Powrót do listy instytutów
Publikacje
Stefan Dziembowski
Liczba publikacji: 542024
- Gianluca Brian, Stefan Dziembowski , Sebastian Faust, From Random Probing to Noisy Leakages Without Field-Size Dependence, 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, 26 maja 2024 - 30 maja 2024. Zobacz w PBN
2023
- Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski , Małgorzata Gałązka, Tomasz Lizurej , Krzysztof Pietrzak, Efficiently Testable Circuits, 14th Innovations in Theoretical Computer Science Conference, Cambridge, the United States of America, 10 stycznia 2023 - 13 stycznia 2023, 251 2023, s. 10:1-10:23. Zobacz w PBN
- Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski , Małgorzata Gałązka, Tomasz Lizurej , Krzysztof Pietrzak, Efficiently Testable Circuits Without Conductivity, Theory of Cryptography, Taipei, Taiwan (Province of China), 29 listopada 2023 - 2 grudnia 2023. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Tomasz Lizurej , Individual Cryptography, 43rd Annual International Cryptology Conference, Santa Barbara, the United States of America, 19 sierpnia 2023 - 24 sierpnia 2023. Zobacz w PBN
- Stefan Dziembowski , Paweł Kędzior , Non-Atomic Payment Splitting in Channel Networks, 5th International Conference on Advances in Financial Technologies, Princeton, the United States of America, 23 października 2023 - 25 października 2023, 282 2023, s. 17:1-17:23. Zobacz w PBN
- Tomasz Lizurej , Tomasz Michalak , Stefan Dziembowski , On Manipulating Weight Predictions in Signed Weighted Networks, Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Washington, the United States of America, 7 lutego 2023 - 14 lutego 2023, 37 (4) 2023, s. 5222-5229. Zobacz w PBN
2021
- Grzegorz Fabiański , Stefan Dziembowski , Siavash Riahi, Sebastian Faust, Lower bounds for off-chain protocols: Exploring the limits of plasma, 12th Innovations in Theoretical Computer Science, virtual, ZZ, 6 stycznia 2021 - 8 stycznia 2021, 185 2021, s. 72:1--72:20. Zobacz w PBN
- Suvradip Chakraborty, Stefan Dziembowski , Malgorzata Galazka, Tomasz Lizurej , Krzysztof Pietrzak, Michelle Yeo, Trojan-Resilience Without Cryptography, 19th Theory of Cryptography Conference, Raleigh, the United States of America, 8 listopada 2021 - 11 listopada 2021, 13043 2021, s. 397--428. Zobacz w PBN
2020
- Suvradip Chakraborty, Stefan Dziembowski , Jesper Buus Nielsen, Reverse Firewalls for Actively Secure MPCs, 40th International Cryptology Conference, Santa Barbara, the United States of America, 17 sierpnia 2020 - 21 sierpnia 2020, 12171 2020, s. 732--762. Zobacz w PBN
2019
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková, Multi-party Virtual State Channels, 38th International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19 maja 2019 - 23 maja 2019, 1 2019, s. 625-656. Zobacz w PBN
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, Daniel Malinowski, Perun: Virtual Payment Hubs over Cryptocurrencies, IEEE Symposium on Security and Privacy Workshops, San Francisco, the United States of America, 19 maja 2019 - 23 maja 2019. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Karol Żebrowski, Simple Refreshing in the Noisy Leakage Model, 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8 grudnia 2019 - 12 grudnia 2019, 3 2019, s. 315-344. Zobacz w PBN
- Alexandre Duc, Stefan Dziembowski , Sebastian Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage, Journal of Cryptology, 32 (1) 2019, s. 151-177. Zobacz w PBN
2018
- Stefan Dziembowski , Lisa Eckey, Sebastian Faust, FairSwap: How To Fairly Exchange Digital Goods, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15 października 2018 - 19 października 2018. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Kristina Host\'akov\'a, General State Channel Networks, 25th ACM Conference on Computer and Communications Security, Toronto, Canada, 15 października 2018 - 19 października 2018. Zobacz w PBN
- Stefan Dziembowski , Krzysztof Pietrzak, Daniel Wichs, Non-Malleable Codes, JOURNAL OF THE ACM, 65 (4) 2018, s. 1-32. Zobacz w PBN
- Stefan Dziembowski , Tomasz Kazana , Maciej Zdanowicz, Quasi chain rule for min-entropy, Information Processing Letters, 134 2018, s. 62-66. Zobacz w PBN
2017
- Marcin Andrychowicz, Stefan Dziembowski , Sebastian Faust, Circuit Compilers with O(1/log(n)) Leakage Rate, 2017. Zobacz w PBN
- Joshua Brody, Stefan Dziembowski , Sebastian Faust, Krzysztof Pietrzak, Position-Based Cryptography and Multiparty Communication Complexity, Theory of Cryptography Conference 2017, 1 2017, s. 56-81. Zobacz w PBN
2016
- Konrad Durnoga, Stefan Dziembowski , Tomasz Kazana , Michał Zając, Maciej Zdanowicz, Bounded-Retrieval Model with Keys Derived from Private Data, Lecture Notes in Computer Science, 2016. Zobacz w PBN
