University of Warsaw and IDEAS NCBR
Stefan Dziembowski: selected talks
-
CAI Monthly AI Seminar Series for IIIT Delhi (virtual), November 2024
Going off the blockchain
[slides]
-
Advances in Financial Technologies - AFT 2023, Princeton University, USA, October 2023
Non-Atomic Payment Splitting in Channel Networks
[slides]
-
German Historical Institute, Warsaw, December 2022
Cryptography: from ancient art to modern science
[slides]
-
Ueli Maurer’s Birthday Seminar, Monte Verità, Switzerland, June, 2022
From BSM to BRM to BLM
[slides]
-
Milan Theory Workshop, June 2022
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
[slides]
-
17th SFI IT Academic Festival, Cracow, March 2022
Crypto in Crypto
[slides]
-
20th FOSAD School, Bertinoro, August 2021
Going off the blockchain
[slides]
-
Cyber Week, Tel-Aviv University (virtual event), July 2021
Layer 2 – protocols working on top of blockchains
[slides]
-
University of Lübeck (virtual seminar), March 2021
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
[slides]
-
Proofs, Consensus, and Decentralizing Society Reunion, UC Berkeley, December 2020 (virtual event because of the Covid pandemic)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
[slides,video]
-
CS Virtual Colloquium at Purdue University, December 2020
Non-Atomic Payment Splitting in Channel Networks
[slides]
-
Conference on Cryptographic Hardware and Embedded Systems (CHES) 2020 (virtual event because of the Covid pandemic), September 2020
Theory of leakage – a look at the past two decades of research
[slides,video]
-
Theory and Practice of Blockchains (Online Weekly Seminar Series ), July 2020
Non-Atomic Payment Splitting in Channel Networks
[slides]
-
The Stanford Blockchain Conference, Stanford University, February 2020
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma
[slides]
-
Bay Area Crypto Day, UC Berkeley, November 2019
Position-Based Cryptography and Multiparty Communication Complexity
[slides]
-
Simons Institute, UC Berkeley, November 2019
Introduction to Plasma
[slides]
-
European Forum for Science, Research and Innovation, Dresden, June 2019
Blockchain technology – hype vs. reality
[slides]
-
Theory and Practice of Blockchains, Aarhus University, May 2019
Perun’s Off-chain Channels
[slides]
-
The Centre of New Technologies, University of Warsaw, May 2019
Crypto in Crypto
[slides]
-
Centre for Quantum Technologies, National University of Singapore, March 2019
Going off the chain
[slides]
-
3rd PhD Student Conference, Nencki Institute of Experimental Biology, October 2018
Cryptography: from ancient art to modern science
[slides]
-
Symposium “Can The World Run on Blockchains?”, TU Darmstadt, Germany, September 2018
What has the Blockchain ever done for us?
[slides]
-
From Poland with Science, Cambridge, March 2018
Basic Research in Cryptography
[slides]
-
IISC-IACR School on Cryptology, Indian Institute of Science, Bangalore, India, January 2018
Introduction to Non-Malleable Codes
[slides]
-
Tokyo Institute of Technology, Tokyo, Japan, December 2017
Introduction to Cryptocurrencies -
TCC 2017, Baltimore, USA, November 2017
Position-Based Cryptography and Multiparty Communication Complexity
[slides]
-
FACT Center Fast and Sound Cryptography Workshop, IDC Herzliya, Israel, September 2017
State Channels over Cryptographic Currencies
[slides]
-
FIT 2017, Warsaw, Poland, July 2017
Proofs-of-space – an alternative for Proofs-of-work
[slides]
-
Digital Money & Blockchain Forum, Warsaw, Poland, June 2017
Perun –Virtual Payment Channel System
[slides]
-
Kryptopia Meeting, University of Warsaw, Poland, May 2017
Perun – a Virtual Payment Channel System
[slides]
-
Łazarski University, Warsaw, Poland, April 2017
Proofs-of-space – an alternative for Proofs-of-work
[slides]
-
COST Cryptoaction meeting, Amsterdam, The Netherlands, March 2017
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
[slides]
-
MIMUW colloquium, Warsaw, Poland, January 2017
Non-Malleable Codes
[slides]
-
ACM CCS 2016, Vienna, Austria, October 2016
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
[slides]
-
Workshop on Mathematics of Information-Theoretic Cryptography Institute for Mathematical Sciences, National University of Singapore, September 2016
Circuit compilers with O(1/log(n)) leakage rate
[slides]
-
Tutorials on Mathematics of Information-Theoretic Cryptography
Nanyang Technological University, Singapore, September 2016
Modelling Side-Channel Leakage
[slides]
-
"Virtual currencies -- threats and challenges" --- a conference at the Polish Ministry of Finance, Warsaw, Poland, June 2016
How to order a murder using cryptocurrencies?
[slides]
-
Workshop on Bitcoin, Introduction to Cryptocurrencies, Kfar Maccabiah, Ramat Gan, Israel, June, 2016
Introduction to Cryptocurrencies (a tutorial) [abstract] -
"Technical Aspects of ICT Crime” Conference, Police Academy in Szczytno, Poland, May 2016
How to order a murder using cryptocurrencies?
