Stefan Dziembowski – slides from selected talks

In English:
  •  Nippon Telegraph and Telephone (NTT) R&D Center, Yokosuka, Japan (February 2004):

    • Bounded-Storage Cryptography [pdf,ps]
    • Adaptivness in Multiparty Computations [pdf,ps]

  • Multiparty computation protocols [pdf
    Warsaw 9.5.03 Quo vadis cryptography? tutorial

  • On Generating the Initial Key in the Bounded-Storage Model [pdf,ps
    Interlaken, May 2004, Eurocrypt 04 (the paper is available here)

  • Multiparty computations, introduction [pdf
    Warsaw, May 2004, IMPAN cryptology Seminar 

  • Forward-Security in the Limited Communication Model [ppt
    La Sapienza, Rome, May 2006

  • Intrusion Resilience via the Bounded-Storage Model [ppt]
    TCC 2006, New York, USA

  • On Forward-Secure Storage [ppt]
    Crypto 2006, Santa Barbara, USA

  • Introduction to the Bounded-Retrieval Model
     
    • WCP 2007: Workshop on Cryptographic Protocols, Bertinoro, March 2007 [ppt]
    • University of Salerno, March 2007 [ppt] -- extended version

  • Private Information Retrieval
    Sm@rt seminar, La Sapienza, May 2007 [ppt]

  • Leakage-Resilient Cryptography:

  • Cryptography on Non-Trusted Machines
    DYNAS 2009, International Workshop on DYnamic Networks: Algorithms and Security September 5, 2009, Wroclaw, Poland, invited talk [pptx,pdf]

  • A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
    The 4th International Conference on Information Theoretic Security, ICITS 2009, December 3 - 6, 2009. Shizuoka, Japan [pptx,pdf,view]

  • On the only computation leaks information paradigm 
    Provable Security against Physical Attacks Lorentz Center, the Netherlands, February 2010 [pptxpdfview

  • One-Time Computable Self-Erasing Functions 
    Trends in Theoretical Cryptography 2011 January 10-12, 2011 ITCS, Tsinghua University, Beijing, China [pptx]

  • Leakage-Resilient Circuits without Computational Assumptions,
    Theory of Cryptography Conference 2012, March 2012, Taormina, Italy
    [view,pptx]

  • Habilitation lectures (the title pages in Polish, the rest in English) March 2012:

    • Why cryptography is less useful than it seems? [view,pptx]
    • Interesting cryptographic protocols [view,pptx]
    • What "provable security" means [view,pptx]

  • Non-Malleable Codes from Two-Source Extractors
    Aarhus University Theory Seminar, October 9, 2013 
    [pptx,pdf]
  • Leakage resilience of Blom key distribution scheme,
    The 7th International Conference on Information Theoretic Security (ICITS 2013
    [pptx,pdf]

  • MPCs on Bitcoin
    Rump session at the Cryptolens 2013 workshop at the Weizmann Institute, December 2013
    [view,pptx]

  • Cryptographic aspects of Bitcoin
  • Horizons In Mathematics - MCMCS Conference for Students (Będlewo, Poland), March 2014
    [view,pptx,
  • pdf]
  • Bitcoin contracts -- digital economy without lawyers?

  • Cryptography - from art to science
    A seminar at the Warsaw University of Technology before the ceremony of awarding IEEE Milestone to the Polish mathematicians who broke the Enigma machine, August 2014
    [view,pptx,pdf]

  • Recent advances in non-malleable codes
    Invited talk at the Joint Estonian-Latvian Theory Days at Ratnieki, Latvia, October 2014
    [view,pptx,pdf]

  • The First Greater Tel Aviv Area Cryptography Symposium, November 2014:

    • Introduction to Bitcoin -- a tutorial 
      [pptx,pdf,video]
    • Distributed Cryptography Based on the Proofs of Work -- a talk
      [pptx,pdf]

  • Mathematical aspects of cryptocurrencies,
    II Ogólnopolskie Sympozjum Interdyscyplinarne Inter-Mix 2014, November 2014
    [pptx,pdf]

  • How to compute securely using Bitcoin scripts
  • Invited talk at the International Workshop on P2P Financial Systems, Deutsche Bundesbank, Frankfurt, Germany, January 2015
    [pptx,pdf]

  • Why do the cryptographic currencies need a solid theory
  • Forum Informatyki Teoretycznej, Warsaw, January 2015
    [pptx,pdf]

  • PoW-Based Distributed Cryptography with no Trusted Setup
    Workshop in Cryptography, Bochum University, Germany, April 2015
    [pptx,pdf]

  • Noisy Leakage Revisited
    Eurocrypt 2014, Sofia, Bulgaria, April 2015
    [pptx,pdf]

  • Consensus in Peer-to-Peer Networks
    Club of the Foundation for Polish Science Scholars Symposium, Odolanów, Poland, May 2015
    [pptx,pdf]

  • Technological weaknesses of Bitcoin
    Digital Money & Currency Forum, June 2015
    [pptx,pdf]

  • PoW-Based Distributed Cryptography with no Trusted Setup
    CRYPTO 2015, Santa Barbara, USA, August 2015
    [pptx,pdf]

  • Proofs of Space
    CRYPTO 2015, Santa Barbara, USA, August 2015
    [pptx,pdf]

  • Proofs of Space and their Applications to Cryptocurrencies 
    Kyoto University, September 2015 
    [pptx,pdf]

