D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 4,710 90 World Ranking 9280 National Ranking 16

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer security
  • Computer network

Stefan Dziembowski mostly deals with Theoretical computer science, Cryptography, Computer security, Code word and Code. The study incorporates disciplines such as Side channel attack and Secret sharing in addition to Theoretical computer science. His Cryptographic implementations study in the realm of Cryptography interacts with subjects such as Leakage.

In general Computer security study, his work on Hash function and Adversary often relates to the realm of Digital currency, thereby connecting several areas of interest. His Discrete mathematics study integrates concerns from other disciplines, such as Information leakage, Stream cipher and Bounded function. His Trusted third party study combines topics from a wide range of disciplines, such as Construct and Secure multi-party computation.

His most cited work include:

  • Leakage-Resilient Cryptography (466 citations)
  • Secure Multiparty Computations on Bitcoin (251 citations)
  • Efficient multiparty computations secure against an adaptive adversary (190 citations)

What are the main themes of his work throughout his whole career to date?

Cryptography, Computer security, Adversary, Theoretical computer science and Discrete mathematics are his primary areas of study. His biological study spans a wide range of topics, including Random oracle and Bounded function. The various areas that Stefan Dziembowski examines in his Computer security study include Computation and Protocol.

He has included themes like Cryptographic primitive, Information-theoretic security, Key and Malware in his Adversary study. His studies examine the connections between Theoretical computer science and genetics, as well as such issues in Construct, with regards to Code and Code word. His work in Discrete mathematics covers topics such as Function which are related to areas like Information leakage.

He most often published in these fields:

  • Cryptography (50.50%)
  • Computer security (43.56%)
  • Adversary (32.67%)

What were the highlights of his more recent work (between 2015-2021)?

  • Cryptography (50.50%)
  • Computer security (43.56%)
  • Cryptocurrency (12.87%)

In recent papers he was focusing on the following fields of study:

Stefan Dziembowski spends much of his time researching Cryptography, Computer security, Cryptocurrency, Blockchain and Construct. His Cryptography research is multidisciplinary, incorporating perspectives in Adversary, Theoretical computer science, Bounded function and Random oracle. His work carried out in the field of Adversary brings together such families of science as Security analysis, Masking and Distributed computing.

His Theoretical computer science study incorporates themes from Tamper resistance, Binary logarithm, Code word, Parity-check matrix and Error detection and correction. His research combines Protocol and Computer security. His research in Construct intersects with topics in Trusted third party, Internet privacy and Trusted authority.

Between 2015 and 2021, his most popular works were:

  • General State Channel Networks (77 citations)
  • FairSwap: How To Fairly Exchange Digital Goods (73 citations)
  • Perun: Virtual Payment Hubs over Cryptocurrencies (59 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer security
  • Computer network

His primary scientific interests are in Computer security, Cryptography, Cryptocurrency, Blockchain and Construct. His Computer security study frequently involves adjacent topics like Internet privacy. Stefan Dziembowski regularly ties together related areas like Random oracle in his Cryptography studies.

His studies deal with areas such as Computer network, Protocol, Smart contract and Provable security as well as Cryptocurrency. His study connects Communication channel and Blockchain. His study in Construct is interdisciplinary in nature, drawing from both Trusted third party, Computation and Trusted authority.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Leakage-Resilient Cryptography

S. Dziembowski;K. Pietrzak.
foundations of computer science (2008)

573 Citations

Leakage-Resilient Cryptography

S. Dziembowski;K. Pietrzak.
foundations of computer science (2008)

573 Citations

Secure Multiparty Computations on Bitcoin

Marcin Andrychowicz;Stefan Dziembowski;Daniel Malinowski;Lukasz Mazurek.
ieee symposium on security and privacy (2014)

458 Citations

Secure Multiparty Computations on Bitcoin

Marcin Andrychowicz;Stefan Dziembowski;Daniel Malinowski;Lukasz Mazurek.
ieee symposium on security and privacy (2014)

458 Citations

Proofs of Space

Stefan Dziembowski;Sebastian Faust;Vladimir Kolmogorov;Krzysztof Z Pietrzak.
international cryptology conference (2015)

282 Citations

Proofs of Space

Stefan Dziembowski;Sebastian Faust;Vladimir Kolmogorov;Krzysztof Z Pietrzak.
international cryptology conference (2015)

282 Citations

Efficient multiparty computations secure against an adaptive adversary

Ronald Cramer;Ivan Damgård;Stefan Dziembowski;Martin Hirt.
theory and application of cryptographic techniques (1999)

244 Citations

Efficient multiparty computations secure against an adaptive adversary

Ronald Cramer;Ivan Damgård;Stefan Dziembowski;Martin Hirt.
theory and application of cryptographic techniques (1999)

244 Citations

Non-Malleable Codes.

Stefan Dziembowski;Krzysztof Pietrzak;Daniel Wichs.
international conference on supercomputing (2010)

188 Citations

Fair Two-Party Computations via Bitcoin Deposits

Marcin Andrychowicz;Stefan Dziembowski;Stefan Dziembowski;Daniel Szymon Malinowski;Łukasz Paweł Mazurek.
financial cryptography (2014)

179 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Stefan Dziembowski

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 69

Ivan Damgård

Ivan Damgård

Aarhus University

Publications: 44

Daniel Wichs

Daniel Wichs

Northeastern University

Publications: 39

Jesper Buus Nielsen

Jesper Buus Nielsen

Aarhus University

Publications: 38

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 35

Krzysztof Pietrzak

Krzysztof Pietrzak

Institute of Science and Technology Austria

Publications: 34

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 32

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 32

C.Pandu Rangan

C.Pandu Rangan

Indian Institute of Technology Madras

Publications: 31

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 28

Vipul Goyal

Vipul Goyal

Carnegie Mellon University

Publications: 27

Krishnendu Chatterjee

Krishnendu Chatterjee

Institute of Science and Technology Austria

Publications: 26

Ueli Maurer

Ueli Maurer

ETH Zurich

Publications: 24

Yael Tauman Kalai

Yael Tauman Kalai

MIT

Publications: 23

Andrew Miller

Andrew Miller

University of Illinois at Urbana-Champaign

Publications: 20

Shafi Goldwasser

Shafi Goldwasser

MIT

Publications: 19

Trending Scientists

Matthias Felleisen

Matthias Felleisen

Northeastern University

Andreas Menzel

Andreas Menzel

TU Dortmund University

Henri Brunner

Henri Brunner

University of Regensburg

Kuen Yong Lee

Kuen Yong Lee

Hanyang University

Mingyuan Gao

Mingyuan Gao

Soochow University

Kevin R. Foster

Kevin R. Foster

University of Oxford

Marilyn D. Walker

Marilyn D. Walker

Independent Scientist / Consultant, US

Sandra J. Bucci

Sandra J. Bucci

National Scientific and Technical Research Council

Suzy V. Torti

Suzy V. Torti

University of Connecticut Health Center

Judith Klumperman

Judith Klumperman

Utrecht University

Alastair G. McEwan

Alastair G. McEwan

University of Queensland

Kenji Satake

Kenji Satake

University of Tokyo

Elizabeth J. Atkinson

Elizabeth J. Atkinson

Mayo Clinic

Gerard Leavey

Gerard Leavey

Centre for Mental Health

Frans J. M. Feron

Frans J. M. Feron

Maastricht University

Thomas Ihn

Thomas Ihn

Solid State Physics Laboratory

Something went wrong. Please try again later.