|
|
[1]
|
Arboit, G., Crépeau, C., Davis, C. R., and Maheswaran, M.
A localized certificate revocation scheme for mobile ad hoc networks.
Ad Hoc Networks, 2008, v. 6, n. 1, pp. 17-31.
|
|
[2]
|
Crépeau, C., and Wullschleger, J.
Statistical security conditions for two-party secure function
evaluation.
In Safavi-Naini, R., editor, Proceedings of ICITS 2008,
Berlin/Heidelberg. Springer-Verlag, August 2008, v. 5155 of Lecture
Notes in Computer Science, Lecture Notes in Computer Science, pp. 86–-99.
[ .pdf ]
|
|
[3]
|
Crépeau, C., Kilian, J., and Savvides, G.
Interactive hashing: An information theoretic tool.
In Safavi-Naini, R., editor, Proceedings of ICITS 2008,
Berlin/Heidelberg. Springer-Verlag, August 2008, v. 5155 of Lecture
Notes in Computer Science, Lecture Notes in Computer Science, pp. 14-28.
[ .pdf ]
|
|
[4]
|
Desrosiers, S. P., and Dupuis, F.
Quantum entropic security and approximate quantum encryption.
July 2007, p. 16 pages.
Quantum Physics (quant-ph).
[ http |
http ]
|
|
[5]
|
Desrosiers, S. P.
Entropic security in quantum cryptography.
March 2007, p. 12 pages.
Quantum Physics (quant-ph).
[ http |
http ]
|
|
[6]
|
Layouni, M.
Accredited symmetrically private information retrieval.
In Miyaji, A., Kikuchi, H., and Rannenberg, K., editors, Lecture
Notes in Computer Science, Berlin. Springer, 2007, v. 4752, pp. 262-277.
|
|
[7]
|
Layouni, M., and Vangheluwe, H.
Anonymous k-show credentials.
In Lopez, J., Samarati, P., and Ferrer, J. L., editors, Lecture
Notes in Computer Science IWSEC, Berlin. Springer, 2007, v. 4582,
pp. 181-192.
[ http ]
|
|
[8]
|
Crépeau, C., Davis, C. R., and Maheswaran, M.
A secure manet routing protocol with resilience against byzantine
behaviours of malicious or selfish nodes.
In AINA Workshops, 2007, n. 2, pp. 19-26.
|
|
[9]
|
Ben-Or, M., Crépeau, C., Gottesman, D., Hassidim, A., and Smith, A.
Secure multiparty quantum computation with (only) a strict honest
majority.
2006, pp. 249-260.
ISBN=0-7695-2720-5.
[ http |
.pdf ]
|
|
[10]
|
Crépeau, C., and Savvides, G.
Optimal reductions between oblivious transfers using interactive
hashing.
July 2006, v. LNCS 4004/2006, pp. 201-221.
ISBN = 3-540-34546-9 ISSN = 0302-9743 (Print) 1611-3349 (Online).
[ http |
.pdf ]
|
|
[11]
|
Crépeau, C., Savvides, G., Schaffner, C., and Wullschleger, J.
Information-theoretic conditions for two-party secure function
evaluation.
July 2006, v. LNCS 4004/2006, pp. 538-554.
ISSN 0302-9743 (Print) 1611-3349 (Online) ISBN 3-540-34546-9.
[ http |
.pdf ]
|
|
[12]
|
Arboit, G., Crépeau, C., Davis, C. R., and Maheswaran, M.
A localized certificate revocation scheme for mobile ad hoc networks.
Ad Hoc Networks, August 2006.
ISSN: 1570-8705 *Please be aware that although 'Articles in Press' do
not have all bibliographic details available yet, they can already be cited
using the year of online availability and the DOI as follows: Author(s),
Article Title, Journal (Year), DOI. In Press.
[ http |
.pdf ]
|
|
[13]
|
Brassard, G., Crépeau, C., and Wolf, S.
Oblivious transfers and privacy amplification.
Journal of Cryptology, September 2003, v. 16, n. 4,
pp. 219-237.
Received: 1 April 2001, Revised: 1 July 2002, Published online: 5
March 2003.
[ .ps |
.pdf ]
|
|
[14]
|
Brassard, G., Crépeau, C., and Sántha, M.
Oblivious transfers and intersecting codes.
IEEE Transaction on Information Theory, November 1996, v. 42,
n. 6, pp. 1769-1780.
special issue on coding and complexity.
[ .ps |
.pdf ]
|
|
[15]
|
Bennett, C., Brassard, G., Crépeau, C., and Maurer, U.
Generalized privacy amplification.
IEEE Transaction on Information Theory, November 1995, v. 41,
n. 6, pp. 1915-1923.
[ .ps |
.pdf ]
|
|
[16]
|
Bennett, C., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., and Wootters, W.
Teleporting an unkown quantum state by dual classical and epr
channels.
Physical Review Letter, 1993, v. 70, pp. 1895-1898.
[ .ps |
.pdf ]
|
|
|