Leakage-resilient cryptography S Dziembowski, K Pietrzak 2008 49th Annual IEEE Symposium on Foundations of Computer Science, 293-302, 2008 | 604 | 2008 |
Secure multiparty computations on bitcoin M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek Communications of the ACM 59 (4), 76-84, 2016 | 583 | 2016 |
Proofs of space S Dziembowski, S Faust, V Kolmogorov, K Pietrzak Annual Cryptology Conference, 585-605, 2015 | 477 | 2015 |
Perun: Virtual payment hubs over cryptocurrencies S Dziembowski, L Eckey, S Faust, D Malinowski 2019 IEEE Symposium on Security and Privacy (SP), 106-123, 2019 | 305* | 2019 |
Non-Malleable Codes. S Dziembowski, K Pietrzak, D Wichs ICS 2010, 1st, 2010 | 292* | 2010 |
Unifying leakage models: From probing attacks to noisy leakage A Duc, S Dziembowski, S Faust Journal of Cryptology 32, 151-177, 2019 | 283* | 2019 |
Efficient multiparty computations secure against an adaptive adversary R Cramer, I Damgård, S Dziembowski, M Hirt, T Rabin International conference on the Theory and Applications of Cryptographic …, 1999 | 274 | 1999 |
General state channel networks S Dziembowski, S Faust, K Hostáková Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 271 | 2018 |
Fairswap: How to fairly exchange digital goods S Dziembowski, L Eckey, S Faust Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 236 | 2018 |
Fair two-party computations via bitcoin deposits M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 212 | 2014 |
How much memory is needed to win infinite games? S Dziembowski, M Jurdzinski, I Walukiewicz Proceedings of Twelfth Annual IEEE Symposium on Logic in Computer Science …, 1997 | 190 | 1997 |
Intrusion-resilience via the bounded-storage model S Dziembowski Theory of Cryptography Conference, 207-224, 2006 | 171 | 2006 |
Non-malleable codes from two-source extractors S Dziembowski, T Kazana, M Obremski Annual Cryptology Conference, 239-257, 2013 | 147 | 2013 |
Intrusion-resilient secret sharing S Dziembowski, K Pietrzak 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 227-237, 2007 | 146 | 2007 |
Pow-based distributed cryptography with no trusted setup M Andrychowicz, S Dziembowski Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 129* | 2015 |
On the malleability of bitcoin transactions M Andrychowicz, S Dziembowski, D Malinowski, Ł Mazurek Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 114 | 2015 |
Leakage-resilient storage F Davì, S Dziembowski, D Venturi Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 112 | 2010 |
Efficient zero-knowledge contingent payments in cryptocurrencies without scripts W Banasik, S Dziembowski, D Malinowski Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 109 | 2016 |
On generating the initial key in the bounded-storage model S Dziembowski, U Maurer International Conference on the Theory and Applications of Cryptographic …, 2004 | 106 | 2004 |
Multi-party virtual state channels S Dziembowski, L Eckey, S Faust, J Hesse, K Hostáková Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 105 | 2019 |