The following pages link to Stefan Dziembowski (Q1690187):
Displayed 43 items.
- Position-based cryptography and multiparty communication complexity (Q1690188) (← links)
- Quasi chain rule for min-entropy (Q1707982) (← links)
- Unifying leakage models: from probing attacks to noisy leakage (Q1715856) (← links)
- Optimal randomizer efficiency in the bounded-storage model (Q1879466) (← links)
- Adaptive versus non-adaptive security of multi-party protocols (Q1882568) (← links)
- Reverse firewalls for actively secure MPCs (Q2096547) (← links)
- Simple refreshing in the noisy leakage model (Q2178860) (← links)
- Multi-party virtual state channels (Q2292663) (← links)
- Trojan-resilience without cryptography (Q2697869) (← links)
- (Q2778854) (← links)
- Efficient Leakage Resilient Circuit Compilers (Q2790050) (← links)
- Optimal Amplification of Noisy Leakages (Q2799099) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Non-malleable Codes from Two-Source Extractors (Q2849399) (← links)
- Leakage-Resilient Circuits without Computational Assumptions (Q2891486) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- Noisy Leakage Revisited (Q2948382) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- One-Time Computable Self-erasing Functions (Q3000536) (← links)
- Leakage-Resilient Cryptography from the Inner-Product Extractor (Q3102217) (← links)
- On the complexity of verifiable secret sharing and multiparty computation (Q3192000) (← links)
- One-Time Programs with Limited Memory (Q3454868) (← links)
- PoW-Based Distributed Cryptography with No Trusted Setup (Q3457075) (← links)
- Proofs of Space (Q3457086) (← links)
- Tight security proofs for the bounded-storage model (Q3579184) (← links)
- Leakage-Resilient Storage (Q3588335) (← links)
- How to Pair with a Human (Q3588342) (← links)
- The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement (Q3604445) (← links)
- On Active Attacks on Sensor Network Key Distribution Schemes (Q3654148) (← links)
- (Q4250770) (← links)
- (Q4362912) (← links)
- Non-Malleable Codes (Q4561508) (← links)
- A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes (Q4931664) (← links)
- Position-Based Cryptography from Noisy Channels (Q4981775) (← links)
- Key-Evolution Schemes Resilient to Space-Bounded Leakage (Q5199200) (← links)
- Leakage-Resilient Non-malleable Codes (Q5261638) (← links)
- Advances in Cryptology - EUROCRYPT 2004 (Q5307250) (← links)
- Unifying Leakage Models: From Probing Attacks to Noisy Leakage. (Q5418709) (← links)
- Modeling Bitcoin Contracts by Timed Automata (Q5500550) (← links)
- Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate (Q5739216) (← links)
- On Forward-Secure Storage (Q5756636) (← links)
- Theory of Cryptography (Q5898356) (← links)
- Individual cryptography (Q6145925) (← links)