Per-session security: Password-based cryptography revisited
Demay, Grégory, Gaži, Peter, Maurer, Ueli, Tackmann, Björn
Published in Journal of computer security (01.01.2019)
Published in Journal of computer security (01.01.2019)
Get full text
Journal Article
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source
Demay, G, Rathi, V, Rasmussen, L K
Published in 2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010 (01.10.2010)
Published in 2010 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010 (01.10.2010)
Get full text
Conference Proceeding
Optimality of non-adaptive strategies: The case of parallel games
Demay, Gregory, Gazi, Peter, Maurer, Ueli, Tackmann, Bjorn
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Published in 2014 IEEE International Symposium on Information Theory (01.06.2014)
Get full text
Conference Proceeding
Rate Distortion Bounds for Binary Erasure Source Using Sparse Graph Codes
Demay, Gregory, Rathi, Vishwambhar, Rasmussen, Lars K
Published in 2010 Data Compression Conference (01.03.2010)
Published in 2010 Data Compression Conference (01.03.2010)
Get full text
Conference Proceeding
Unfair coin tossing
Demay, Gregory, Maurer, Ueli
Published in 2013 IEEE International Symposium on Information Theory (01.07.2013)
Published in 2013 IEEE International Symposium on Information Theory (01.07.2013)
Get full text
Conference Proceeding