Group publications (from 2008)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
Stefan Dziembowski, Grzegorz Fabiański, Sebastian Faust, and Siavash Riahi
12th Innovations in Theoretical Computer Science Conference (ITCS 2021)
Reverse Firewalls for Actively Secure MPCs
Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen
Annual International Cryptology Conference, CRYPTO 2020
Simple Refreshing in the Noisy Leakage Model
Stefan Dziembowski, Sebastian Faust, Karol Żebrowski
Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2019
Multi-party Virtual State Channels
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková:
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019
Perun: Virtual Payment Hubs over Cryptocurrencies
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
IEEE Symposium on Security and Privacy, IEEE S&P 2019
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments.
Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
Theory of Cryptography Conference, TCC 2018
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Alexandre Duc, Stefan Dziembowski, Sebastian Faust
Journal of Cryptology 32(1): 151-177 (2019), conference version appeared at the Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014 (BEST PAPER AWARD)
Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters.
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
IEEE International Symposium on Information Theory, ISIT 2018
General State Channel Networks
Stefan Dziembowski, Sebastian Faust, Kristina Hostakova
ACM Conference on Computer and Communications Security, ACM CCS 2018
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski, Lisa Eckey, Sebastian Faust
ACM Conference on Computer and Communications Security, ACM CCS 2018
Non-Malleable Codes
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
Journal of the ACM 65(4), 2018 (conference version appered in Innovations in Computer Science, ICS 2010)
Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
IEEE International Symposium on Information Theory, ISIT 2018
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
Theory of Cryptography Conference, TCC 2018
Quasi chain rule for min-entropy
Stefan Dziembowski, Tomasz Kazana, Maciej Zdanowicz
Information Processing Letters 134: 62-66 (2018)
Position-Based Cryptography and Multiparty Communication Complexity
Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
Theory of Cryptography Conference, TCC 2017
Mergeable Functional Encryption
Vincenzo Iovino, Karol Żebrowski
International Conference on Provable Security, ProvSec 2017
Disproving the Conjectures from "On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model"
Daniel Malinowski, Karol Żebrowski
International Conference on Information Theoretic Security, ICITS 2017
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
Annual International Cryptology Conference, CRYPTO 2016
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
ACM Conference on Computer and Communications Security, ACM CCS 2016
Optimal Amplification of Noisy Leakages
Stefan Dziembowski, Sebastian Faust, Maciej Skórski
Theory of Cryptography Conference, TCC 2016
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Waclaw Banasik, Stefan Dziembowski, Daniel Malinowski
European Symposium on Research in Computer Security, ESORICS 2016
Secure multiparty computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Communications of the ACM 59(4), 2016 (a short version of the IEEE S&P 2014 paper)
Bounded-Retrieval Model with Keys Derived from Private Data
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz
Conference on Information Security and Cryptology, Inscrypt 2016
Circuit Compilers with O(1/\log (n)) Leakage Rate
Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016
On the Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
International Conference on Cryptology and Network Security, CANS 2016
On Pseudorandomness in Stateless Sources
Maciej Skórski
Information Security Applications., WISA 2016
Evaluating Entropy Sources for True Random Number Generators by Collision Counting
Maciej Skórski
Applications and Techniques in Information Security, ATIS 2016
Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure
Maciej Skórski
Conference on Information Security and Cryptology, Inscrypt 2016
A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage
Maciej Skórski
International Conference on Information Theoretic Security, ICITS 2016
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
Theory of Cryptography Conference, TCC 2016
Simulating Auxiliary Inputs, Revisited
Maciej Skórski
Theory of Cryptography Conference, TCC 2016
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations
Krzysztof Pietrzak, Maciej Skórski
Theory of Cryptography Conference, TCC 2016
PoW-Based Distributed Cryptography with No Trusted Setup
Marcin Andrychowicz, Stefan Dziembowski
Annual Cryptology Conference, CRYPTO 2015
Efficiently Simulating High Min-entropy Sources in the Presence of Side Information
Maciej Skórski
Conference on Cryptology in India, INDOCRYPT 2015
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino, Karol Żebrowski
International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2015
Noisy Leakage Revisited
Stefan Dziembowski, Sebastian Faust, Maciej Skorski
Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015
Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography
Maciej Skórski
Cryptography and Information Security in the Balkans, BalkanCryptSec 2015
A New Approximate Min-Max Theorem with Applications in Cryptography
Maciej Skórski
International Symposium on Algorithms and Computation, ISAAC 2015
On the Malleability of Bitcoin Transactions
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
Workshop on Bitcoin Research, BITCOIN 2015
Metric Pseudoentropy: Characterizations, Transformations and Applications
Maciej Skórski
International Conference on Information Theoretic Security, ICITS 2015
Non-malleable Reductions and Applications
Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
ACM Symposium on Theory of Computing, STOC 2015
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skórski
International Conference on Information Theoretic Security, ICITS 2015
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint.
