Claude Crépeau
Orcid: 0000-0002-9990-8005Affiliations:
- McGill University, Montreal, Canada
According to our database1,
Claude Crépeau
authored at least 72 papers
between 1985 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
-
on cs.mcgill.ca
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
2021
2020
Electron. Colloquium Comput. Complex., 2020
2019
Proceedings of the 14th Conference on the Theory of Quantum Computation, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
2015
Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver.
IEEE Trans. Inf. Theory, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2008
Ad Hoc Networks, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
2007
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
2001
Proceedings of the Advances in Cryptology, 2001
1998
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Advances in Cryptology, 1997
1996
Guest Editor's Introduction.
J. Cryptol., 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1993
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993
1991
Theor. Comput. Sci., 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989
Proceedings of the Advances in Cryptology, 1989
Everything in NP can be Argued in <i>Perfect</i> Zero-Knowledge in a <i>Bounded</i> Number of Rounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986
Non-Transitive Transfer of Confidence: A Perfect Zero-Knowledge Interactive Protocol for SAT and Beyond
Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986
A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face.
Proceedings of the Advances in Cryptology, 1986
Proceedings of the Advances in Cryptology, 1986
Proceedings of the Advances in Cryptology, 1986
Proceedings of the Advances in Cryptology, 1986
1985
Proceedings of the Advances in Cryptology, 1985