Stefan Dziembowski – publications

2016
  • Stefan Dziembowski, Sebastian Faust, and Francois-Xavier Standaert 
    Hardware Trojan-Resilience via Testing Amplification
    accepted to the 23rd ACM Conference on Computer and Communications Security (ACM CCS) 2016

  • Wacław Banasik, Stefan Dziembowski, and Daniel Malinowski
    Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
    ESORICS 2016 - 21st European Symposium on Research in Computer Security
    [eprint]

  • Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, and François-Xavier Standaert
    Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
    accepted to Advances in Cryptology - CRYPTO 2016 - 36th Annual Cryptology Conference, Santa Barbara, CA, USA
    [eprint]

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
    Secure multiparty computations on Bitcoin
    Communications of the ACM Volume 59 Issue 4, April 2016
    (a version of our IEEE S&P 2014 paper)
  • [link,video]

  • Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust
    Circuit Compilers with O(1/log(n)) Leakage Rate
    The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2016
    [eprint]

  • Stefan Dziembowski, Sebastian Faust, and Maciej Skórski
  • Optimal Amplification of Noisy Leakages
    The Twelfth IACR Theory of Cryptography Conference TCC 2016
2015
  • Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov and Krzysztof Pietrzak
    Proofs of Space
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA
    [eprint]

  • Marcin Andrychowicz and Stefan Dziembowski
  • PoW-Based Distributed Cryptography with no Trusted Setup
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA

  • Stefan Dziembowski, Sebastian Faust and Maciej Skórski
    Noisy Leakage Revisited
    The 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2015

  • Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski, Sebastian Faust and Antigoni Polychroniadou,
    Efficient Leakage Resilient Circuit Compilers
    RSA Conference Cryptographers' Track (CT-RSA) 2015

  • Divesh Aggarwal, Stefan Dziembowski,Tomasz Kazana and Maciej Obremski
    Leakage-resilient non-malleable codes
    The Twelfth IACR Theory of Cryptography Conference TCC 2015
    [Eprint]

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    On the Malleability of Bitcoin Transactions
    accepted to the Second Workshop on Bitcoin Research 2015 (in Assocation with Financial Crypto)
2014
  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Modeling Bitcoin Contracts by Timed Automata
    The 12th International Conference on Formal Modeling and Analysis of Timed Systems FORMATS 2014
    View Download

  • Stefan Dziembowski and Maciej Zdanowicz
    Position-Based Cryptography from the Noisy Channels
    The 7th International Conference on Cryptology in Africa AFRICACRYPT 2014
    View Download

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Secure Multiparty Computations on Bitcoin
    The 35th IEEE Symposium on Security and Privacy (Oakland) 2014, Best Paper Award
    Download

  • Alexandre Duc, Stefan Dziembowski, and Sebastian Faust
    Unifying leakage models: from probing attacks to noisy leakage
    The 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2014, Best Paper Award
    View Download

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Fair Two-Party Computations via the Bitcoin Deposits
    The First Workshop on Bitcoin Research 2014 (in Assocation with Financial Crypto)
    View Download
2013
  • Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana and Michał Ząjac
    One-time Programs with Limited Memory
    INSCRYPT 2013 The 9th China International Conference on Information Security and Cryptology Nov. 27 - Nov. 30, 2013, Guangzhou, China
    View Download

    • Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
      Non-Malleable Codes from Two-Source Extractors

      Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA,
      View Download

    • Michał Jastrzębski, Stefan Dziembowski
      Leakage Resilience of the Blom's Key Distribution Scheme
      The 7th International Conference on Information Theoretic Security (ICITS 2013), Singapore, November 28-30, 2013.
      View Download, talk: 
      [pptx,pdf]
    2012
    • Stefan Dziembowski, Sebastian Faust
      Leakage-Resilient Circuits without Computational Assumptions.

      Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. 
      View Download
    2011
    • Stefan Dziembowski, Sebastian Faust
      Leakage-Resilient Cryptography from the Inner-Product Extractor.
      Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
      View Download

    • Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Key-Evolution Schemes Resilient to Space-Bounded Leakage.
      Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
      View Download 

    • Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      One-Time Computable Self-erasing Functions.
      Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings.
      View Download
    2010
    • Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
      Non-Malleable Codes.
      Innovations in Computer Science - ICS 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings. 
      View Download

    • Francesco Davì, Stefan Dziembowski, Daniele Venturi
      Leakage-Resilient Storage.
      Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings.
      View Download

    • Stefan Dziembowski
      How to Pair with a Human.
      Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings. 
      View Download
    2009
    • Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi
      On Active Attacks on Sensor Network Key Distribution Schemes.
      Shlomi Dolev (Ed.): Algorithmic Aspects of Wireless Sensor Networks, 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers. 
      View Download

    • Stefan Dziembowski
      A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes.
      Kaoru Kurosawa (Ed.): Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers.
      View Download
    2008
    • Stefan Dziembowski, Ueli M. Maurer
      The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
      IEEE Transactions on Information Theory 54(6): 2790-2792 (2008)
      View Download

    • Stefan Dziembowski, Krzysztof Pietrzak
      Leakage-Resilient Cryptography
      49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA
      View Download
    2007
    • Stefan Dziembowski, Krzysztof Pietrzak
      Intrusion-Resilient Secret Sharing.
      48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings.
      View Download
    2006
    • Stefan Dziembowski
      On Forward-Secure Storage. 

      Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings. 
      View Download

    • Stefan Dziembowski
      Intrusion-Resilience Via the Bounded-Storage Model
      Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings.
      View Download
    2004
    • Stefan Dziembowski, Ueli M. Maurer
      Optimal Randomizer Efficiency in the Bounded-Storage Model.
      J. Cryptology 17(1): 5-26 (2004)
      View Download

    • Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
      Adaptive versus Non-Adaptive Security of Multi-Party Protocols
      J. Cryptology 17(3): 153-207 (2004)
      View Download

    • Stefan Dziembowski, Ueli M. Maurer
      On Generating the Initial Key in the Bounded-Storage Model
      Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. 
      View Download
    2002
    • Stefan Dziembowski, Ueli M. Maurer
      Tight security proofs for the bounded-storage model
      Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada. 
      View Download
    2001
    • Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
      On Adaptive vs. Non-adaptive Security of Multiparty Protocols
      Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
      View Download
    2000
    • Ronald Cramer, Ivan Damgård, Stefan Dziembowski
      On the complexity of verifiable secret sharing and multiparty computation
      Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA.
      View Download
    1999
    • Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin
      Efficient Multiparty Computations Secure Against an Adaptive Adversary

      Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding. 
      View Download
    1997
    • Stefan Dziembowski, Marcin Jurdzinski, Igor Walukiewicz
      How Much Memory is Needed to Win Infinite Games? 
      Proceedings, 12th Annual IEEE Symposium on Logic in Computer Science, Warsaw, Poland, June 29 - July 2, 1997. 
      View Download
    1996
    • Stefan Dziembowski
      Bounded-Variable Fixpoint Queries are PSPACE-complete.
      Computer Science Logic, 10th International Workshop, CSL '96, Annual Conference of the EACSL, Utrecht, The Netherlands, September 21-27, 1996, Selected Papers. 
      View Download