Resource-restricted indifferentiability G Demay, P Gaži, M Hirt, U Maurer Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 52 | 2013 |
Unfair coin tossing G Demay, U Maurer 2013 IEEE International Symposium on Information Theory, 1556-1560, 2013 | 9 | 2013 |
Per-session security: Password-based cryptography revisited G Demay, P Gaži, U Maurer, B Tackmann Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 6 | 2017 |
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source G Demay, V Rathi, LK Rasmussen 2010 International Symposium On Information Theory & Its Applications, 589-594, 2010 | 6 | 2010 |
Rate distortion bounds for binary erasure source using sparse graph codes G Demay, V Rathi, LK Rasmussen 2010 Data Compression Conference, 49-58, 2010 | 5 | 2010 |
Per-session security: Password-based cryptography revisited G Demay, P Gaži, U Maurer, B Tackmann Journal of Computer Security 27 (1), 75-111, 2019 | 4 | 2019 |
Query-complexity amplification for random oracles G Demay, P Gaži, U Maurer, B Tackmann Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015 | 4 | 2015 |
Optimality of non-adaptive strategies: The case of parallel games G Demay, P Gaži, U Maurer, B Tackmann 2014 IEEE International Symposium on Information Theory, 1707-1711, 2014 | 2 | 2014 |
Common randomness amplification: A constructive view G Demay, U Maurer 2012 IEEE Information Theory Workshop, 35-39, 2012 | 2 | 2012 |
Cryptographic Constructions of Randomness Resources G Demay ETH Zurich, 2016 | | 2016 |
Source Coding for Erasure Channels G Demay | | 2011 |