top of page
Stefan Dziembowski: selected talks
  • CAI Monthly AI Seminar Series for IIIT Delhi (virtual), November 2024
    Going off the blockchain
    [slides]
     

  • Advances in Financial Technologies - AFT 2023, Princeton University, USA, October 2023
    Non-Atomic Payment Splitting in Channel Networks
    [slides]
     

  • German Historical Institute, Warsaw, December 2022
    Cryptography: from ancient art to modern science
    [slides]
     

  • Ueli Maurer’s Birthday Seminar, Monte Verità, Switzerland, June, 2022
    From BSM to BRM to BLM
    [slides]
     

  • Milan Theory Workshop, June 2022
    Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
    [slides]
     

  • 17th SFI IT Academic Festival, Cracow, March 2022
    Crypto in Crypto
    [slides]
     

  • 20th FOSAD School, Bertinoro, August 2021
    Going off the blockchain
    [slides]

     

  • Cyber Week, Tel-Aviv University (virtual event), July 2021
    Layer 2 – protocols working on top of blockchains
    [slides]

     

  • University of Lübeck (virtual seminar), March 2021
    Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
    [slides]

     

  • Proofs, Consensus, and Decentralizing Society Reunion, UC Berkeley, December 2020 (virtual event because of the Covid pandemic)
    Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
    [slides,video]

     

  • CS Virtual Colloquium at Purdue University, December 2020
    Non-Atomic Payment Splitting in Channel Networks
    [slides]

     

  • Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020 (virtual event because of the Covid pandemic), September 2020
    Theory of leakage – a look at the past two decades of research
    [slides,video]

     

  • Theory and Practice of Blockchains (Online Weekly Seminar Series ), July 2020
    Non-Atomic Payment Splitting in Channel Networks
    [slides]

  • The Stanford Blockchain Conference,  Stanford University, February 2020
    Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
    [slides]

     

  • Bay Area Crypto Day,  UC Berkeley, November 2019
    Position-Based Cryptography and Multiparty Communication Complexity
    [slides]

     

  • Simons Institute, UC Berkeley, November 2019
    Introduction to Plasma
    [slides]

     

  • European Forum for Science, Research and Innovation, Dresden,  June 2019
    Blockchain technology –  hype vs. reality
    [slides]

     

  • Theory and Practice of Blockchains, Aarhus University, May 2019
    Perun’s Off-chain Channels
    [slides]

     

  • The Centre of New Technologies, University of Warsaw, May 2019
    Crypto in Crypto
    [slides]

     

  • Centre for Quantum Technologies, National University of Singapore, March 2019
    Going off the chain
    [slides]

     

  • 3rd PhD Student Conference, Nencki Institute of Experimental Biology, October 2018
    Cryptography: from ancient art to modern science
    [slides]

     

  • Symposium “Can The World Run on Blockchains?”, TU Darmstadt, Germany, September 2018
    What has the Blockchain ever done for us?
    [slides]

     

  • From Poland with Science, Cambridge, March 2018
    Basic Research in Cryptography
    [slides]

     

  • IISC-IACR School on Cryptology, Indian Institute of Science, Bangalore, India, January 2018
    Introduction to Non-Malleable Codes
    [slides]

     

  • Tokyo Institute of Technology, Tokyo, Japan, December 2017
    Introduction to Cryptocurrencies

    • Introduction [slides]

    • Mining Pools and Attacks [slides]

    • Smart Contracts and Applications [slides]

    • Alternative Cryptocurrencies [slides]
       

  • TCC 2017, Baltimore, USA, November 2017
    Position-Based Cryptography and Multiparty Communication Complexity
    [slides]

     

  • FACT Center Fast and Sound Cryptography Workshop, IDC Herzliya, Israel, September 2017
    State Channels over Cryptographic Currencies
    [slides]

     

  • FIT 2017, Warsaw, Poland, July 2017
    Proofs-of-space – an alternative for Proofs-of-work
    [slides]

     

  • Digital Money & Blockchain Forum, Warsaw, Poland, June 2017
    Perun –Virtual Payment Channel System
    [slides]

