What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Dziembowski
Google Scholar
44
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs.
Stefan Dziembowski
Shahriar Ebrahimi
Parisa Hassanizadeh
2025
conf/crypto
Strong Secret Sharing with Snitching.
Jan Bormet
Stefan Dziembowski
Sebastian Faust
Tomasz Lizurej
Marcin Mielniczuk
2024
conf/ccs
Secret Sharing with Snitching.
Stefan Dziembowski
Sebastian Faust
Tomasz Lizurej
Marcin Mielniczuk
2024
conf/eurocrypt
From Random Probing to Noisy Leakages Without Field-Size Dependence.
Gianluca Brian
Stefan Dziembowski
Sebastian Faust
2024
conf/asiacrypt
Password-Protected Threshold Signatures.
Stefan Dziembowski
Stanislaw Jarecki
Pawel Kedzior
Hugo Krawczyk
Chan Nam Ngo
Jiayu Xu
2023
conf/crypto
Individual Cryptography.
Stefan Dziembowski
Sebastian Faust
Tomasz Lizurej
2023
conf/tcc
Efficiently Testable Circuits Without Conductivity.
Mirza Ahad Baig
Suvradip Chakraborty
Stefan Dziembowski
Malgorzata Galazka
Tomasz Lizurej
Krzysztof Pietrzak
2021
conf/tcc
Trojan-Resilience Without Cryptography.
Suvradip Chakraborty
Stefan Dziembowski
Malgorzata Galazka
Tomasz Lizurej
Krzysztof Pietrzak
Michelle Yeo
2020
conf/crypto
Reverse Firewalls for Actively Secure MPCs.
Suvradip Chakraborty
Stefan Dziembowski
Jesper Buus Nielsen
2019
journals/joc
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Alexandre Duc
Stefan Dziembowski
Sebastian Faust
2019
conf/sp
Perun: Virtual Payment Hubs over Cryptocurrencies.
Stefan Dziembowski
Lisa Eckey
Sebastian Faust
Daniel Malinowski
2019
conf/eurocrypt
Multi-party Virtual State Channels.
Stefan Dziembowski
Lisa Eckey
Sebastian Faust
Julia Hesse
Kristina Hostáková
2019
conf/asiacrypt
Simple Refreshing in the Noisy Leakage Model.
Stefan Dziembowski
Sebastian Faust
Karol Zebrowski
2018
conf/ccs
FairSwap: How To Fairly Exchange Digital Goods.
Stefan Dziembowski
Lisa Eckey
Sebastian Faust
2018
conf/ccs
General State Channel Networks.
Stefan Dziembowski
Sebastian Faust
Kristina Hostáková
2017
conf/tcc
Position-Based Cryptography and Multiparty Communication Complexity.
Joshua Brody
Stefan Dziembowski
Sebastian Faust
Krzysztof Pietrzak
2016
conf/ccs
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Stefan Dziembowski
Sebastian Faust
François-Xavier Standaert
2016
conf/crypto
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Stefan Dziembowski
Sebastian Faust
Gottfried Herold
Anthony Journault
Daniel Masny
François-Xavier Standaert
2016
conf/esorics
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts.
Waclaw Banasik
Stefan Dziembowski
Daniel Malinowski
2016
conf/eurocrypt
Circuit Compilers with O(1/\log (n)) Leakage Rate.
Marcin Andrychowicz
Stefan Dziembowski
Sebastian Faust
2016
conf/tcc
Optimal Amplification of Noisy Leakages.
Stefan Dziembowski
Sebastian Faust
Maciej Skórski
2015
conf/ccs
Introduction to Cryptocurrencies.
Stefan Dziembowski
2015
conf/crypto
Proofs of Space.
Stefan Dziembowski
Sebastian Faust
Vladimir Kolmogorov
Krzysztof Pietrzak
2015
conf/crypto
PoW-Based Distributed Cryptography with No Trusted Setup.
Marcin Andrychowicz
Stefan Dziembowski
2015
conf/fc
On the Malleability of Bitcoin Transactions.
Marcin Andrychowicz
Stefan Dziembowski
Daniel Malinowski
Lukasz Mazurek
2015
conf/ctrsa
Efficient Leakage Resilient Circuit Compilers.
