Claude Crépeau
ScholarGPS® ID: 86532308347523
Affiliation History
Discipline
Computer Science
Top Specialties
Cryptography | Information Theory | Privacy | Quantum Computing | Quantum State | Quantum Information
Metrics Summary
Publication Count
75
Predicted Citations
22,377
Predicted h-index
38
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
Experimental relativistic zero-knowledge proofs (journal article) Nature, volume 599, issue 7883, pages 47-50 (2021). |
A Sufficient Clarification of “Super-Quantum Correlations: A Necessary Clarification” by Pierre Uzan (journal article) Journal of Quantum Information Science, volume 11, issue 02, pages 65-70 (2021). |
On the Commitment Capacity of Unfair Noisy Channels (journal article) IEEE Transactions on Information Theory, volume 66, issue 6, pages 3745-3752 (2020). |
Multi-prover Interactive Proofs: Unsound Foundations (book chapter) In Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology Springer International Publishing (2017) |
Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver (journal article) IEEE Transactions on Information Theory, volume 61, issue 10, pages 5623-5635 (2015). |
Zero-Knowledge Interactive Proof Systems for New Lattice Problems (book chapter) In Cryptography and Coding Springer International Publishing (2015) |
Oblivious Transfer from Weakly Random Self-Reducible Public-Key Cryptosystem (book chapter) In Mathematical Foundations of Computer Science 2015 Springer Berlin Heidelberg (2015) |
Cut-and-Choose Protocol (book chapter) In Encyclopedia of Cryptography and Security Springer US (2011) |
Two Provers in Isolation (book chapter) In Advances in Cryptology – ASIACRYPT 2011 Springer Berlin Heidelberg (2011) |
Commitment (book chapter) In Encyclopedia of Cryptography and Security Springer US (2011) |
Quantum Cryptography (book chapter) In Encyclopedia of Cryptography and Security Springer US (2011) |
A localized certificate revocation scheme for mobile ad hoc networks (journal article) Ad Hoc Networks, volume 6, issue 1, pages 17-31 (2008). |
Interactive Hashing: An Information Theoretic Tool (Invited Talk) (book chapter) In Information Theoretic Security Springer Berlin Heidelberg (2008) |
Statistical Security Conditions for Two-Party Secure Function Evaluation (book chapter) In Information Theoretic Security Springer Berlin Heidelberg (2008) |
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes (conference) 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) (2007) Niagara Falls, ON, Canada |
Information-Theoretic Conditions for Two-Party Secure Function Evaluation (book chapter) In Advances in Cryptology - EUROCRYPT 2006 Springer Berlin Heidelberg (2006) |
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing (book chapter) In Advances in Cryptology - EUROCRYPT 2006 Springer Berlin Heidelberg (2006) |
A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face (book chapter) In Advances in Cryptology — CRYPTO’ 86 Springer Berlin Heidelberg (2006) |
All-or-Nothing Disclosure of Secrets (book chapter) In Advances in Cryptology — CRYPTO’ 86 Springer Berlin Heidelberg (2006) |
Two Observations on Probabilistic Primality Testing (book chapter) In Advances in Cryptology — CRYPTO’ 86 Springer Berlin Heidelberg (2006) |