Thursday, August 11, 2016

A paper accepted to ACM CCS

We are happy to announce that our paper
Stefan Dziembowski, Sebastian Faust, and Francois-Xavier Standaert
Hardware Trojan-Resilience via Testing Amplification
was accepted to the 23rd ACM Conference on Computer and Communications Security (ACM CCS) 2016.

Wednesday, June 15, 2016

A paper accepted to CRYPTO'16

We are happy to announce that our paper
Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, and François-Xavier Standaert
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems
was accepted to CRYPTO 2016.

Our paper in CACM

We are happy to announce that our paper
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek Secure multiparty computations on Bitcoin
appeared in the Communications of the ACM Volume 59 Issue 4, April 2016
[link,video].

(it is a version of our IEEE S&P 2014 paper)

Sunday, January 24, 2016

Our paper at EUROCRYPT'16

We are happy to announce that our paper
Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust
Circuit Compilers with O(1/log(n)) Leakage Rate
was accepted to the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2016

Saturday, September 26, 2015

A tutorial on cryptocurrencies

On Oct 15, 2015 Stefan Dziembowski will deliver a 4 hour tutorial entitled
Introduction to Cryptocurrencies
at the 22nd ACM Conference on Computer and Communications Security (ACM CCS) 2015.

New papers accepted

We are happy to announce that the following papers coming from our group have recently been accepted for publications.


  • Maciej Skorski,
    How to Smooth Entropy?International Conference on Current Trends in Theory and Practice of Computer Science SOFSEM
  • Maciej Skórski
    On Provable Security of wPRF-based Leakage-Resilient Stream CiphersInternational Conference on Provable Security (ProvSec) 2015
  • Onur Günlü, Gerhard Kramer, and Maciej Skórski
    Privacy and Secrecy with Multiple Measurements of Physical and Biometric IdentifiersIEEE Conference on Communication and Network Security CNS 2015,
  • Maciej Skórski
    How much randomness can be extracted from memoryless Shannon entropy sources?International Workshop on Information Security Applications WISA 2015
  • Maciej Skórski
    Time-Success Ratios under Simple Transformations: Analysis and ApplicationsInternational Conference on Cryptography and Information Security BalkanCryptSec 2015
  • Maciej Skórski
    Shannon Entropy versus Renyi Entropy from a Cryptographic ViewpointIMA International Conference on Cryptography and Coding (IMACC) 2015
  • Maciej Skórski
    A New Approximate Min-Max Theorem with Applications in Cryptography
    International Symposium on Algorithms and Computation (ISAAC) 2015

Saturday, May 16, 2015

Papers accepted to LATINCRYPT

We are happy to announce that the following papers:
Krzysztof Pietrzak and Maciej Skorski
The Chain Rule for HILL Pseudoentropy, Revisited
Vincenzo Iovino and Karol Żebrowski
Simulation-Based Secure Functional Encryption in the Random Oracle Model
were accepted to LATINCRYPT 2015 - the Fourth International Conference on Cryptology and Information Security in Latin America.