Marcin Andrychowicz
Ivan Damgård
Stefan Dziembowski
Sebastian Faust
Antigoni Polychroniadou
2015
conf/eurocrypt
Noisy Leakage Revisited.
Stefan Dziembowski
Sebastian Faust
Maciej Skorski
2015
conf/tcc
Leakage-Resilient Non-malleable Codes.
Divesh Aggarwal
Stefan Dziembowski
Tomasz Kazana
Maciej Obremski
2014
conf/fc
Fair Two-Party Computations via Bitcoin Deposits.
Marcin Andrychowicz
Stefan Dziembowski
Daniel Malinowski
Lukasz Mazurek
2014
conf/sp
Secure Multiparty Computations on Bitcoin.
Marcin Andrychowicz
Stefan Dziembowski
Daniel Malinowski
Lukasz Mazurek
2014
conf/eurocrypt
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Alexandre Duc
Stefan Dziembowski
Sebastian Faust
2014
conf/africacrypt
Position-Based Cryptography from Noisy Channels.
Stefan Dziembowski
Maciej Zdanowicz
2013
conf/crypto
Non-malleable Codes from Two-Source Extractors.
Stefan Dziembowski
Tomasz Kazana
Maciej Obremski
2012
conf/tcc
Leakage-Resilient Circuits without Computational Assumptions.
Stefan Dziembowski
Sebastian Faust
2011
conf/crypto
Key-Evolution Schemes Resilient to Space-Bounded Leakage.
Stefan Dziembowski
Tomasz Kazana
Daniel Wichs
2011
conf/asiacrypt
Leakage-Resilient Cryptography from the Inner-Product Extractor.
Stefan Dziembowski
Sebastian Faust
2011
conf/tcc
One-Time Computable Self-erasing Functions.
Stefan Dziembowski
Tomasz Kazana
Daniel Wichs
2006
conf/crypto
On Forward-Secure Storage.
Stefan Dziembowski
2006
conf/tcc
Intrusion-Resilience Via the Bounded-Storage Model.
Stefan Dziembowski
2004
journals/joc
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
2004
journals/joc
Optimal Randomizer Efficiency in the Bounded-Storage Model.
Stefan Dziembowski
Ueli M. Maurer
2004
conf/eurocrypt
On Generating the Initial Key in the Bounded-Storage Model.
Stefan Dziembowski
Ueli M. Maurer
2001
conf/eurocrypt
On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
Ran Canetti
Ivan Damgård
Stefan Dziembowski
Yuval Ishai
Tal Malkin
1999
conf/eurocrypt
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
Ronald Cramer
Ivan Damgård
Stefan Dziembowski
Martin Hirt
Tal Rabin
Coauthors
Alexandre Duc
(2)
Anthony Journault
(1)
Antigoni Polychroniadou
(1)
Chan Nam Ngo
(1)
Daniel Malinowski
(5)
Daniel Masny
(1)
Daniel Wichs
(2)
Divesh Aggarwal
(1)
François-Xavier Standaert
(2)
Gianluca Brian
(1)
Gottfried Herold
(1)
Hugo Krawczyk
(1)
Ivan Damgård
(4)
Jan Bormet
(1)
Jesper Buus Nielsen
(1)
Jiayu Xu
(1)
Joshua Brody
(1)
Julia Hesse
(1)
Karol Zebrowski
(1)
Kristina Hostáková
(2)
Krzysztof Pietrzak
(4)
Lisa Eckey
(3)
Lukasz Mazurek
(3)
Maciej Obremski
(2)
Maciej Skórski
(2)
Maciej Zdanowicz
(1)
Malgorzata Galazka
(2)
Marcin Andrychowicz
(6)
Marcin Mielniczuk
(2)
Martin Hirt
(1)
Michelle Yeo
(1)
Mirza Ahad Baig
(1)
Parisa Hassanizadeh
(1)
Pawel Kedzior
(1)
Ran Canetti
(2)
Ronald Cramer
(1)
Sebastian Faust
(21)
Shahriar Ebrahimi
(1)
Stanislaw Jarecki
(1)
Stefan Dziembowski
(44)
Suvradip Chakraborty
(3)
Tal Malkin
(2)
Tal Rabin
(1)
Tomasz Kazana
(4)
Tomasz Lizurej
(5)
Ueli M. Maurer
(2)
Vladimir Kolmogorov
(1)
Waclaw Banasik
(1)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to