The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Dziembowski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Dziembowski
    On Forward-Secure Storage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:251-270 [Conf]
  2. Stefan Dziembowski
    Bounded-Variable Fixpoint Queries are PSPACE-complete. [Citation Graph (0, 0)][DBLP]
    CSL, 1996, pp:89-105 [Conf]
  3. Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
    On Adaptive vs. Non-adaptive Security of Multiparty Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:262-279 [Conf]
  4. Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin
    Efficient Multiparty Computations Secure Against an Adaptive Adversary. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:311-326 [Conf]
  5. Stefan Dziembowski, Ueli M. Maurer
    On Generating the Initial Key in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:126-137 [Conf]
  6. Stefan Dziembowski, Marcin Jurdzinski, Igor Walukiewicz
    How Much Memory is Needed to Win Infinite Games? [Citation Graph (0, 0)][DBLP]
    LICS, 1997, pp:99-110 [Conf]
  7. Ronald Cramer, Ivan Damgård, Stefan Dziembowski
    On the complexity of verifiable secret sharing and multiparty computation. [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:325-334 [Conf]
  8. Stefan Dziembowski, Ueli M. Maurer
    Tight security proofs for the bounded-storage model. [Citation Graph (0, 0)][DBLP]
    STOC, 2002, pp:341-350 [Conf]
  9. Stefan Dziembowski
    Intrusion-Resilience Via the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:207-224 [Conf]
  10. Stefan Dziembowski, Ueli M. Maurer
    Optimal Randomizer Efficiency in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:1, pp:5-26 [Journal]
  11. Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin
    Adaptive versus Non-Adaptive Security of Multi-Party Protocols. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:3, pp:153-207 [Journal]

  12. On Active Attacks on Sensor Network Key Distribution Schemes. [Citation Graph (, )][DBLP]


  13. Leakage-Resilient Cryptography. [Citation Graph (, )][DBLP]


  14. Intrusion-Resilient Secret Sharing. [Citation Graph (, )][DBLP]


  15. How to Pair with a Human. [Citation Graph (, )][DBLP]


  16. Leakage-Resilient Storage. [Citation Graph (, )][DBLP]


  17. A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes. [Citation Graph (, )][DBLP]


  18. Non-Malleable Codes. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002