Stefan Dziembowski

From MaRDI portal
Person:1690187



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
From random probing to noisy leakages without field-size dependence2024-11-13Paper
Efficiently testable circuits2024-09-25Paper
Efficiently testable circuits without conductivity2024-08-02Paper
Individual cryptography
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Trojan-resilience without cryptography2023-04-13Paper
Reverse firewalls for actively secure MPCs2022-11-09Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Unifying leakage models: from probing attacks to noisy leakage
Journal of Cryptology
2019-01-29Paper
Non-malleable codes
Journal of the ACM
2018-12-06Paper
Quasi chain rule for min-entropy
Information Processing Letters
2018-04-04Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Bounded-retrieval model with keys derived from private data
Information Security and Cryptology
2017-05-05Paper
Towards sound fresh re-keying with hard (physical) learning problems
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Circuit compilers with \(O(1/\log (n))\) leakage rate
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Optimal amplification of noisy leakages
Theory of Cryptography
2016-04-08Paper
Efficient leakage resilient circuit compilers
Lecture Notes in Computer Science
2016-03-02Paper
Proofs of space
Lecture Notes in Computer Science
2015-12-10Paper
PoW-based distributed cryptography with no trusted setup
Lecture Notes in Computer Science
2015-12-10Paper
One-time programs with limited memory
Information Security and Cryptology
2015-12-02Paper
Noisy leakage revisited
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Leakage resilience of the Blom's key distribution scheme
Lecture Notes in Computer Science
2015-09-30Paper
Modeling Bitcoin contracts by timed automata
Lecture Notes in Computer Science
2015-08-06Paper
Leakage-resilient non-malleable codes
Theory of Cryptography
2015-07-06Paper
On the complexity of verifiable secret sharing and multiparty computation
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Position-based cryptography from noisy channels
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Unifying leakage models: from probing attacks to noisy leakage.
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Non-malleable codes from two-source extractors
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Leakage-resilient circuits without computational assumptions
Theory of Cryptography
2012-06-15Paper
Leakage-resilient cryptography from the inner-product extractor
Lecture Notes in Computer Science
2011-12-02Paper
Key-evolution schemes resilient to space-bounded leakage
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
One-time computable self-erasing functions
Theory of Cryptography
2011-05-19Paper
A lower bound on the key length of information-theoretic forward-secure storage schemes
Lecture Notes in Computer Science
2010-09-29Paper
Leakage-resilient storage
Lecture Notes in Computer Science
2010-09-10Paper
How to pair with a human
Lecture Notes in Computer Science
2010-09-10Paper
Tight security proofs for the bounded-storage model
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
2010-08-05Paper
On Active Attacks on Sensor Network Key Distribution Schemes
Algorithmic Aspects of Wireless Sensor Networks
2010-01-05Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
IEEE Transactions on Information Theory
2009-02-24Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
On Forward-Secure Storage
Lecture Notes in Computer Science
2007-09-04Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Adaptive versus non-adaptive security of multi-party protocols
Journal of Cryptology
2004-10-01Paper
Optimal randomizer efficiency in the bounded-storage model
Journal of Cryptology
2004-09-22Paper
scientific article; zbMATH DE number 1722683 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1304080 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1086662 (Why is no real title available?)1998-06-11Paper


Research outcomes over time


This page was built for person: Stefan Dziembowski