FORMATS: D = DVI, P = POSTSCRIPT, G = POSTSCRIPT+GZIP, p = PDF
-
C. Crépeau, L. Salvail, J.-R. Simard, and A. Tapp.
Two Provers in Insolation.
[
P
/
p
]
Submitted to the Asiacrypt 2011, Springer-Verlag.
-
C. Crépeau, and J. Wullschleger.
Statistical Security Conditions for Two-Party Secure Function
Evaluation.
[
P
/
p
]
R. Safavi-Naini (Ed.):Proceedings of ICITS 2008, LNCS 5155,
pp. 86-99. Springer- Verlag, Berlin/Heidelberg, 2008.
-
C. Crépeau, J. Kilian, and G. Savvides.
Interactive Hashing: An Information Theoretic Tool.
[
P
/
p
]
R. Safavi-Naini (Ed.):Proceedings of ICITS 2008, LNCS 5155,
pp. 14-28. Springer- Verlag, Berlin/Heidelberg, 2008.
-
M. Ben-Or, C. Crépeau, D. Gottesman, A. Ha and A. Smith.
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority.
[
P
/
p
]
Proceedings of FOCS 2006, IEEE Press.
-
C. Crépeau and G. Savvides.
Optimal Reductions between Oblivious Transfers using Interactive Hashing.
[
P
/
p
]
Proceedings of Eurocypt 2006, Springer-Verlag.
-
C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger.
Information-Theoretic Conditions for Two-Party Secure Function Evaluation.
[
P
/
p
]
Proceedings of Eurocypt 2006, Springer-Verlag.
-
C. Crépeau, D. Gottesman and A. Smith.
Approximate Quantum Error-Correcting Codes.
[
P
/
p
]
Proceedings of Eurocypt 2005, Springer-Verlag.
-
C. Crépeau, K. Morozov, and S. Wolf.
Efficient Unconditional Oblivious Transfer from Almost any
Noisy Channel
[
P
/
p
]
In proceedings of SCN'04, 2004.
-
C. Crépeau.
Cryptography in a Quantum World (Abstract).
[
P
/
p
]
and related
presentation [
HIGH-res
/
low-res
]
In proceedings of EQIS'04, 2004.
-
C. Crépeau, P. Dumais, D. Mayers and L. Salvail.
Apparent Collapse of Quantum State and
Computational Quantum Oblivious Transfer.
[
P
/
p
]
In the proceedings of the first TCC'04, 2004.
-
C. Crépeau, and C. Davies.
A certificate revocation scheme for wireless ad hoc network.
[
P
/
G
/
p
]
In the proceedings of
the 1st ACM workshop on Security of ad hoc
and sensor networks
,
Conference on Computer and Communications Security,
Fairfax, Virginia, 2003, Pages: 54 - 61.
-
C. Crépeau, and A. Slakmon.
Simple Backdoors to RSA key generation.
[
P
/
G
/
p
]
In the proceedings of
3rd RSA Cryptographer track conference , 2003.
-
H. Barnum, C. Crépeau, D. Gottesman, A Smith and A. Tapp.
Authentication of Quantum Messages.
[
P
/
G
/
p
]
In the proceedings of the
43rd Annual IEEE Symposium on Foundations of Computer Science , 2002.
-
C. Crépeau, D. Gottesman, and A Smith
Multy-party Quantum Computations.
[
P
/
G
/
p
]
In proceedings of the
33rd Symp. on Theory of Computing , ACM, 2002.
As submitted:
[
P
/
G
/
p
]
-
C. Crépeau, F. Légaré and L. Salvail.
How to convert the flavor of a quantum bit commitment.
[
D
/
P
/
G
/
p
]
In Advances in Cryptology: Proceedings
of Eurocrypt '0l. , Springer-Verlag, pages 60-77, 2001.
-
C. Cachin, C. Crépeau, and J. Marcil.
Oblivious Transfer with a Memory-Bound Receiver (DRAFT).
