Wydział Matematyki, Informatyki i Mechaniki Uniwersytetu Warszawskiego
Publikacje
Stefan Dziembowski
2018
- Stefan Dziembowski, Lisa Eckey i Sebastian Faust, FairSwap: How To Fairly Exchange Digital Goods, w: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, s. 967–984.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust i Kristina Host\'akov\'a, General State Channel Networks, w: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, s. 949–966.zobacz w PBN
- Stefan Dziembowski, Krzysztof Pietrzak i Daniel Wichs, Non-Malleable Codes, Journal Of The Acm 65 (4) 2018, s. 20:1–20:32.zobacz w PBN
- Stefan Dziembowski, Tomasz Kazana i Maciej Zdanowicz, Quasi chain rule for min-entropy, Information Processing Letters 134 2018, s. 62–66.zobacz w PBN
2017
- Joshua Brody, Stefan Dziembowski, Sebastian Faust i Krzysztof Pietrzak, Position-Based Cryptography and Multiparty Communication Complexity, w: Theory of Cryptography, 2017, s. 56–81.zobacz w PBN
2016
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski i Łukasz Paweł Mazurek, Secure Multiparty Computations on Bitcoin, Communications Of The Acm 59 (4) 2016, s. 76–84.zobacz w PBN
- Wacław Banasik, Stefan Dziembowski i Daniel Malinowski, Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts, w: Computer Security – ESORICS 2016, 2016, s. 261–280.zobacz w PBN
- Konrad Durnoga, Stefan Dziembowski, Maciej Zdanowicz, Michał Paweł Zając i Tomasz Piotr Kazana, Bounded-Retrieval Model with Keys Derived from Private Data, Lecture Notes In Computer Science 2016.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust i Franćcois-Xavier Standaert, Private Circuits III: Hardware Trojan-Resilience via Testing Amplification, w: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, s. 142–153.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny i François-Xavier Standaert, Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems, w: Advances in Cryptology -- CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, 2016, s. 272–301.zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski i Sebastian Faust, Circuit Compilers with O(1/log(n)) Leakage Rate, w: Advances in Cryptology -- EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2017, s. 586–615.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust i Maciej Skórski, Optimal Amplification of Noisy Leakages, w: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II, Springer, 2016, s. 291–318.zobacz w PBN
2015
- Marcin Andrychowicz, Stefan Dziembowski, Łukasz Paweł Mazurek i Daniel Malinowski, On the Malleability of Bitcoin Transactions, w: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers, 2015, s. 1–18.zobacz w PBN
- Divesh Aggarwal, Stefan Dziembowski, Maciej Obremski i Tomasz Piotr Kazana, Leakage-Resilient Non-malleable Codes Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, w: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, s. 398–426.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust i Maciej Skórski, Noisy Leakage Revisited, w: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, 2015, s. 159–188.zobacz w PBN
- Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski, Sebastian Faust i Antigoni Polychroniadou, Efficient Leakage Resilient Circuit Compilers, w: Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, 2015, s. 311–329.zobacz w PBN
- Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov i Krzysztof Pietrzak, Proofs of Space, w: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, 2015, s. 585–605.zobacz w PBN
- Marcin Andrychowicz i Stefan Dziembowski, PoW-Based Distributed Cryptography with No Trusted Setup, w: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, 2015, s. 379–399.zobacz w PBN
2014
- Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac i Tomasz Piotr Kazana, One-Time Programs with Limited Memory, w: Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers, 2014, s. 377–394.zobacz w PBN
- Stefan Dziembowski i Maciej Zdanowicz, Position-Based Cryptography from Noisy Channels, w: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, 2014, s. 300–317.zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Szymon Malinowski i Łukasz Paweł Mazurek, Secure Multiparty Computations on Bitcoin, w: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, 2014, s. 443–458.zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Szymon Malinowski i Łukasz Paweł Mazurek, Modeling Bitcoin Contracts by Timed Automata, w: Formal Modeling and Analysis of Timed Systems - 12th International Conference, FORMATS 2014, Florence, Italy, September 8-10, 2014. Proceedings, 2014, s. 7–22.zobacz w PBN
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Szymon Malinowski i Łukasz Paweł Mazurek, Fair Two-Party Computations via Bitcoin Deposits, w: Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, 2014, s. 105–121.zobacz w PBN
- Alexandre Duc, Stefan Dziembowski i Sebastian Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage, w: Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, 2014, s. 423–440.zobacz w PBN
2011
- Stefan Dziembowski i Sebastian Faust, Leakage-Resilient Cryptography from the Inner-Product Extractor., Lecture Notes In Computer Science 7073 2011, s. 702–721.zobacz w PBN
- Stefan Dziembowski, Tomasz Kazana, Daniel Wichs i Tomasz Piotr Kazana, Key-Evolution Schemes Resilient to Space-Bounded Leakage, w: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings, 2011, s. 335–353.zobacz w PBN
2004
- Stefan Dziembowski i Ueli Mauer, On Generating the Initial Key in the Bounded-Storage Model, Lecture Notes In Computer Science 3207 2004, s. 126–137.zobacz w PBN
- Stefan Dziembowski i Ueli Mauer, Optimal Randomizer Efficiency in the Bounded-Storage Model, Journal Of Cryptology 17 (1) 2004, s. 5–26.zobacz w PBN
- Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai i Tal Malkin, Adaptive versus Non-Adaptive Security of Multi-Party Protocols, Journal Of Cryptology 17 (3) 2004, s. 153–207.zobacz w PBN