Stefan Dziembowski

From MaRDI portal
Person:1690187

Available identifiers

zbMath Open dziembowski.stefanMaRDI QIDQ1690187

List of research outcomes





PublicationDate of PublicationType
From random probing to noisy leakages without field-size dependence2024-11-13Paper
Efficiently testable circuits2024-09-25Paper
Efficiently testable circuits without conductivity2024-08-02Paper
Individual cryptography2024-02-02Paper
Trojan-resilience without cryptography2023-04-13Paper
Reverse firewalls for actively secure MPCs2022-11-09Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Unifying leakage models: from probing attacks to noisy leakage2019-01-29Paper
Non-Malleable Codes2018-12-06Paper
Quasi chain rule for min-entropy2018-04-04Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Bounded-Retrieval Model with Keys Derived from Private Data2017-05-05Paper
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems2016-10-27Paper
Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate2016-07-15Paper
Optimal Amplification of Noisy Leakages2016-04-08Paper
Efficient Leakage Resilient Circuit Compilers2016-03-02Paper
Proofs of Space2015-12-10Paper
PoW-Based Distributed Cryptography with No Trusted Setup2015-12-10Paper
One-Time Programs with Limited Memory2015-12-02Paper
Noisy Leakage Revisited2015-09-30Paper
Leakage Resilience of the Blom’s Key Distribution Scheme2015-09-30Paper
Modeling Bitcoin Contracts by Timed Automata2015-08-06Paper
Leakage-Resilient Non-malleable Codes2015-07-06Paper
On the complexity of verifiable secret sharing and multiparty computation2014-09-26Paper
Position-Based Cryptography from Noisy Channels2014-06-24Paper
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.2014-05-27Paper
Non-malleable Codes from Two-Source Extractors2013-09-17Paper
Leakage-Resilient Circuits without Computational Assumptions2012-06-15Paper
Leakage-Resilient Cryptography from the Inner-Product Extractor2011-12-02Paper
Key-Evolution Schemes Resilient to Space-Bounded Leakage2011-08-12Paper
One-Time Computable Self-erasing Functions2011-05-19Paper
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes2010-09-29Paper
Leakage-Resilient Storage2010-09-10Paper
How to Pair with a Human2010-09-10Paper
Tight security proofs for the bounded-storage model2010-08-05Paper
On Active Attacks on Sensor Network Key Distribution Schemes2010-01-05Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement2009-02-24Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
On Forward-Secure Storage2007-09-04Paper
Theory of Cryptography2007-02-12Paper
Adaptive versus non-adaptive security of multi-party protocols2004-10-01Paper
Optimal randomizer efficiency in the bounded-storage model2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q27788542002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42507701999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43629121998-06-11Paper

Research outcomes over time

This page was built for person: Stefan Dziembowski