[
D
/
P
/
G
/
p
]
In proceedings of the 39th Symp. on Found. of Computer Sci. ,
IEEE, pages 493-502, 1998.
-
G. Brassard, C. Crépeau, D. Mayers and L. Salvail.
The Security of Quantum Bit Commitments Schemes.
[
D
/
P
/
G
/
p
]
invited paper at RANDOMIZED ALGORITHMS,
A Satellite Workshop to MFCS'98,
August 26-28, 1998, Brno, Czech Republic.
-
C. Crépeau.
Efficient Cryptographic Protocols Based on Noisy Channels.
[
D
/
P
/
G
]
Advances in Cryptology: Proceedings
of Eurocrypt '97 , Springer-Verlag, pages 306-317, 1997.
-
G. Brassard and C. Crépeau.
Oblivious Transfers and Privacy Amplification.
[
D
/
P
/
G
]
Advances in Cryptology: Proceedings
of Eurocrypt '97 , Springer-Verlag, pages 334-347, 1997.
-
C. Crépeau.
What is going on with Quantum Bit Commitment?.
[
D
/
P
/
G
]
invited paper in
Proceedings of Pragocrypt '96 ,
Czech Technical University Publishing House, Prague, pages 193-203, 1996.
-
C. Crépeau, J. van de Graaf, and A. Tapp.
Committed Oblivious Transfer and Private Multi-Party Computations.
[
D
/
P
/
G
]
Advances in Cryptology: Proceedings
of Crypto '95 , Springer-Verlag, pages 110-123, 1995.
-
C. Crépeau, and L. Salvail.
Quantum Oblivious Mutual Identification.
[
D
/
P
/
G
]
Advances in Cryptology: Proceedings
of Eurocrypt '95 , Springer-Verlag, pages 133-147, 1995.
-
C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer.
Generalized Privacy Amplification (Abstract).
[
D
/
P
/
G
]
Proceedings of the IEEE Symposium on Information Theory ,
page 350. IEEE, 1994.
-
G. Brassard, C. Crépeau, R. Jozsa, and D. Langlois.
A quantum bit commitment scheme provably unbreakable by both parties.
[
D
/
P
/
G
]
In 34th Symp. on Found. of Computer Sci. , pages 42-52.
IEEE, 1993.
-
C. Crépeau and J. Kilian.
Discreet solitary games.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Crypto '93 , Lecture
Notes in Computer Science. Springer-Verlag, pages 319-330,1993.
-
C. Crépeau.
Cryptographic primitives and quantum theory.
[
D
/
P
/
G
]
In Proceedings of the second Physics of Computation Workshop,
PhysComp '92 , pages 200-204, 1993.
-
C.H. Bennett, G. Brassard, C. Crépeau, and M.-H. Skubiszewska.
Practical quantum oblivious transfer protocols.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Crypto '91 , volume
576 of Lecture Notes in Computer Science , pages 351-366.
Springer-Verlag, 1992.
-
C. Crépeau and M. Sántha.
Efficient reductions among oblivious transfer protocols based on new
self-intersecting codes.
[
D
/
P
/
G
]
In Sequences II, Methods in Communications, Security, and
Computer Science , pages 360-368. Springer-Verlag, 1991.
-
G. Brassard, C. Crépeau, S. Laplante, and C. Léger.
Computationally convincing proofs of knowledge.
[
D
/
P
/
G
]
In Proceedings of STACS '91 , volume 480 of Lecture Notes
in Computer Science , pages 251-262. Springer-Verlag, 1991.
-
C. Crépeau and M. Sántha.
On the reversibility of oblivious transfer.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Eurocrypt '91 , volume
547 of Lecture Notes in Computer Science , pages 106-113.
Springer-Verlag, 1991.
-
G. Brassard and C. Crépeau.
Quantum bit commitment and coin tossing protocols.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Crypto '90 , volume
537 of Lecture Notes in Computer Science , pages 49-61.
Springer-Verlag, 1991.
