Christophe Tartary
According to our database1,
Christophe Tartary
authored at least 24 papers
between 2006 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Int. J. Cyber Situational Aware., 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
2012
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries.
IEEE Trans. Inf. Forensics Secur., 2012
J. Cryptol., 2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials.
Int. J. Found. Comput. Sci., 2011
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Int. J. Inf. Sec., 2008
IET Inf. Secur., 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Int. J. Secur. Networks, 2007
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006