Folgen
Stefan Dziembowski
Stefan Dziembowski
Bestätigte E-Mail-Adresse bei mimuw.edu.pl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Leakage-resilient cryptography
S Dziembowski, K Pietrzak
2008 49th Annual IEEE Symposium on Foundations of Computer Science, 293-302, 2008
5802008
Secure multiparty computations on bitcoin
M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek
Communications of the ACM 59 (4), 76-84, 2016
5352016
Proofs of space
S Dziembowski, S Faust, V Kolmogorov, K Pietrzak
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
4012015
Non-Malleable Codes.
S Dziembowski, K Pietrzak, D Wichs
ICS 2010, 1st, 2010
265*2010
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
2611999
Perun: Virtual payment hubs over cryptocurrencies
S Dziembowski, L Eckey, S Faust, D Malinowski
2019 IEEE Symposium on Security and Privacy (SP), 106-123, 2019
240*2019
Unifying leakage models: From probing attacks to noisy leakage
A Duc, S Dziembowski, S Faust
Journal of Cryptology 32, 151-177, 2019
235*2019
Fair two-party computations via bitcoin deposits
M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2032014
General state channel networks
S Dziembowski, S Faust, K Hostáková
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2022018
Fairswap: How to fairly exchange digital goods
S Dziembowski, L Eckey, S Faust
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1792018
How much memory is needed to win infinite games?
S Dziembowski, M Jurdzinski, I Walukiewicz
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
1791997
Intrusion-resilience via the bounded-storage model
S Dziembowski
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
1632006
Intrusion-resilient secret sharing
S Dziembowski, K Pietrzak
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 227-237, 2007
1362007
Non-malleable codes from two-source extractors
S Dziembowski, T Kazana, M Obremski
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1312013
Pow-based distributed cryptography with no trusted setup
M Andrychowicz, S Dziembowski
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
108*2015
On generating the initial key in the bounded-storage model
S Dziembowski, U Maurer
EUROCRYPT 4, 126-137, 2004
1042004
On the malleability of bitcoin transactions
M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
992015
Leakage-resilient storage
F Davì, S Dziembowski, D Venturi
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
982010
Efficient zero-knowledge contingent payments in cryptocurrencies without scripts
W Banasik, S Dziembowski, D Malinowski
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
932016
Leakage-resilient cryptography from the inner-product extractor
S Dziembowski, S Faust
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
902011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20