Thomas Plantard
Orcid: 0000-0003-2521-2520
According to our database1,
Thomas Plantard
authored at least 53 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Adv. Math. Commun., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
2023
Fast verification and public key storage optimization for unstructured lattice-based signatures.
J. Cryptogr. Eng., September, 2023
2022
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021
2020
Inf., 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
J. Math. Cryptol., 2019
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding.
J. Cryptogr. Eng., 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
2017
J. Cryptogr. Eng., 2017
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 24th IEEE Symposium on Computer Arithmetic, 2017
2016
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record.
J. Internet Serv. Inf. Secur., 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
2015
Theor. Comput. Sci., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Information Security Practice and Experience, 2015
Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand.
Proceedings of the 22nd IEEE Symposium on Computer Arithmetic, 2015
RNS Arithmetic Approach in Lattice-Based Cryptography: Accelerating the "Rounding-off" Core Procedure.
Proceedings of the 22nd IEEE Symposium on Computer Arithmetic, 2015
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Babaï round-off CVP method in RNS: Application to lattice based cryptographic protocols.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Information Security Practice and Experience, 2012
2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation.
IEEE Trans. Computers, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
2009
Proceedings of the Quantum Communication and Quantum Networking, 2009
Proceedings of the 19th IEEE Symposium on Computer Arithmetic, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Proceedings of the Public Key Cryptography, 2008
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Subquadratic Binary Field Multiplier in Double Polynomial System.
Proceedings of the SECRYPT 2007, 2007
2005
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
2003
Proceedings of the 16th IEEE Symposium on Computer Arithmetic (Arith-16 2003), 2003