Maciej Skórski
Cryptography and Coding, IMACC 2015
Condensed Unpredictability
Maciej Skórski, Alexander Golovnev, Krzysztof Pietrzak
International Colloquium on Automata, Languages and Programming, ICALP 2015
The Chain Rule for HILL Pseudoentropy, Revisited
Maciej Skórski, Krzysztof Pietrzak
International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2015
Efficient Leakage Resilient Circuit Compilers
Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou
Cryptographer's Track at the RSA Conference, CT-RSA 2015
How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources?
Maciej Skórski
Information Security Applications., WISA 2015
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Maciej Skórski
Theory and Practice of Computer Science, SOFSEM 2015
Proofs of Space
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
Annual Cryptology Conference, CRYPTO 2015
Modulus Computational Entropy
Maciej Skórski
International Conference on Information Theoretic Security, ICITS 2013
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
Applied Cryptography and Network Security, ACNS 2015
Leakage-Resilient Non-malleable Codes
Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Theory of Cryptography Conference, TCC 2016
On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
Maciej Skórski
International Conference on Provable Security, ProvSec 2015
Privacy and secrecy with multiple measurements of physical and biometric identifiers
Onur Günlü, Gerhard Kramer, Maciej Skorski
IEEE Conference on Communications and Network Security, CNS 2015,
Modeling Bitcoin Contracts by Timed Automata
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
Formal Modeling and Analysis of Timed Systems, FORMATS 2014
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
IEEE Symposium on Security and Privacy, IEEE S&P 2014 (BEST PAPER AWARD)
Position-Based Cryptography from Noisy Channels
Stefan Dziembowski, Maciej Zdanowicz
International Conference on Cryptology in Africa, AFRICACRYPT 2014
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
Workshop on Bitcoin Research, BITCOIN 2014
Leakage Resilience of the Blom's Key Distribution Scheme
Michal Jastrzębski, Stefan Dziembowski
International Conference on Information Theoretic Security, ICITS 2013
One-Time Programs with Limited Memory
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zając
Conference on Information Security and Cryptology, Inscrypt 2013
Secure and Anonymous Hybrid Encryption from Coding Theory
Edoardo Persichetti
Post-Quantum Cryptograph, PQCrypto 2013
Code-Based Public-Key Encryption Resistant to Key Leakage
Edoardo Persichetti
International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013
Non-malleable Codes from Two-Source Extractors
Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Annual Cryptology Conference, CRYPTO 2013
Leakage-Resilient Circuits without Computational Assumptions
Stefan Dziembowski, Sebastian Faust
Theory of Cryptography Conference, TCC 2012
One-Time Computable Self-erasing Functions
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Theory of Cryptography Conference, TCC 2011
Leakage-Resilient Cryptography from the Inner-Product Extractor
Stefan Dziembowski, Sebastian Faust
Advances in Cryptology, ASIACRYPT 2011
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
Annual Cryptology Conference, CRYPTO 2011
Leakage-Resilient Storage
Francesco Davì, Stefan Dziembowski, Daniele Venturi
Security and Cryptography for Networks, SCN 2010
On Active Attacks on Sensor Network Key Distribution Schemes
Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi
Algorithmic Aspects of Wireless Sensor Networks, ALGOSENSORS 2009
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
Stefan Dziembowski
International Conference on Information Theoretic Security, ICITS 2009
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Stefan Dziembowski, Ueli M. Maurer
IEEE Transactions on Information Theory 54(6): 2790-2792 (2008) (the conference version of a part of the EUROCRYPT 2004 paper)
Leakage-Resilient Cryptography
Stefan Dziembowski, Krzysztof Pietrzak
IEEE Symposium on Foundations of Computer Science, FOCS 2008