Stefan Dziembowski
Stefan Dziembowski
Bestätigte E-Mail-Adresse bei mimuw.edu.pl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Leakage-resilient cryptography
S Dziembowski, K Pietrzak
2008 49th Annual IEEE Symposium on Foundations of Computer Science, 293-302, 2008
5222008
Secure multiparty computations on bitcoin
M Andrychowicz, S Dziembowski, D Malinowski, L Mazurek
2014 IEEE Symposium on Security and Privacy, 443-458, 2014
3532014
Efficient multiparty computations secure against an adaptive adversary
R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1999
2271999
Non-Malleable Codes.
S Dziembowski, K Pietrzak, D Wichs
ICS 2010, 1st, 2010
212*2010
Proofs of space
S Dziembowski, S Faust, V Kolmogorov, K Pietrzak
Annual Cryptology Conference, 585-605, 2015
2062015
Unifying leakage models: From probing attacks to noisy leakage
A Duc, S Dziembowski, S Faust
Journal of Cryptology 32 (1), 151-177, 2019
156*2019
How much memory is needed to win infinite games?
S Dziembowski, M Jurdzinski, I Walukiewicz
Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997
1461997
Fair two-party computations via bitcoin deposits
M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek
International Conference on Financial Cryptography and Data Security, 105-121, 2014
1392014
Intrusion-resilience via the bounded-storage model
S Dziembowski
Theory of Cryptography Conference, 207-224, 2006
1392006
Intrusion-resilient secret sharing
S Dziembowski, K Pietrzak
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 227-237, 2007
1172007
Non-malleable codes from two-source extractors
S Dziembowski, T Kazana, M Obremski
Annual Cryptology Conference, 239-257, 2013
1082013
Perun: Virtual payment hubs over cryptocurrencies
S Dziembowski, L Eckey, S Faust, D Malinowski
2019 IEEE Symposium on Security and Privacy (SP), 106-123, 2019
91*2019
General state channel networks
S Dziembowski, S Faust, K Hostáková
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
89*2018
On generating the initial key in the bounded-storage model
S Dziembowski, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2004
842004
Leakage-resilient storage
F Davì, S Dziembowski, D Venturi
International Conference on Security and Cryptography for Networks, 121-137, 2010
792010
On the complexity of verifiable secret sharing and multiparty computation
R Cramer, I Damgård, S Dziembowski
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
732000
Pow-based distributed cryptography with no trusted setup
M Andrychowicz, S Dziembowski
Annual Cryptology Conference, 379-399, 2015
72*2015
Leakage-resilient cryptography from the inner-product extractor
S Dziembowski, S Faust
International Conference on the Theory and Application of Cryptology and …, 2011
722011
Optimal randomizer efficiency in the bounded-storage model
S Dziembowski, U Maurer
Journal of Cryptology 17 (1), 5-26, 2004
652004
On the malleability of bitcoin transactions
M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek
International Conference on Financial Cryptography and Data Security, 1-18, 2015
632015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20