZZ, 6 January 2021 - 8 January 2021, 185 2021, p. 72:1--72:20. See in PBN
- Suvradip Chakraborty, Stefan Dziembowski , Malgorzata Galazka, Tomasz Lizurej , Krzysztof Pietrzak, Michelle Yeo, Trojan-Resilience Without Cryptography, 19th Theory of Cryptography Conference, Raleigh, the United States of America, 8 November 2021 - 11 November 2021, 13043 2021, p. 397--428. See in PBN
2020
- Suvradip Chakraborty, Stefan Dziembowski , Jesper Buus Nielsen, Reverse Firewalls for Actively Secure MPCs, 40th International Cryptology Conference, Santa Barbara, the United States of America, 17 August 2020 - 21 August 2020, 12171 2020, p. 732--762. See in PBN
2019
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková, Multi-party Virtual State Channels, 38th International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19 May 2019 - 23 May 2019, 1 2019, p. 625-656. See in PBN
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, Daniel Malinowski, Perun: Virtual Payment Hubs over Cryptocurrencies, IEEE Symposium on Security and Privacy Workshops, San Francisco, the United States of America, 19 May 2019 - 23 May 2019. See in PBN
- Stefan Dziembowski , Sebastian Faust, Karol Żebrowski, Simple Refreshing in the Noisy Leakage Model, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8 December 2019 - 12 December 2019, 3 2019, p. 315-344. See in PBN
- Alexandre Duc, Stefan Dziembowski , Sebastian Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage, Journal of Cryptology, 32 (1) 2019, p. 151-177. See in PBN
2018
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, FairSwap: How To Fairly Exchange Digital Goods, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15 October 2018 - 19 October 2018. See in PBN
- Stefan Dziembowski , Sebastian Faust, Kristina Host\'akov\'a, General State Channel Networks, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15 October 2018 - 19 October 2018. See in PBN
- Stefan Dziembowski , Krzysztof Pietrzak, Daniel Wichs, Non-Malleable Codes, JOURNAL OF THE ACM, 65 (4) 2018, p. 1-32. See in PBN
- Stefan Dziembowski , Tomasz Kazana , Maciej Zdanowicz, Quasi chain rule for min-entropy, Information Processing Letters, 134 2018, p. 62-66. See in PBN
2017
- Marcin Andrychowicz, Stefan Dziembowski , Sebastian Faust, Circuit Compilers with O(1/log(n)) Leakage Rate, 2017. See in PBN
- Joshua Brody, Stefan Dziembowski , Sebastian Faust, Krzysztof Pietrzak, Position-Based Cryptography and Multiparty Communication Complexity, Theory of Cryptography Conference 2017, 1 2017, p. 56-81. See in PBN
2016
- Konrad Durnoga, Stefan Dziembowski , Tomasz Kazana , Michał Zając, Maciej Zdanowicz, Bounded-Retrieval Model with Keys Derived from Private Data, Lecture Notes in Computer Science, 2016. See in PBN
- Wacław Banasik, Stefan Dziembowski , Daniel Malinowski, Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts, European Symposium on Research in Computer Security 2016, 2016. See in PBN
- Stefan Dziembowski , Sebastian Faust, Maciej Skórski, Optimal Amplification of Noisy Leakages, 2016. See in PBN
- Stefan Dziembowski , Sebastian Faust, Franćcois-Xavier Standaert, Private Circuits III: Hardware Trojan-Resilience via Testing Amplification, 016 ACM SIGSAC Conference on Computer and Communications Security, 2016. See in PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Secure Multiparty Computations on Bitcoin, Communications of the ACM, 2016. See in PBN
- Stefan Dziembowski , Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert, Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems, CRYPTO 2016, 2016. See in PBN
2015
- Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski , Sebastian Faust, Antigoni Polychroniadou, Efficient Leakage Resilient Circuit Compilers, Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, 20 April 2015 - 24 April 2015. See in PBN
- Divesh Aggarwal, Maciej Obremski, Tomasz Kazana , Stefan Dziembowski , Leakage-Resilient Non-malleable Codes, Theory of Cryptography Conference 2015, 2015. See in PBN
