Stefan Dziembowski mostly deals with Theoretical computer science, Cryptography, Computer security, Code word and Code. The study incorporates disciplines such as Side channel attack and Secret sharing in addition to Theoretical computer science. His Cryptographic implementations study in the realm of Cryptography interacts with subjects such as Leakage.
In general Computer security study, his work on Hash function and Adversary often relates to the realm of Digital currency, thereby connecting several areas of interest. His Discrete mathematics study integrates concerns from other disciplines, such as Information leakage, Stream cipher and Bounded function. His Trusted third party study combines topics from a wide range of disciplines, such as Construct and Secure multi-party computation.
Cryptography, Computer security, Adversary, Theoretical computer science and Discrete mathematics are his primary areas of study. His biological study spans a wide range of topics, including Random oracle and Bounded function. The various areas that Stefan Dziembowski examines in his Computer security study include Computation and Protocol.
He has included themes like Cryptographic primitive, Information-theoretic security, Key and Malware in his Adversary study. His studies examine the connections between Theoretical computer science and genetics, as well as such issues in Construct, with regards to Code and Code word. His work in Discrete mathematics covers topics such as Function which are related to areas like Information leakage.
Stefan Dziembowski spends much of his time researching Cryptography, Computer security, Cryptocurrency, Blockchain and Construct. His Cryptography research is multidisciplinary, incorporating perspectives in Adversary, Theoretical computer science, Bounded function and Random oracle. His work carried out in the field of Adversary brings together such families of science as Security analysis, Masking and Distributed computing.
His Theoretical computer science study incorporates themes from Tamper resistance, Binary logarithm, Code word, Parity-check matrix and Error detection and correction. His research combines Protocol and Computer security. His research in Construct intersects with topics in Trusted third party, Internet privacy and Trusted authority.
His primary scientific interests are in Computer security, Cryptography, Cryptocurrency, Blockchain and Construct. His Computer security study frequently involves adjacent topics like Internet privacy. Stefan Dziembowski regularly ties together related areas like Random oracle in his Cryptography studies.
His studies deal with areas such as Computer network, Protocol, Smart contract and Provable security as well as Cryptocurrency. His study connects Communication channel and Blockchain. His study in Construct is interdisciplinary in nature, drawing from both Trusted third party, Computation and Trusted authority.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Leakage-Resilient Cryptography
S. Dziembowski;K. Pietrzak.
foundations of computer science (2008)
Leakage-Resilient Cryptography
S. Dziembowski;K. Pietrzak.
foundations of computer science (2008)
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz;Stefan Dziembowski;Daniel Malinowski;Lukasz Mazurek.
ieee symposium on security and privacy (2014)
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz;Stefan Dziembowski;Daniel Malinowski;Lukasz Mazurek.
ieee symposium on security and privacy (2014)
Proofs of Space
Stefan Dziembowski;Sebastian Faust;Vladimir Kolmogorov;Krzysztof Z Pietrzak.
international cryptology conference (2015)
Proofs of Space
Stefan Dziembowski;Sebastian Faust;Vladimir Kolmogorov;Krzysztof Z Pietrzak.
international cryptology conference (2015)
Efficient multiparty computations secure against an adaptive adversary
Ronald Cramer;Ivan Damgård;Stefan Dziembowski;Martin Hirt.
theory and application of cryptographic techniques (1999)
Efficient multiparty computations secure against an adaptive adversary
Ronald Cramer;Ivan Damgård;Stefan Dziembowski;Martin Hirt.
theory and application of cryptographic techniques (1999)
Non-Malleable Codes.
Stefan Dziembowski;Krzysztof Pietrzak;Daniel Wichs.
international conference on supercomputing (2010)
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz;Stefan Dziembowski;Stefan Dziembowski;Daniel Szymon Malinowski;Łukasz Paweł Mazurek.
financial cryptography (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Institute of Science and Technology Austria
Aarhus University
Northeastern University
ETH Zurich
Université Catholique de Louvain
Boston University
Technion – Israel Institute of Technology
Columbia University
IBM (United States)
Institute of Science and Technology Austria
Northeastern University
TU Dortmund University
University of Regensburg
Hanyang University
Soochow University
University of Oxford
Independent Scientist / Consultant, US
National Scientific and Technical Research Council
University of Connecticut Health Center
Utrecht University
University of Queensland
University of Tokyo
Mayo Clinic
Centre for Mental Health
Maastricht University
Solid State Physics Laboratory