Stefan Dziembowski: publications
Trojan-Resilience without Cryptography
Suvradip Chakraborty and Stefan Dziembowski and Małgorzata Gałązka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo
Theory of Cryptography Conference, TCC 2021
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, and Siavash Riahi
12th Innovations in Theoretical Computer Science Conference (ITCS 2021)
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen
Annual International Cryptology Conference, CRYPTO 2020
Simple Refreshing in the Noisy Leakage Model
Stefan Dziembowski, Sebastian Faust, Karol Żebrowski
Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019
Multi-party Virtual State Channels
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019
Perun: Virtual Payment Hubs over Cryptocurrencies
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
IEEE Symposium on Security and Privacy, IEEE S&P 2019
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
Journal of Cryptology 32(1): 151-177 (2019), conference version appeared at the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014 (BEST PAPER AWARD)
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
ACM Conference on Computer and Communications Security, ACM CCS 2018
General State Channel Networks
Stefan Dziembowski, Sebastian Faust, Kristina Hostakova
ACM Conference on Computer and Communications Security, ACM CCS 2018
Non-Malleable Codes
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Journal of the ACM 65(4), 2018 (conference version appered in Innovations in Computer Science, ICS 2010)
Quasi chain rule for min-entropy
Stefan Dziembowski, Tomasz Kazana, Maciej Zdanowicz
Information Processing Letters 134: 62-66 (2018)
Position-Based Cryptography and Multiparty Communication Complexity
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Theory of Cryptography Conference, TCC 2017
Optimal Amplification of Noisy Leakages
Stefan Dziembowski, Sebastian Faust, Maciej Skórski
Theory of Cryptography Conference, TCC 2016
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski
European Symposium on Research in Computer Security, ESORICS 2016
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
ACM Conference on Computer and Communications Security, ACM CCS 2016
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
Annual International Cryptology Conference, CRYPTO 2016
Secure multiparty computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Communications of the ACM 59(4), 2016 (a short version of the IEEE S&P 2014 paper)
Bounded-Retrieval Model with Keys Derived from Private Data
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz
Conference on Information Security and Cryptology, Inscrypt 2016
Circuit Compilers with O(1/\log (n)) Leakage Rate
Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016
PoW-Based Distributed Cryptography with No Trusted Setup
Marcin Andrychowicz, Stefan Dziembowski
Annual Cryptology Conference, CRYPTO 2015
Noisy Leakage Revisited
Stefan Dziembowski, Sebastian Faust, Maciej Skorski
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015
On the Malleability of Bitcoin Transactions
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
Workshop on Bitcoin Research, BITCOIN 2015
Efficient Leakage Resilient Circuit Compilers
Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou
Cryptographer's Track at the RSA Conference, CT-RSA 2015
Leakage-Resilient Non-malleable Codes
Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Theory of Cryptography Conference, TCC 2016
Proofs of Space
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
Annual Cryptology Conference, CRYPTO 2015
Modeling Bitcoin Contracts by Timed Automata
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
Formal Modeling and Analysis of Timed Systems, FORMATS 2014
Position-Based Cryptography from Noisy Channels
Stefan Dziembowski, Maciej Zdanowicz
International Conference on Cryptology in Africa, AFRICACRYPT 2014
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Workshop on Bitcoin Research, BITCOIN 2014
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
IEEE Symposium on Security and Privacy, IEEE S&P 2014 (BEST PAPER AWARD)
Leakage Resilience of the Blom's Key Distribution Scheme
Michal Jastrzębski, Stefan Dziembowski
International Conference on Information Theoretic Security, ICITS 2013
One-Time Programs with Limited Memory
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zając
Conference on Information Security and Cryptology, Inscrypt 2013
Non-malleable Codes from Two-Source Extractors
Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Annual Cryptology Conference, CRYPTO 2013
Leakage-Resilient Circuits without Computational Assumptions
Stefan Dziembowski, Sebastian Faust
Theory of Cryptography Conference, TCC 2012
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Annual Cryptology Conference, CRYPTO 2011
One-Time Computable Self-erasing Functions
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Theory of Cryptography Conference, TCC 2011
Leakage-Resilient Cryptography from the Inner-Product Extractor
Stefan Dziembowski, Sebastian Faust
Advances in Cryptology, ASIACRYPT 2011
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele Venturi
Security and Cryptography for Networks, SCN 2010
On Active Attacks on Sensor Network Key Distribution Schemes
Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi
Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2009
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
Stefan Dziembowski
International Conference on Information Theoretic Security, ICITS 2009
Leakage-Resilient Cryptography
Stefan Dziembowski, Krzysztof Pietrzak
IEEE Symposium on Foundations of Computer Science, FOCS 2008
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Stefan Dziembowski, Ueli M. Maurer
IEEE Transactions on Information Theory 54(6): 2790-2792 (2008) (the conference version of a part of the EUROCRYPT 2004 paper)
Intrusion-Resilient Secret Sharing
Stefan Dziembowski, Krzysztof Pietrzak
IEEE Symposium on Foundations of Computer Science, FOCS 2007
Intrusion-Resilience Via the Bounded-Storage Model
Stefan Dziembowski
Theory of Cryptography Conference, TCC 2006
Adaptive versus Non-Adaptive Security of Multi-Party Protocols
Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
Journal of Cryptology 17(3): 153-207 (2004), the journal version of the paper that appeared on the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2001
Optimal Randomizer Efficiency in the Bounded-Storage Model
Stefan Dziembowski, Ueli M. Maurer
Journal of Cryptology 17(1): 5-26 (2004), the journal version of the paper "Tight security proofs for the bounded-storage model" from the ACM Symposium on Theory of Computing, STOC 2002
On the complexity of verifiable secret sharing and multiparty computation
Ronald Cramer, Ivan Damgård, Stefan Dziembowski
ACM Symposium on Theory of Computing, STOC 2000
How Much Memory is Needed to Win Infinite Games?
Stefan Dziembowski, Marcin Jurdzinski, Igor Walukiewicz
IEEE Symposium on Logic in Computer Science, LICS 1997
Bounded-Variable Fixpoint Queries are PSPACE-complete
Stefan Dziembowski
Computer Science Logic, CSL 1996