-
G. Brassard and C. Crépeau.
Sorting out zero-knowledge.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Eurocrypt '89 , volume
434 of Lecture Notes in Computer Science , pages 150-154.
Springer-Verlag, 1990.
-
C. Crépeau.
Verifiable disclosure of secrets and applications.
[
D
/
P
/
G
]
In Advances in Cryptology: Proceedings of Eurocrypt '89 , volume
434 of Lecture Notes in Computer Science , pages 181-191.
Springer-Verlag, 1990.
-
G. Brassard, C. Crépeau, and M. Yung.
Everything in NP can be argued in perfect zero-knowledge in a
constant number of rounds.
[
P
/
G
]
In 16th ICALP , volume 372 of Lecture Notes in
Computer Science , pages 123-136. Springer-Verlag, 1989.
-
D. Chaum, C. Crépeau, and I. Damgaard.
Multiparty unconditionally secure protocols.
[
P
/
G
]
In 19th Symp. on Theory of Computing , pages 11-19. ACM,
1988.
-
C. Crépeau and J. Kilian.
Achieving oblivious transfer using weakened security assumptions.
[
D
/
P
/
G
]
In 29th Symp. on Found. of Computer Sci. , pages 42-52.
IEEE, 1988.
-
C. Crépeau and J. Kilian.
Weakening security assumptions and oblivious transfer.
[
D
/
P
/
G
]
In S. Goldwasser, editor, Advances in Cryptology: Proceedings of
Crypto '88 , volume 403 of Lecture Notes in Computer Science , pages
2-7. Springer-Verlag, 1990.
-
C. Crépeau.
Equivalence between two flavours of oblivious transfers (abstract).
[
P
/
G
]
In C. Pomerance, editor, Advances in Cryptology: Proceedings of
Crypto '87 , volume 293 of Lecture Notes in Computer Science , pages
350-354. Springer-Verlag, 1988.
-
P. Beauchemin, G. Brassard, C. Crépeau, C. Goutier, and C. Pomerance.
Two observations on probabilistic primality testing.
[
P
/
G
]
In Advances in Cryptology: Proceedings of
Crypto '86 , volume 263 of Lecture Notes in Computer Science , pages
443-450. Springer-Verlag, 1987.
-
G. Brassard and C. Crépeau.
Zero-knowledge simulation of boolean circuits (extended abstract).
[
P
/
G
]
In Advances in Cryptology: Proceedings of
Crypto '86 , volume 263 of Lecture Notes in Computer Science , pages
223-233. Springer-Verlag, 1987.
-
G. Brassard, C. Crépeau, and J.-M. Robert.
All-or-nothing disclosure of secrets (extended abstract).
[
P
/
G
]
In Advances in Cryptology: Proceedings of
Crypto '86 , volume 263 of Lecture Notes in Computer Science , pages
234-238. Springer-Verlag, 1987.
-
C. Crépeau.
A zero-knowledge poker protocol that achieves confidentiality of the
players' strategy or how to achieve an electronic poker face.
[
P
/
G
]
In Advances in Cryptology: Proceedings of
Crypto '86 , volume 263 of Lecture Notes in Computer Science , pages
239-247. Springer, 1987.
-
G. Brassard and C. Crépeau.
Non-transitive transfer of confidence: A perfect zero-knowledge
interactive protocol for SAT and beyond.
[
P
/
G
]
In 27th Symp. of Found. of Computer Sci. , pages 188-195.
IEEE, 1986.
-
G. Brassard, C. Crépeau, and J.-M. Robert.
Information theoretic reductions among disclosure problems.
[
P
/
G
]
In 27th Symp. of Found. of Computer Sci. , pages 168-173.
IEEE, 1986.
-
C. Crépeau.
A secure poker protocol that minimizes the effects of player
coalitions.
[
P
/
G
]
In Advances in Cryptology: Proceedings
of Crypto '85 , vol 218 of LNCS
pages 73-86. Springer, 1986.