Grégory Demay

According to our database1, Grégory Demay authored at least 8 papers between 2010 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Per-Session Security: Password-Based Cryptography Revisited.
IACR Cryptol. ePrint Arch., 2016

2015
Query-Complexity Amplification for Random Oracles.
IACR Cryptol. ePrint Arch., 2015

2014
Optimality of Non-Adaptive Strategies: The Case of Parallel Games.
IACR Cryptol. ePrint Arch., 2014

2013
Unfair coin tossing.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Resource-Restricted Indifferentiability.
IACR Cryptol. ePrint Arch., 2012

Common randomness amplification: A constructive view.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

2010
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Rate Distortion Bounds for Binary Erasure Source Using Sparse Graph Codes.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010


  Loading...