Publications 

from 2008
2017
  • Joshua Brody, Stefan Dziembowski, Sebastian Faust  and Krzysztof Pietrzak 
    Position-Based Cryptography and Multiparty Communication Complexity
    Fifteenth IACR Theory of Cryptography Conference - TCC 2017
    [eprint]

  • Divesh Aggarwal, Tomasz Kazana, and Maciej Obremski
    I
    nception Makes Non-malleable Codes Stronger
    Fifteenth IACR Theory of Cryptography Conference - TCC 2017
    [eprint]

2016
  • Stefan Dziembowski, Sebastian Faust, and Francois-Xavier Standaert 
    Hardware Trojan-Resilience via Testing Amplification
    The 23rd ACM Conference on Computer and Communications Security (ACM CCS) 2016

  • Wacław Banasik, Stefan Dziembowski, and Daniel Malinowski
    Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
    ESORICS 2016 - 21st European Symposium on Research in Computer Security
    [eprint]

  • Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, and François-Xavier Standaert
    Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
    Advances in Cryptology - CRYPTO 2016 - 36th Annual Cryptology Conference, Santa Barbara, CA, USA
    [eprint]

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
    Secure multiparty computations on Bitcoin
    Communications of the ACM Volume 59 Issue 4, April 2016
    (a version of our IEEE S&P 2014 paper)
  • [link,video]

  • Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust
    Circuit Compilers with O(1/log(n)) Leakage Rate
    The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2016
    [eprint]

  • Stefan Dziembowski, Sebastian Faust, and Maciej Skórski
  • Optimal Amplification of Noisy Leakages
    The Twelfth IACR Theory of Cryptography Conference TCC 2015

  • Maciej Skorski,
    How to Smooth Entropy?
    International Conference on Current Trends in Theory and Practice of Computer Science SOFSEM 2016

2015
  • Maciej Skórski
    On Provable Security of wPRF-based Leakage-Resilient Stream Ciphers
    International Conference on Provable Security (ProvSec) 2015

  • Onur Günlü, Gerhard Kramer, and Maciej Skórski
    Privacy and Secrecy with Multiple Measurements of Physical and Biometric Identifiers
    IEEE Conference on Communication and Network Security CNS 2015,

  • Maciej Skórski
    How much randomness can be extracted from memoryless Shannon entropy sources?
    International Workshop on Information Security Applications WISA 2015

  • Maciej Skórski
    Time-Success Ratios under Simple Transformations: Analysis and Applications
    International Conference on Cryptography and Information Security BalkanCryptSec 2015 

  • Maciej Skórski
    Shannon Entropy versus Renyi Entropy from a Cryptographic Viewpoint
    IMA International Conference on Cryptography and Coding (IMACC) 2015

  • Maciej Skórski
    A New Approximate Min-Max Theorem with Applications in Cryptography
    International Symposium on Algorithms and Computation (ISAAC) 2015

  • Vincenzo Iovino and Karol Żebrowski
    Simulation-Based Secure Functional Encryption in the Random Oracle Model
    LATINCRYPT 2015 - the Fourth International Conference on Cryptology and Information Security in Latin America 

  • Krzysztof Pietrzak and Maciej Skórski
    The Chain Rule for HILL Pseudoentropy, Revisited
    LATINCRYPT 2015 - the Fourth International Conference on Cryptology and Information Security in Latin America 

  • Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov and Krzysztof Pietrzak
    Proofs of Space
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA

  • Marcin Andrychowicz and Stefan Dziembowski
  • PoW-Based Distributed Cryptography with no Trusted Setup
    Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA

  • Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
    Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
    International Conference on Applied Cryptography and Network Security (ACNS 2015)

  • Maciej Skorski, Alexander Golovnev and Krzysztof Pietrzak
    Condensed Unpredictability
    International Colloquium on Automata, Languages, and Programming (ICALP 2015) 

  • Maciej Skórski
  • Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs with Applications to Pseudoentropy
    International Conference on Information-Theoretic Security (ICITS 2015)

  • Maciej Skórski
    Metric Pseudoentropy: Characterizations, Transformations and Applications
    International Conference on Information-Theoretic Security (ICITS 2015)

  • Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, and Maciej Obremski,
    Non-malleable Reductions and Applications
    ACM Symposium on Theory of Computing (STOC 2015).
    [Eprint]

  • Stefan Dziembowski, Sebastian Faust and Maciej Skórski
    Noisy Leakage Revisited
    Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2015
  • Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski, Sebastian Faust and Antigoni Polychroniadou,
    Efficient Leakage Resilient Circuit Compilers
    RSA Conference Cryptographers' Track (CT-RSA) 2015

  • Maciej Skorski
    True Random Numbers Generators Secure in a Changing Environment: Improved Security Bounds
    International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2015)

  • Divesh Aggarwal, Stefan Dziembowski,Tomasz Kazana and Maciej Obremski
    Leakage-resilient non-malleable codes
    IACR Theory of Cryptography Conference TCC 2015
    [Eprint]

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    On the Malleability of Bitcoin Transactions
    Second Workshop on Bitcoin Research 2015 (in Assocation with Financial Crypto)
2014
  • Maciej Skórski
    On Recent Advances in Key Derivation via the Leftover Hash Lemma.
    2014 Imperial College Computing Student Workshop, ICCSW 2014

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Modeling Bitcoin Contracts by Timed Automata
    The 12th International Conference on Formal Modeling and Analysis of Timed Systems FORMATS 2014
    View Download

  • Stefan Dziembowski and Maciej Zdanowicz
    Position-Based Cryptography from the Noisy Channels
    The 7th International Conference on Cryptology in Africa AFRICACRYPT 2014
    View Download

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Secure Multiparty Computations on Bitcoin
    The 35th IEEE Symposium on Security and Privacy (Oakland) 2014, Best Paper Award
    View Download

  • Alexandre Duc, Stefan Dziembowski, and Sebastian Faust
    Unifying leakage models: from probing attacks to noisy leakage
    The 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2014, Best Paper Award
    View Download

  • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek
    Fair Two-Party Computations via the Bitcoin Deposits
    The First Workshop on Bitcoin Research 2014 (in Assocation with Financial Crypto)
    View Download
2013
  • Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana and Michał Ząjac
    One-time Programs with Limited Memory
    INSCRYPT 2013 The 9th China International Conference on Information Security and Cryptology Nov. 27 - Nov. 30, 2013, Guangzhou, China
    View Download

    • Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
      Non-Malleable Codes from Two-Source Extractors

      Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA,
      View Download

    • Michał Jastrzębski, Stefan Dziembowski
      Leakage Resilience of the Blom's Key Distribution Scheme
      International Conference on Information Theoretic Security (ICITS 2013), Singapore, November 28-30, 2013.
      View Download, talk: 
      [pptx,pdf]
    • Edoardo Persichetti
      Secure and Anonymous Hybrid Encryption from Coding Theory
      Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings. 
      View Download

    • Edoardo Persichetti
      Code-based public-key encryption resistant to key leakage MoCrySEn 2013 - 
      Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, 
      September 2-6, 2013. Proceedings
      View Download


    • Maciej Skórski
      Modulus Computational Entropy
      International Conference on Information Theoretic Security (ICITS 2013), Singapore, November 28-30, 2013.
      View Download
    2012
    • Stefan Dziembowski, Sebastian Faust
      Leakage-Resilient Circuits without Computational Assumptions.

      IACR Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. 
      View Download
    2011
    • Stefan Dziembowski, Sebastian Faust
      Leakage-Resilient Cryptography from the Inner-Product Extractor.
      Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
      View Download

    • Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Key-Evolution Schemes Resilient to Space-Bounded Leakage.
      Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings
      View Download 

    • Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      One-Time Computable Self-erasing Functions.
      IACR Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings.
      View Download
    2010
    • Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs 
      Non-Malleable Codes.
      Innovations in Computer Science - ICS 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings. 
      View Download

    • Francesco Davì, Stefan Dziembowski, Daniele Venturi
      Leakage-Resilient Storage.
      Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings.
      View Download

    • Stefan Dziembowski
      How to Pair with a Human.
      Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings. 
      View Download
    2009
    • Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi
      On Active Attacks on Sensor Network Key Distribution Schemes.
      Shlomi Dolev (Ed.): Algorithmic Aspects of Wireless Sensor Networks, 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers. 
      View Download

    • Stefan Dziembowski
      A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes.
      Kaoru Kurosawa (Ed.): Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers.
      View Download
    2008
    • Stefan Dziembowski, Ueli M. Maurer
      The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
      IEEE Transactions on Information Theory 54(6): 2790-2792 (2008)
      View Download

    • Stefan Dziembowski, Krzysztof Pietrzak
      Leakage-Resilient Cryptography
      49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA
      View Download

    Here you can see the list of theses (PhD and MSc) defended by the group members.