[slides]
-
COST Cryptoaction meeting, Budapest, Hungary, April 2016
Modelling Side-Channel Leakage
[slides]
-
Symposium on the Work of Ivan Damgård, Aarhus, Denmark, April 2016
Proofs of Space
[slides]
-
Nexus of Information and Computation Theories, Henri Poincare Institute, Paris, France, March 2016
Modelling Side-Channel Leakage
[slides]
-
PhD Open, Warsaw, Poland, March 2016
Introduction to Cryptocurrencies
[slides]
-
FIT 2016, Warsaw, Poland, February 2016
Non-Malleable Codes
[slides]
-
TCC 2016, Tel-Aviv, Israel, January 2016
Optimal Amplification of Noisy Leakages
[slides]
-
Workshop of The Polish Children's Fund, Warsaw, Poland, December 2015
Bitcoin – Mr. Nakamoto wonderful invention
[slides]
-
SantaCrypt 2015, Prague, Czech Republic, December 2015
Research Challenges in Cryptocurrencies
[slides]
-
MACIS, Berlin, Germany, November 2015
Modelling Side Channel Leakage
[slides]
-
Tutorial at the ACM CCS'15, Denver, USA, October 2015
Introduction to Cryptocurrencies.
[slides, abstract]
-
Nippon Telegraph and Telephone (NTT) R&D Center, Tokyo, Japan, September 2015:
-
Kyoto University, Kyoto, Japan, September 2015
Proofs of Space and their Applications to Cryptocurrencies
[slides]
-
CRYPTO 2015, Santa Barbara, USA, August 2015
-
Digital Money & Currency Forum, Warsaw, Poland, June 2015
Technological weaknesses of Bitcoin
[slides]
-
Club of the Foundation for Polish Science Scholars Symposium, Odolanów, Poland, May 2015
Consensus in Peer-to-Peer Networks
[slides]
-
EUROCRYPT 2014, Sofia, Bulgaria, April 2015
Noisy Leakage Revisited
[slides]
-
Workshop in Cryptography, Bochum University, Germany, April 2015
PoW-Based Distributed Cryptography with no Trusted Setup
[slides]
-
FIT 2015, Warsaw, Poland, January 2015
Why do the cryptographic currencies need a solid theory
[slides]
-
International Workshop on P2P Financial Systems, Deutsche Bundesbank, Frankfurt, Germany, January 2015
How to compute securely using Bitcoin scripts
[slides]
-
Inter-Mix 2014, Wojanów, Poland, November 2014
Mathematical aspects of cryptocurrencies
[slides]
-
The First Greater Tel Aviv Area Cryptography Symposium, Tel Aviv, Israel, November 2014,
-
Joint Estonian-Latvian Theory Days at Ratnieki, Latvia, October 2014
Recent advances in non-malleable codes
[slides]
-
A seminar at the Warsaw University of Technology before the ceremony of awarding IEEE Milestone to the Polish mathematicians who broke the Enigma machine, Warsaw, Poland, August 2014
Cryptography - from art to science
[slides]
-
UCL London weekly Bitcoin Research Seminar, London, UK, October 2014
Bitcoin contracts -- digital economy without lawyers?
[slides]
-
ZISC Workshop on Information Security, ETH Zurich, Switzerland, September 2014
Bitcoin contracts -- digital economy without lawyers?
[slides]
-
The Summer Research Institute, EPFL Lausanne, Switzerland, June 2014
Bitcoin contracts -- digital economy without lawyers?
[slides]
-
Horizons In Mathematics - MCMCS Conference for Students (Będlewo, Poland), March 2014
Cryptographic aspects of Bitcoin
[slides]
-
Rump session at the Cryptolens 2013 workshop, Weizmann Institute, Israel, December 2013
MPCs on Bitcoin
[slides]
-
ICITS 2013, Singapore, November 2013
Leakage resilience of Blom key distribution scheme,
[slides]
-
Aarhus University Theory Seminar, Aarhus, October 2013
Non-Malleable Codes from Two-Source Extractors
[slides]
-
TCC 2012, Taormina, Italy, March 2012
Leakage-Resilient Circuits without Computational Assumptions
-
Trends in Theoretical Cryptography, Tsinghua University, Beijing, China, 2011 January
One-Time Computable Self-Erasing Functions
[slides]
-
Provable Security against Physical Attacks Lorentz Center, Leiden, the Netherlands, February 2010
On the only computation leaks information paradigm
[slides]
-
ICITS 2009, Shizuoka, Japan, December 2009
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
[slides]
-
DYNAS 2009, Wroclaw, Poland, September 2009
Cryptography on Non-Trusted Machines
[slides]
-
WPK 2009, Bertinoro, Italy, May 2009
Leakage-Resilient Cryptography
-
FOCS 2008, Philadelphia, USA, October 2008
Leakage-Resilient Cryptography
-
FOCS 2007, Providence, USA, October 2007
Intrusion-resilient secret sharing
-
CRYPTO 2006, Santa Barbara, USA, August 2006
On Forward-Secure Storage
-
TCC, New York, USA, March 2006
Intrusion Resilience via the Bounded-Storage Model
-
EUROCRYPT, Interlaken, Switzerland, May 2004
On Generating the Initial Key in the Bounded-Storage Model