     

  • Kryptopia Meeting, University of Warsaw, Poland, May 2017
    Perun – a Virtual Payment Channel System
    [slides]

     

  • Łazarski University, Warsaw, Poland, April 2017
    Proofs-of-space – an alternative for Proofs-of-work
    [slides]

     

  • COST Cryptoaction meeting, Amsterdam, The Netherlands, March 2017
    Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
    [slides]

     

  • MIMUW colloquium, Warsaw, Poland, January 2017
    Non-Malleable Codes
    [slides]

     

  • ACM CCS 2016, Vienna, Austria, October 2016
    Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
    [slides]

     

  • Workshop on Mathematics of Information-Theoretic Cryptography Institute for Mathematical Sciences, National University of Singapore, September 2016
    Circuit compilers with O(1/log(n)) leakage rate
    [slides]

     

  • Tutorials on Mathematics of Information-Theoretic Cryptography
    Nanyang Technological University, Singapore, September 2016
    Modelling Side-Channel Leakage
    [slides]

     

  • "Virtual currencies -- threats and challenges" --- a conference at the Polish Ministry of Finance, Warsaw, Poland, June 2016
    How to order a murder using cryptocurrencies?
    [slides]

     

  • Workshop on Bitcoin, Introduction to Cryptocurrencies, Kfar Maccabiah, Ramat Gan, Israel, June, 2016
    Introduction to Cryptocurrencies (a tutorial) [abstract]

    • Introduction [slides]

    • Mining Pools and Attacks [slides]

    • Smart Contracts and Applications, part I [slides]

    • Smart Contracts and Applications, part II [slides]

    • Alternative Cryptocurrencies [slides]
       

  • "Technical Aspects of ICT Crime” Conference, Police Academy in Szczytno, Poland, May 2016
    How to order a murder using cryptocurrencies?
    [slides]

     

  • COST Cryptoaction meeting, Budapest, Hungary, April 2016
    Modelling Side-Channel Leakage
    [slides]

     

  • Symposium on the Work of Ivan Damgård, Aarhus, Denmark, April 2016
    Proofs of Space
    [slides]

     

  • Nexus of Information and Computation Theories, Henri Poincare Institute, Paris, France, March 2016
    Modelling Side-Channel Leakage
    [slides]

     

  • PhD Open, Warsaw, Poland, March 2016
    Introduction to Cryptocurrencies
    [slides]

     

  • FIT 2016, Warsaw, Poland, February 2016
    Non-Malleable Codes
    [slides]

     

  • TCC 2016, Tel-Aviv, Israel, January 2016
    Optimal Amplification of Noisy Leakages
    [slides]

     

  • Workshop of The Polish Children's Fund, Warsaw, Poland, December 2015
    Bitcoin – Mr. Nakamoto wonderful invention
    [slides]

     

  • SantaCrypt 2015, Prague, Czech Republic, December 2015
    Research Challenges in Cryptocurrencies
    [slides]

     

  • MACIS, Berlin, Germany, November 2015
    Modelling Side Channel Leakage
    [slides]

     

  • Tutorial at the ACM CCS'15, Denver, USA, October 2015
    Introduction to Cryptocurrencies.
    [slides, abstract]

     

  • Nippon Telegraph and Telephone (NTT) R&D Center, Tokyo, Japan, September 2015:

    • Modelling Side-Channel Leakage [slides]

    • Recent Advances in Non-Malleable Codes [slides]

    • Some Recent Developments in Cryptocurrencies (2 lectures) [slides]
       

  • Kyoto University, Kyoto, Japan, September 2015
    Proofs of Space and their Applications to Cryptocurrencies
    [slides]

     

  • CRYPTO 2015, Santa Barbara, USA, August 2015

    • PoW-Based Distributed Cryptography with no Trusted Setup [slides]

    • Proofs of Space [slides]
       

  • Digital Money & Currency Forum, Warsaw, Poland, June 2015
    Technological weaknesses of Bitcoin
    [slides]