- Wacław Banasik, Stefan Dziembowski , Daniel Malinowski, Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts, European Symposium on Research in Computer Security 2016, 2016. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Maciej Skórski, Optimal Amplification of Noisy Leakages, 2016. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Franćcois-Xavier Standaert, Private Circuits III: Hardware Trojan-Resilience via Testing Amplification, 016 ACM SIGSAC Conference on Computer and Communications Security, 2016. Zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Secure Multiparty Computations on Bitcoin, Communications of the ACM, 2016. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert, Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems, CRYPTO 2016, 2016. Zobacz w PBN
2015
- Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski , Sebastian Faust, Antigoni Polychroniadou, Efficient Leakage Resilient Circuit Compilers, Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, 20 kwietnia 2015 - 24 kwietnia 2015. Zobacz w PBN
- Divesh Aggarwal, Maciej Obremski, Tomasz Kazana , Stefan Dziembowski , Leakage-Resilient Non-malleable Codes, Theory of Cryptography Conference 2015, 2015. Zobacz w PBN
- Divesh Aggarwal, Stefan Dziembowski , Tomasz Kazana , Maciej Obremski, Leakage-Resilient Non-malleable Codes Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}, 2015. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Maciej Skórski, Noisy Leakage Revisited, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}, 26 kwietnia 2015 - 30 kwietnia 2015. Zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, On the Malleability of Bitcoin Transactions, Bitcoin Workshop, 2015. Zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski , PoW-Based Distributed Cryptography with No Trusted Setup, Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}, 2015. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak, Proofs of Space, Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}, 2015. Zobacz w PBN
2014
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Fair Two-Party Computations via Bitcoin Deposits, Bitcoin Workshop, 2014. Zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Modeling Bitcoin Contracts by Timed Automata, Formal Modeling and Analysis of Timed Systems - 12th International Conference, {FORMATS} 2014, Florence, Italy, September 8-10, 2014. Proceedings, 2014. Zobacz w PBN
- Stefan Dziembowski , Tomasz Kazana , Konrad Durnoga, Michal Zajac, One-Time Programs with Limited Memory, 9th China International Conference on Information Security and Cryptology (Inscrypt), Guangzhou, China, 27 listopada 2013 - 30 listopada 2013. Zobacz w PBN
- Stefan Dziembowski , Maciej Zdanowicz, Position-Based Cryptography from Noisy Channels, AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, 2014. Zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski , Daniel Malinowski, Łukasz Mazurek, Secure Multiparty Computations on Bitcoin, 2014. Zobacz w PBN
- Alexandre Duc, Stefan Dziembowski , Sebastian Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage, 2014. Zobacz w PBN
2013
- Stefan Dziembowski , Michał Jastrzębski, International Conference on Information Theoretic Security (ICITS 2013), 2013. Zobacz w PBN
- Stefan Dziembowski , Tomasz Kazana , Maciej Obremski, Non-malleable Codes from Two-Source Extractors, Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2013, 2013. Zobacz w PBN
2012
- Stefan Dziembowski , Sebastian Faust, Leakage-Resilient Circuits without Computational Assumptions, 2012. Zobacz w PBN
2011
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , Key-Evolution Schemes Resilient to Space-Bounded Leakage, Lecture Notes in Computer Science, 2011. Zobacz w PBN
- Stefan Dziembowski , Sebastian Faust, Leakage-Resilient Cryptography from the Inner-Product Extractor., Lecture Notes in Computer Science, 2011. Zobacz w PBN
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , One-time Computable and Uncomputable Functions, Lecture Notes in Computer Science, 2011. Zobacz w PBN
- Daniel Wichs, Tomasz Kazana, Stefan Dziembowski , One-Time Computable Self-erasing Functions, 2011. Zobacz w PBN
2010
- Stefan Dziembowski , How to Pair with a Human, Lecture Notes in Computer Science, 2010. Zobacz w PBN
- Stefan Dziembowski , Leakage-Resilient Storage, Lecture Notes in Computer Science, 2010. Zobacz w PBN
- Krzysztof Pietrzak, Daniel Wichs, Stefan Dziembowski , Non-Malleable Codes, 2010. Zobacz w PBN
2006
- Stefan Dziembowski , Intrusion-Resilience Via the Bounded-Storage Model, Lecture Notes in Computer Science, 2006. Zobacz w PBN
- Stefan Dziembowski , On Forward-Secure Storage, Lecture Notes in Computer Science, 2006. Zobacz w PBN
2004
- Ran Canetti, Ivan Damgard, Stefan Dziembowski , Yuval Ishai, Tal Malkin, Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal of Cryptology, 2004. Zobacz w PBN
- Stefan Dziembowski , Ueli Mauer, On Generating the Initial Key in the Bounded-Storage Model, Lecture Notes in Computer Science, 2004. Zobacz w PBN
- Stefan Dziembowski , Ueli Mauer, Optimal Randomizer Efficiency in the Bounded-Storage Model, Journal of Cryptology, 2004. Zobacz w PBN
2002
- Stefan Dziembowski , Ueli Maurer, Tight Security Proofs for the Bounded-Storage Model, SYMPOSIUM ON THEORY OF COMPUTING, 2002. Zobacz w PBN