- Divesh Aggarwal, Stefan Dziembowski , Tomasz Kazana , Maciej Obremski, Leakage-Resilient Non-malleable Codes Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}, 2015. See in PBN
- Stefan Dziembowski , Sebastian Faust, Maciej Skórski, Noisy Leakage Revisited, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}, 26 April 2015 - 30 April 2015. See in PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, On the Malleability of Bitcoin Transactions, Bitcoin Workshop, 2015. See in PBN
- Marcin Andrychowicz, Stefan Dziembowski , PoW-Based Distributed Cryptography with No Trusted Setup, Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}, 2015. See in PBN
- Stefan Dziembowski , Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak, Proofs of Space, Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}, 2015. See in PBN
2014
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Fair Two-Party Computations via Bitcoin Deposits, Bitcoin Workshop, 2014. See in PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Modeling Bitcoin Contracts by Timed Automata, Formal Modeling and Analysis of Timed Systems - 12th International Conference, {FORMATS} 2014, Florence, Italy, September 8-10, 2014. Proceedings, 2014. See in PBN
- Stefan Dziembowski , Tomasz Kazana , Konrad Durnoga, Michal Zajac, One-Time Programs with Limited Memory, 9th China International Conference on Information Security and Cryptology (Inscrypt), Guangzhou, China, 27 November 2013 - 30 November 2013. See in PBN
- Stefan Dziembowski , Maciej Zdanowicz, Position-Based Cryptography from Noisy Channels, AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, 2014. See in PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Secure Multiparty Computations on Bitcoin, 2014. See in PBN
- Alexandre Duc, Stefan Dziembowski , Sebastian Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage, 2014. See in PBN
2013
- Stefan Dziembowski , Michał Jastrzębski, International Conference on Information Theoretic Security (ICITS 2013), 2013. See in PBN
- Stefan Dziembowski , Tomasz Kazana , Maciej Obremski, Non-malleable Codes from Two-Source Extractors, Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2013, 2013. See in PBN
2012
- Stefan Dziembowski , Sebastian Faust, Leakage-Resilient Circuits without Computational Assumptions, 2012. See in PBN
2011
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , Key-Evolution Schemes Resilient to Space-Bounded Leakage, Lecture Notes in Computer Science, 2011. See in PBN
- Stefan Dziembowski , Sebastian Faust, Leakage-Resilient Cryptography from the Inner-Product Extractor., Lecture Notes in Computer Science, 2011. See in PBN
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , One-time Computable and Uncomputable Functions, Lecture Notes in Computer Science, 2011. See in PBN
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , One-Time Computable Self-erasing Functions, 2011. See in PBN
2010
- Stefan Dziembowski , How to Pair with a Human, Lecture Notes in Computer Science, 2010. See in PBN
- Stefan Dziembowski , Leakage-Resilient Storage, Lecture Notes in Computer Science, 2010. See in PBN
- Krzysztof Pietrzak, Daniel Wichs, Stefan Dziembowski , Non-Malleable Codes, 2010. See in PBN
2006
- Stefan Dziembowski , Intrusion-Resilience Via the Bounded-Storage Model, Lecture Notes in Computer Science, 2006. See in PBN
- Stefan Dziembowski , On Forward-Secure Storage, Lecture Notes in Computer Science, 2006. See in PBN
2004
- Ran Canetti, Ivan Damgard, Stefan Dziembowski , Yuval Ishai, Tal Malkin, Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, 2004. See in PBN
- Stefan Dziembowski , Ueli Mauer, On Generating the Initial Key in the Bounded-Storage Model, Lecture Notes in Computer Science, 2004. See in PBN
- Stefan Dziembowski , Ueli Mauer, Optimal Randomizer Efficiency in the Bounded-Storage Model, Journal of Cryptology, 2004. See in PBN
2002
- Stefan Dziembowski , Ueli Maurer, Tight Security Proofs for the Bounded-Storage Model, SYMPOSIUM ON THEORY OF COMPUTING, 2002. See in PBN