     

  • Club of the Foundation for Polish Science Scholars Symposium, Odolanów, Poland, May 2015
    Consensus in Peer-to-Peer Networks
    [slides]

     

  • EUROCRYPT 2014, Sofia, Bulgaria, April 2015
    Noisy Leakage Revisited
    [slides]

     

  • Workshop in Cryptography, Bochum University, Germany, April 2015
    PoW-Based Distributed Cryptography with no Trusted Setup
    [slides

     

  • FIT 2015, Warsaw, Poland, January 2015
    Why do the cryptographic currencies need a solid theory
    [slides]

     

  • International Workshop on P2P Financial Systems, Deutsche Bundesbank, Frankfurt, Germany, January 2015
    How to compute securely using Bitcoin scripts
    [slides]

     

  • Inter-Mix 2014, Wojanów, Poland, November 2014
    Mathematical aspects of cryptocurrencies
    [slides]

     

  • The First Greater Tel Aviv Area Cryptography Symposium, Tel Aviv, Israel, November 2014,

    • Introduction to Bitcoin -- a tutorial [slides]

    • Distributed Cryptography Based on the Proofs of Work -- a talk [slides]
       

  • Joint Estonian-Latvian Theory Days at Ratnieki, Latvia, October 2014
    Recent advances in non-malleable codes
    [slides]

     

  • A seminar at the Warsaw University of Technology before the ceremony of awarding IEEE Milestone to the Polish mathematicians who broke the Enigma machine, Warsaw, Poland, August 2014
    Cryptography - from art to science
    [slides]

     

  • UCL London weekly Bitcoin Research Seminar, London, UK, October 2014
    Bitcoin contracts -- digital economy without lawyers?
    [slides]

     

  • ZISC Workshop on Information Security, ETH Zurich, Switzerland, September 2014
    Bitcoin contracts -- digital economy without lawyers?
    [slides]

     

  • The Summer Research Institute, EPFL Lausanne, Switzerland, June 2014
    Bitcoin contracts -- digital economy without lawyers?
    [slides]

     

  • Horizons In Mathematics - MCMCS Conference for Students (Będlewo, Poland), March 2014
    Cryptographic aspects of Bitcoin
    [slides]

     

  • Rump session at the Cryptolens 2013 workshop, Weizmann Institute, Israel, December 2013
    MPCs on Bitcoin
    [slides]

     

  • ICITS 2013, Singapore, November 2013
    Leakage resilience of Blom key distribution scheme,
    [slides]

     

  • Aarhus University Theory Seminar, Aarhus, October 2013
    Non-Malleable Codes from Two-Source Extractors
    [slides

     

  • TCC 2012, Taormina, Italy, March 2012
    Leakage-Resilient Circuits without Computational Assumptions

     

  • Trends in Theoretical Cryptography, Tsinghua University, Beijing, China, 2011 January
    One-Time Computable Self-Erasing Functions
    [slides]

     

  • Provable Security against Physical Attacks Lorentz Center, Leiden, the Netherlands, February 2010
    On the only computation leaks information paradigm
    [slides]

     

  • ICITS 2009, Shizuoka, Japan, December 2009
    A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
    [slides]

     

  • DYNAS 2009, Wroclaw, Poland, September 2009
    Cryptography on Non-Trusted Machines
    [slides]

     

  • WPK 2009, Bertinoro, Italy, May 2009
    Leakage-Resilient Cryptography

     

  • FOCS 2008, Philadelphia, USA, October 2008
    Leakage-Resilient Cryptography

     

  • FOCS 2007, Providence, USA, October 2007
    Intrusion-resilient secret sharing

     

  • CRYPTO 2006, Santa Barbara, USA, August 2006
    On Forward-Secure Storage

     

  • TCC, New York, USA, March 2006
    Intrusion Resilience via the Bounded-Storage Model

     

  • EUROCRYPT, Interlaken, Switzerland, May 2004
    On Generating the Initial Key in the Bounded-Storage Model

     

bottom of page