publications | Crypto@UW
Stefan Dziembowski: publications

Simple Refreshing in the Noisy Leakage Model

Stefan Dziembowski, Sebastian Faust, Karol Żebrowski

accepted to the Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019

Multi-party Virtual State Channels

Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019

Perun: Virtual Payment Hubs over Cryptocurrencies

Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski

IEEE Symposium on Security and Privacy, IEEE S&P 2019

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Alexandre Duc, Stefan Dziembowski, Sebastian Faust

Journal of Cryptology 32(1): 151-177 (2019), conference version appeared at the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014 (BEST PAPER AWARD)

General State Channel Networks

Stefan Dziembowski, Sebastian Faust, Kristina Hostakova

ACM Conference on Computer and Communications Security, ACM CCS 2018

FairSwap: How to fairly exchange digital goods

Stefan Dziembowski, Lisa Eckey, Sebastian Faust

ACM Conference on Computer and Communications Security, ACM CCS 2018

Non-Malleable Codes

Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs

Journal of the ACM 65(4), 2018 (conference version appered in Innovations in Computer Science, ICS 2010)

Quasi chain rule for min-entropy

Stefan Dziembowski, Tomasz Kazana, Maciej Zdanowicz

Information Processing Letters 134: 62-66 (2018)

Position-Based Cryptography and Multiparty Communication Complexity

Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak

Theory of Cryptography Conference, TCC 2017

Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts

Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski

European Symposium on Research in Computer Security, ESORICS 2016

Optimal Amplification of Noisy Leakages

Stefan Dziembowski, Sebastian Faust, Maciej Skórski

Theory of Cryptography Conference, TCC 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert

ACM Conference on Computer and Communications Security, ACM CCS 2016

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert

Annual International Cryptology Conference, CRYPTO 2016

Secure multiparty computations on Bitcoin

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

Communications of the ACM 59(4), 2016 (a short version of the IEEE S&P 2014 paper)

Circuit Compilers with O(1/\log (n)) Leakage Rate

Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016

Bounded-Retrieval Model with Keys Derived from Private Data

Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz

Conference on Information Security and Cryptology, Inscrypt 2016

PoW-Based Distributed Cryptography with No Trusted Setup

Marcin Andrychowicz, Stefan Dziembowski

Annual Cryptology Conference, CRYPTO 2015

On the Malleability of Bitcoin Transactions

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek

Workshop on Bitcoin Research, BITCOIN 2015

Noisy Leakage Revisited

Stefan Dziembowski, Sebastian Faust, Maciej Skorski

Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015

Leakage-Resilient Non-malleable Codes

Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski

Theory of Cryptography Conference, TCC 2016

Efficient Leakage Resilient Circuit Compilers

Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou

Cryptographer's Track at the RSA Conference, CT-RSA 2015

Proofs of Space

Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak

Annual Cryptology Conference, CRYPTO 2015

Secure Multiparty Computations on Bitcoin

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

IEEE Symposium on Security and Privacy, IEEE S&P 2014 (BEST PAPER AWARD)

Modeling Bitcoin Contracts by Timed Automata

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek

Formal Modeling and Analysis of Timed Systems, FORMATS 2014

Fair Two-Party Computations via Bitcoin Deposits

Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

Workshop on Bitcoin Research, BITCOIN 2014

Position-Based Cryptography from Noisy Channels

Stefan Dziembowski, Maciej Zdanowicz

International Conference on Cryptology in Africa, AFRICACRYPT 2014

One-Time Programs with Limited Memory

Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zając

Conference on Information Security and Cryptology, Inscrypt 2013

Non-malleable Codes from Two-Source Extractors

Stefan Dziembowski, Tomasz Kazana, Maciej Obremski

Annual Cryptology Conference, CRYPTO 2013

Leakage Resilience of the Blom's Key Distribution Scheme

Michal Jastrzębski, Stefan Dziembowski

International Conference on Information Theoretic Security, ICITS 2013

Leakage-Resilient Circuits without Computational Assumptions

Stefan Dziembowski, Sebastian Faust

Theory of Cryptography Conference, TCC 2012

One-Time Computable Self-erasing Functions

Stefan Dziembowski, Tomasz Kazana, Daniel Wichs

Theory of Cryptography Conference, TCC 2011

Leakage-Resilient Cryptography from the Inner-Product Extractor

Stefan Dziembowski, Sebastian Faust

Advances in Cryptology, ASIACRYPT 2011

Key-Evolution Schemes Resilient to Space-Bounded Leakage

Stefan Dziembowski, Tomasz Kazana, Daniel Wichs

Annual Cryptology Conference, CRYPTO 2011

How to Pair with a Human

Stefan Dziembowski

Security and Cryptography for Networks, SCN 2010

Leakage-Resilient Storage

Francesco Davì, Stefan Dziembowski, Daniele Venturi

Security and Cryptography for Networks, SCN 2010

On Active Attacks on Sensor Network Key Distribution Schemes

Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi

Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2009

A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes

Stefan Dziembowski

International Conference on Information Theoretic Security, ICITS 2009

The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement

Stefan Dziembowski, Ueli M. Maurer

IEEE Transactions on Information Theory 54(6): 2790-2792 (2008) (the conference version of a part of the EUROCRYPT 2004 paper)

Leakage-Resilient Cryptography

Stefan Dziembowski, Krzysztof Pietrzak

IEEE Symposium on Foundations of Computer Science, FOCS 2008

Intrusion-Resilient Secret Sharing

Stefan Dziembowski, Krzysztof Pietrzak

IEEE Symposium on Foundations of Computer Science, FOCS 2007

On Forward-Secure Storage

Stefan Dziembowski

Annual Cryptology Conference, CRYPTO 2006

Intrusion-Resilience Via the Bounded-Storage Model

Stefan Dziembowski

Theory of Cryptography Conference, TCC 2006

Adaptive versus Non-Adaptive Security of Multi-Party Protocols

Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin

Journal of Cryptology 17(3): 153-207 (2004), the journal version of the paper that appeared on the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2001

Optimal Randomizer Efficiency in the Bounded-Storage Model

Stefan Dziembowski, Ueli M. Maurer

Journal of Cryptology 17(1): 5-26 (2004), the journal version of the paper "Tight security proofs for the bounded-storage model" from the ACM Symposium on Theory of Computing, STOC 2002

On the complexity of verifiable secret sharing and multiparty computation

Ronald Cramer, Ivan Damgård, Stefan Dziembowski

ACM Symposium on Theory of Computing, STOC 2000

How Much Memory is Needed to Win Infinite Games?

Stefan Dziembowski, Marcin Jurdzinski, Igor Walukiewicz

IEEE Symposium on Logic in Computer Science, LICS 1997

Bounded-Variable Fixpoint Queries are PSPACE-complete

Stefan Dziembowski

Computer Science Logic, CSL 1996