Follow
Grégory Demay
Grégory Demay
Senior Software Engineer, DFINITY
Verified email at dfinity.org
Title
Cited by
Cited by
Year
Resource-restricted indifferentiability
G Demay, P Gaži, M Hirt, U Maurer
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
492013
Unfair coin tossing
G Demay, U Maurer
2013 IEEE International Symposium on Information Theory, 1556-1560, 2013
72013
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source
G Demay, V Rathi, LK Rasmussen
2010 International Symposium On Information Theory & Its Applications, 589-594, 2010
62010
Per-session security: Password-based cryptography revisited
G Demay, P Gaži, U Maurer, B Tackmann
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
52017
Rate distortion bounds for binary erasure source using sparse graph codes
G Demay, V Rathi, LK Rasmussen
2010 Data Compression Conference, 49-58, 2010
52010
Per-session security: Password-based cryptography revisited
G Demay, P Gaži, U Maurer, B Tackmann
Journal of Computer Security 27 (1), 75-111, 2019
42019
Query-complexity amplification for random oracles
G Demay, P Gaži, U Maurer, B Tackmann
Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015
42015
Optimality of non-adaptive strategies: The case of parallel games
G Demay, P Gaži, U Maurer, B Tackmann
2014 IEEE International Symposium on Information Theory, 1707-1711, 2014
22014
Common randomness amplification: A constructive view
G Demay, U Maurer
2012 IEEE Information Theory Workshop, 35-39, 2012
22012
Cryptographic Constructions of Randomness Resources
G Demay
ETH Zurich, 2016
2016
Source Coding for Erasure Channels
G Demay
2011
The system can't perform the operation now. Try again later.
Articles 1–11