  • Nippon Telegraph and Telephone (NTT) R&D Center, Tokyo, Japan, September 2015:

    • Modelling Side-Channel Leakage
      [pptx,pdf]
    • Recent Advances in Non-Malleable Codes
      [
      pptx,pdf]
    • Some Recent Developments in Cryptocurrencies (2 lectures)
      [pptx.pdf]

  • Introduction to Cryptocurrencies.
    a 4 hours tutorial at the ACM CCS'15, Denver, USA, October 2015
    [pptx,pdf,abstract]

  • Modelling Side Channel Leakage
    inviated talk at the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences MACIS, Berlin, Germany, November 2015
    [pptx,pdf]

  • Research Challenges in Cryptocurrencies
    Mikulášská kryptobesídka (SantaCrypt) 2015, Prague, Czech Republic, December 2015
    [pptx,pdf]

  • Bitcoin – Mr. Nakamoto wonderful invention
    a workshop of The Polish Children's Fund, Warsaw, Poland, December 2015
    [pptx,pdf]

  • Optimal Amplification of Noisy Leakages
    Theory of Cryptography Conference 2016-A, Tel-Aviv, Israel, January 2016
    [pptx,pdf]

  • Non-Malleable Codes
    Forum Informatyki Teoretycznej, Warsaw, Poland, February 2016
    [pptx,pdf]

  • Introduction to Cryptocurrencies
    PhD Open, Warsaw, Poland, March 2016
    [pptx,pdf]

  • Modelling Side-Channel Leakage
  • Nexus of Information and Computation Theories, Henri Poincare Institute, Paris, France, March 2016 
    [pptx,pdf]

  • Proofs of Space
    Symposium on the Work of Ivan Damgård, Aarhus, Denmark, April 2016
    [pptx,pdf]

  • Modelling Side-Channel Leakage
  • COST Cryptoaction meeting, Budapest, Hungary, April 2016 
    [pptx,pdf]

  • How to order a murder using cryptocurrencies?
    "Technical Aspects of ICT Crime” ConferencePolice Academy in Szczytno, Poland, May 2016
    [pptx,pdf]

  • Introduction to Cryptocurrencies (an 8 hour tutorial)
    Workshop on Bitcoin, Introduction to Cryptocurrencies,
    Kfar Maccabiah, Ramat Gan, Israel, June, 2016
    [abstract]

    • Day 1:
      • Introduction (2 hours)
        [pptx,pdf]
      • Mining Pools and Attacks (2 hours)
        [pptx,pdf]
      • Smart Contracts and Applications, part I (1 hour)
        [pptx,pdf]
    • Day 2:
      • Smart Contracts and Applications, part I (1 hour)
        [pptx,pdf]
      • Alternative Cryptocurrencies (2 hours)
        [pptx,pdf]

  • How to order a murder using cryptocurrencies?
    "Virtual currencies -- threats and challenges" --- a conference at the Polish Ministry of Finance,
    Warsaw, Poland, June 2016
    [pptx,pdf]

  • Modelling Side-Channel Leakage
    Tutorials on Mathematics of Information-Theoretic Cryptography
    Nanyang Technological University, Singapore, September 2016
    [pptx,pdf]

  • Circuit compilers with O(1/log(n)) leakage rate
    Workshop on Mathematics of Information-Theoretic Cryptography
    Institute for Mathematical Sciences, National University of Singapore, September 2016
    [pptx,pdf]

  • Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
    ACM CCS 2016, Vienna, Austria, October 2016
    [pptx,pdf]

  • Non-Malleable Codes
    Kolokwium Wydziału MIMUW, Janary 2017
    [pptx,pdf]

  • Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
    COST Cryptoaction meeting, Amsterdam, The Netherlands, March 2017
    [pptx,pdf]
  • Proofs-of-space – an alternative for Proofs-of-work
    Klub Informatyka, Łazarski University, Warsaw, April 2017
    [pptx,pdf]

  • Perun – a Virtual Payment Channel System
    Kryptopia Meeting, University of Warsaw, May 2017
    [pptx,pdf]

  • Perun –Virtual Payment Channel System
    Digital Money & Blockchain Forum, Warsaw, June 2017
    [pptx,pdf]

  • Proofs-of-space – an alternative for Proofs-of-work
    Forum Informatyki Teoretycznej, Warsaw, July 8th, 2017
    [pptx,pdf]


In Polish:
  • Historia Alicji i Boba [pdf] Swider 2.5.03 Oboz Krajowego Funduszu na Rzecz Dzieci

  • Matematyczne podstawy kryptografii [ppt,html,jpg] 15.03.02 dni otwarte MIM UW

  • O (nie)przydatnosci teorii zlozonosci w kryptografii [pptx,pdf], MIMUW, December 2008

  • Kryptografia wizualna, Dzień Nauk Ścisłych, VIII LO im. Władysława IVWarszawa 13.01.2015
    slajdy [pptx], materiały do druku na foliach [pptx,pptx]

  • Kryptografia wizualna, Dni Otwarte MIM UW, 15.04.2015, slajdy [pptx,pdf] materiały do druku na foliach [pptx,pptx]

  • Kryptografia wizualna, Po co nam matematyka, MIM UW, 5.05.2016 [pptx.pdf]

  • Czym zajmuje się współczesna kryptografia? Dni Hoborskiego - Święto Nauk Ścisłych w AGH, Kraków, 17.11.2016, [pptx,pdf]


In Italian: