top of page
Group publications (from 2008)

Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou

accepted to IEEE International Conference on Data Engineering (ICDE) 2024

From interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation

Shahriar Ebrahimi, Parisa Hassanizadeh

accepted to Network and Distributed System Security (NDSS) Symposium 2024

From Random Probing to Noisy Leakages Without Field-Size Dependence

Gianluca Brian, Stefan Dziembowski, and Sebastian Faust

accepted to EUROCRYPT 2024

Efficiently Testable Circuits without Conductivity

Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak

Theory of Cryptography Conference, TCC 2023

Non-Atomic Payment Splitting in Channel Networks

Stefan Dziembowski and Paweł Kędzior

Advances in Financial Technologies - AFT 2023

Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins

Vincenzo Botta, Laura Fusco, Attilio Mondelli, and Ivan Visconti

ACM Conference on Information Technology for Social Good, GoodIT 2023

Individual Cryptography

Stefan Dziembowski, Sebastian Faust, and Tomasz Lizurej

43rd Annual International Cryptology Conference, CRYPTO 2023

Doubly adaptive zero-knowledge proofs

Vincenzo Botta and Ivan Visconti

Theoretical Computer Science 968: 114014 (2023)

Lightning Creation Games

Zeta Avarikioti, Tomasz Lizurej, Tomasz Michalak and Michelle Yeo

43rd IEEE International Conference on Distributed Computing Systems (ICDCS) 2023

Extendable Threshold Ring Signatures with Enhanced Anonymity

Gennaro Avitabile, Vincenzo Botta, and Dario Fiore

International Conference on Practice and Theory of Public-Key Cryptography (PKC) 2023

Extendable Threshold Ring Signatures with Enhanced Anonymity

Gennaro Avitabile, Vincenzo Botta, and Dario Fiore

Public-Key Cryptography, PKC 2023

On Manipulating Weight Predictions in Signed Weighted Networks

Tomasz Lizurej, Tomasz Michalak, and Stefan Dziembowski

Thirty-Seventh AAAI Conference on Artificial Intelligence 2023

Efficiently Testable Circuits

Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak

Innovations in Theoretical Computer Science, ITCS 2023

Trojan-Resilience without Cryptography

Suvradip Chakraborty and Stefan Dziembowski and Małgorzata Gałązka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo

Theory of Cryptography Conference, TCC 2021

Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma

Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, and Siavash Riahi

12th Innovations in Theoretical Computer Science Conference (ITCS 2021)

Reverse Firewalls for Actively Secure MPCs

Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen

Annual International Cryptology Conference, CRYPTO 2020

Simple Refreshing in the Noisy Leakage Model

Stefan Dziembowski, Sebastian Faust, Karol Żebrowski

Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019

Multi-party Virtual State Channels

Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019

Perun: Virtual Payment Hubs over Cryptocurrencies

Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski

IEEE Symposium on Security and Privacy, IEEE S&P 2019

Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.

Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi

Theory of Cryptography Conference, TCC 2018

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Alexandre Duc, Stefan Dziembowski, Sebastian Faust

Journal of Cryptology 32(1): 151-177 (2019), conference version appeared at the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014 (BEST PAPER AWARD)

Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters.

Divesh Aggarwal, Tomasz Kazana, Maciej Obremski

IEEE International Symposium on Information Theory, ISIT 2018

General State Channel Networks

Stefan Dziembowski, Sebastian Faust, Kristina Hostakova

ACM Conference on Computer and Communications Security, ACM CCS 2018

FairSwap: How to fairly exchange digital goods

Stefan Dziembowski, Lisa Eckey, Sebastian Faust

ACM Conference on Computer and Communications Security, ACM CCS 2018

Non-Malleable Codes

Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs

Journal of the ACM 65(4), 2018 (conference version appered in Innovations in Computer Science, ICS 2010)

Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments

Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi

Theory of Cryptography Conference, TCC 2018

Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters

Divesh Aggarwal, Tomasz Kazana, Maciej Obremski

IEEE International Symposium on Information Theory, ISIT 2018

Quasi chain rule for min-entropy

Stefan Dziembowski, Tomasz Kazana, Maciej Zdanowicz

Information Processing Letters 134: 62-66 (2018)

Position-Based Cryptography and Multiparty Communication Complexity

Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak

Theory of Cryptography Conference, TCC 2017

Mergeable Functional Encryption

Vincenzo Iovino, Karol Żebrowski

International Conference on Provable Security, ProvSec 2017

Disproving the Conjectures from "On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model"

Daniel Malinowski, Karol Żebrowski

International Conference on Information Theoretic Security, ICITS 2017

Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts

Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski

European Symposium on Research in Computer Security, ESORICS 2016

Bounded-Retrieval Model with Keys Derived from Private Data

Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz

Conference on Information Security and Cryptology, Inscrypt 2016

Secure multiparty computations on Bitcoin

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

Communications of the ACM 59(4), 2016 (a short version of the IEEE S&P 2014 paper)

Circuit Compilers with O(1/\log (n)) Leakage Rate

Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert

Annual International Cryptology Conference, CRYPTO 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert

ACM Conference on Computer and Communications Security, ACM CCS 2016

Optimal Amplification of Noisy Leakages

Stefan Dziembowski, Sebastian Faust, Maciej Skórski

Theory of Cryptography Conference, TCC 2016

A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage

Maciej Skórski

International Conference on Information Theoretic Security, ICITS 2016

Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure

Maciej Skórski

Conference on Information Security and Cryptology, Inscrypt 2016

On Pseudorandomness in Stateless Sources

Springer

Maciej Skórski

Information Security Applications., WISA 2016

Evaluating Entropy Sources for True Random Number Generators by Collision Counting

Maciej Skórski

Applications and Techniques in Information Security, ATIS 2016

How to Smooth Entropy?

Maciej Skórski

Theory and Practice of Computer Science, SOFSEM 2016

Inception Makes Non-malleable Codes Stronger

Divesh Aggarwal, Tomasz Kazana, Maciej Obremski

Theory of Cryptography Conference, TCC 2016

Simulating Auxiliary Inputs, Revisited

Maciej Skórski

Theory of Cryptography Conference, TCC 2016

On the Power of Public-key Function-Private Functional Encryption

Vincenzo Iovino, Qiang Tang, Karol Zebrowski

International Conference on Cryptology and Network Security, CANS 2016

Pseudoentropy: Lower-Bounds for Chain Rules and Transformations

Krzysztof Pietrzak, Maciej Skórski

Theory of Cryptography Conference, TCC 2016

PoW-Based Distributed Cryptography with No Trusted Setup

Marcin Andrychowicz, Stefan Dziembowski

Annual Cryptology Conference, CRYPTO 2015

Proofs of Space

Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak

Annual Cryptology Conference, CRYPTO 2015

The Chain Rule for HILL Pseudoentropy, Revisited

Maciej Skórski, Krzysztof Pietrzak

International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2015

On the Malleability of Bitcoin Transactions

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek

Workshop on Bitcoin Research, BITCOIN 2015

On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers

Maciej Skórski

International Conference on Provable Security, ProvSec 2015

Efficiently Simulating High Min-entropy Sources in the Presence of Side Information

Maciej Skórski

Conference on Cryptology in India, INDOCRYPT 2015

A New Approximate Min-Max Theorem with Applications in Cryptography

Maciej Skórski

International Symposium on Algorithms and Computation, ISAAC 2015

Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography

Maciej Skórski

Cryptography and Information Security in the Balkans, BalkanCryptSec 2015

True Random Number Generators Secure in a Changing Environment: Improved Security Bounds

Maciej Skórski

Theory and Practice of Computer Science, SOFSEM 2015

Condensed Unpredictability

Maciej Skórski, Alexander Golovnev, Krzysztof Pietrzak

International Colloquium on Automata, Languages and Programming, ICALP 2015

Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy

Maciej Skórski

International Conference on Information Theoretic Security, ICITS 2015

Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint.

Maciej Skórski

Cryptography and Coding, IMACC 2015

Non-malleable Reductions and Applications

Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski

ACM Symposium on Theory of Computing, STOC 2015

Simulation-Based Secure Functional Encryption in the Random Oracle Model

Vincenzo Iovino, Karol Żebrowski

International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2015

Noisy Leakage Revisited

Stefan Dziembowski, Sebastian Faust, Maciej Skorski

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015

How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources?

Maciej Skórski

Information Security Applications., WISA 2015

Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice

Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti

Applied Cryptography and Network Security, ACNS 2015

Metric Pseudoentropy: Characterizations, Transformations and Applications

Maciej Skórski

International Conference on Information Theoretic Security, ICITS 2015

Leakage-Resilient Non-malleable Codes

Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski

Theory of Cryptography Conference, TCC 2016

Modulus Computational Entropy

Maciej Skórski

International Conference on Information Theoretic Security, ICITS 2013

Privacy and secrecy with multiple measurements of physical and biometric identifiers

Onur Günlü, Gerhard Kramer, Maciej Skorski

IEEE Conference on Communications and Network Security, CNS 2015,

Efficient Leakage Resilient Circuit Compilers

Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou

Cryptographer's Track at the RSA Conference, CT-RSA 2015

Position-Based Cryptography from Noisy Channels

Stefan Dziembowski, Maciej Zdanowicz

International Conference on Cryptology in Africa, AFRICACRYPT 2014

Modeling Bitcoin Contracts by Timed Automata

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek

Formal Modeling and Analysis of Timed Systems, FORMATS 2014

Secure Multiparty Computations on Bitcoin

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

IEEE Symposium on Security and Privacy, IEEE S&P 2014 (BEST PAPER AWARD)

Fair Two-Party Computations via Bitcoin Deposits

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

Workshop on Bitcoin Research, BITCOIN 2014

One-Time Programs with Limited Memory

Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zając

Conference on Information Security and Cryptology, Inscrypt 2013

Non-malleable Codes from Two-Source Extractors

Stefan Dziembowski, Tomasz Kazana, Maciej Obremski

Annual Cryptology Conference, CRYPTO 2013

Code-Based Public-Key Encryption Resistant to Key Leakage

Edoardo Persichetti

International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013

Leakage Resilience of the Blom's Key Distribution Scheme

Michal Jastrzębski, Stefan Dziembowski

International Conference on Information Theoretic Security, ICITS 2013

Secure and Anonymous Hybrid Encryption from Coding Theory

Edoardo Persichetti

Post-Quantum Cryptograph, PQCrypto 2013

Leakage-Resilient Circuits without Computational Assumptions

Stefan Dziembowski, Sebastian Faust

Theory of Cryptography Conference, TCC 2012

One-Time Computable Self-erasing Functions

Stefan Dziembowski, Tomasz Kazana, Daniel Wichs

Theory of Cryptography Conference, TCC 2011

Leakage-Resilient Cryptography from the Inner-Product Extractor

Stefan Dziembowski, Sebastian Faust

Advances in Cryptology, ASIACRYPT 2011

Key-Evolution Schemes Resilient to Space-Bounded Leakage

Stefan Dziembowski, Tomasz Kazana, Daniel Wichs

Annual Cryptology Conference, CRYPTO 2011

Leakage-Resilient Storage

Francesco Davì, Stefan Dziembowski, Daniele Venturi

Security and Cryptography for Networks, SCN 2010

How to Pair with a Human

Stefan Dziembowski

Security and Cryptography for Networks, SCN 2010

A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes

Stefan Dziembowski

International Conference on Information Theoretic Security, ICITS 2009

On Active Attacks on Sensor Network Key Distribution Schemes

Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi

Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2009

The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement

Stefan Dziembowski, Ueli M. Maurer

IEEE Transactions on Information Theory 54(6): 2790-2792 (2008) (the conference version of a part of the EUROCRYPT 2004 paper)

Leakage-Resilient Cryptography

Stefan Dziembowski, Krzysztof Pietrzak

IEEE Symposium on Foundations of Computer Science, FOCS 2008

bottom of page