Grégory Demay

According to our database1, Grégory Demay authored at least 8 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Per-Session Security: Password-Based Cryptography Revisited.
Proceedings of the Computer Security - ESORICS 2017, 2017

2015
Query-Complexity Amplification for Random Oracles.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
Optimality of non-adaptive strategies: The case of parallel games.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Unfair coin tossing.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Resource-Restricted Indifferentiability.
Proceedings of the Advances in Cryptology, 2013

2012
Common randomness amplification: A constructive view.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

2010
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Rate Distortion Bounds for Binary Erasure Source Using Sparse Graph Codes.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010


  Loading...