Stefan Dziembowski

From MaRDI portal
Person:1690187

Available identifiers

zbMath Open dziembowski.stefanMaRDI QIDQ1690187

List of research outcomes

PublicationDate of PublicationType
Individual cryptography2024-02-02Paper
Trojan-resilience without cryptography2023-04-13Paper
Reverse firewalls for actively secure MPCs2022-11-09Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Unifying leakage models: from probing attacks to noisy leakage2019-01-29Paper
Non-Malleable Codes2018-12-06Paper
Quasi chain rule for min-entropy2018-04-04Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Bounded-Retrieval Model with Keys Derived from Private Data2017-05-05Paper
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems2016-10-27Paper
Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate2016-07-15Paper
Optimal Amplification of Noisy Leakages2016-04-08Paper
Efficient Leakage Resilient Circuit Compilers2016-03-02Paper
PoW-Based Distributed Cryptography with No Trusted Setup2015-12-10Paper
Proofs of Space2015-12-10Paper
One-Time Programs with Limited Memory2015-12-02Paper
Leakage Resilience of the Blom’s Key Distribution Scheme2015-09-30Paper
Noisy Leakage Revisited2015-09-30Paper
Modeling Bitcoin Contracts by Timed Automata2015-08-06Paper
Leakage-Resilient Non-malleable Codes2015-07-06Paper
On the complexity of verifiable secret sharing and multiparty computation2014-09-26Paper
Position-Based Cryptography from Noisy Channels2014-06-24Paper
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.2014-05-27Paper
Non-malleable Codes from Two-Source Extractors2013-09-17Paper
Leakage-Resilient Circuits without Computational Assumptions2012-06-15Paper
Leakage-Resilient Cryptography from the Inner-Product Extractor2011-12-02Paper
Key-Evolution Schemes Resilient to Space-Bounded Leakage2011-08-12Paper
One-Time Computable Self-erasing Functions2011-05-19Paper
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes2010-09-29Paper
Leakage-Resilient Storage2010-09-10Paper
How to Pair with a Human2010-09-10Paper
Tight security proofs for the bounded-storage model2010-08-05Paper
On Active Attacks on Sensor Network Key Distribution Schemes2010-01-05Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement2009-02-24Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
On Forward-Secure Storage2007-09-04Paper
Theory of Cryptography2007-02-12Paper
Adaptive versus non-adaptive security of multi-party protocols2004-10-01Paper
Optimal randomizer efficiency in the bounded-storage model2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q27788542002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42507701999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43629121998-06-11Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Stefan Dziembowski