Contact |
Research |
Supervision |
Journal |
Conference |
Ph.D. |
Grant
Thomas Plantard
PhD in Computer Science
Senior Research Fellow
Institute of Cybersecurity and Cryptology
School of Computing and Information Technology
Faculty of Engineering and Information Sciences
University of Wollongong
thomaspl@uow.edu.au
Phone: (+61) 2 42 21 53 24
University of Wollongong
Northfields Avenue
Wollongong NSW 2522
Australia
Research
My research interests are around cryptologic problems with a focus on post-quantum cryptography, i.e. quantum-resistant cryptography.
- Actually, I deal with lattice theory for cryptography: as an example, I helped build an Ideal Lattice Challenge.
Last papers on this themathic:
- RNS Arithmetic Approach in Lattice-based Cryptography - Accelerating the "Rounding-off" Core Procedure: paper.pdf.
- LLL for Ideal Lattices: Re-evaluation of the Security of Gentry-Halevi's FHE Scheme: paper.pdf.
- Fully Homomorphic Encryption using Hidden Ideal Lattice: paper.pdf.
- Since my Ph.D., I also worked on modular arithmetic and number system with a focus on building efficient and side-channel resistant cryptosystems, in particular for Elliptic Curve Cryptography.
Last papers on those themathics:
- Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand: paper.pdf.
- Selected RNS Bases for Modular Multiplication: paper.pdf.
- Efficient modular arithmetic in Adapted Modular Number System using Lagrange representation: paper.pdf.
Supervision
I actually supervise one Master student and two PhD candidates:
- Z. Chen, Master student in Computer Science.
- Finding the Shortest Non-Zero Vector in High Dimensional Lattice
- A. Sipasseuth, PhD candidate in Computer Science.
- Lattice-Based Cryptography
- A. Lesavourey, PhD candidate in Computer Science.
- Lattices for a post-quantum cryptography
Previous student:
- C. Gritti, Doctor of Philosophy in Computer Science - 2016.
- Contributions to Cryptographic Solutions towards Securing Medical Applications.
- Z. Zhang, Doctor of Philosophy in Computer Science - 2014.
- Revisiting Fully Homomorphic Encryption Schemes and Their Cryptographic Primitives. (thesis.pdf)
- V. E. Tourloupis, Master of Computer Science - Research - 2013.
- Hermite Normal Forms and its Cryptographic Applications. (thesis.pdf)
- M. Rose, Master of Computer Science - Research - 2011.
- Lattice-Based Cryptography: A Practical Implementation. (thesis.pdf)
Journal
- Certificate-Based Encryption with Keyword Search Enabling Secure Authorization in Electronic Health Record,
C. Gritti, W. Susilo and T. Plantard
Journal of Internet Services and Information Security, Volume 6, Number 4, Novmebr 2016, pages 1-34.
- Efficient Regular Modular Exponentiation Using Multiplicative Half-Size Splitting,
C. Negre and T. Plantard,
Journal of Cryptographic Engineering, Volume 7, Issue 3, September 2017, pages 245-253.(paper.pdf)
- Logarithmic Size Ring Signatures without Random Oracles,
C. Gritti, W. Susilo and T. Plantard
IET Information Security , Volume 10, Issue 1, January 2016, pages 1-7.
- Broadcast Encryption with Dealership,
C. Gritti, W. Susilo, T. Plantard, K. Liang and D. S. Wong
International Journal of Information Security , April 2015, pages 1-13.
- Privacy-Preserving Encryption Scheme using DNA Parentage Test,
C. Gritti, W. Susilo, T. Plantard and K. T. Win
Theoretical Computer Science , Volume 580, May 2015, pages 1-13.
- Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently,
C. Gritti, W. Susilo, T. Plantard, K. Liang and D. S. Wong
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 5, Number 4, December 2014, pages 3-28. (paper.pdf)
- LLL for Ideal Lattices: Re-evaluation of the Security of Gentry-Halevi's FHE Scheme,
T. Plantard, W. Susilo and Z. Zhang
Designs, Codes and Cryptography, Volume 76, Issue 2, March 2014, pages 325-344. (paper.pdf)
- Fully Homomorphic Encryption using Hidden Ideal Lattice,
T. Plantard, W. Susilo and Z. Zhang
IEEE Transactions on Information Forensics & Security, Volume 8, Numero 12, December 2013, pages 2127-2137. (paper.pdf)
- Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation,
J.-C. Bajard, C. Negre and T. Plantard,
IEEE Transactions on Computers, Volume 59, Numero 12, December 2010, pages 1585-1597. (paper.pdf)
- Efficient Lattice-based Signature Scheme,
T. Plantard, W. Susilo, K. T. Win and Q. Huang
International Journal of Applied Cryptography (IJACT), Volume 1, Issue 2, 2008, pp 120-132. (paper.pdf)
Conference
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy,
C. Gritti, R. Chen, W. Susilo and T. Plantard,
Accepted to ISPEC 2017. 13th International Conference on Information Security Practice and Experience. Melbourne, Australia, December 13-15, 2017.
- Efficient Leak Resistant Modular Exponentiation in RNS,
A. Lesavourey, C. Negre and T. Plantard,
Accepted to ARITH 24. 24th IEEE Symposium on Computer Arithmetic. London, England, July 24-26, 2017.
- Enhanced Digital Signature using RNS Digit Exponent Representation,
T. Plantard and J.-M. Robert
Lecture Notes in Computer Science, Volume 10064, 2017.6th International Workshop on Arithmetic of Finite Fields, WAIFI 2016. Ghent, Belgium. July 13-15, 2016, pages 177-192.
- Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications,
A. Lesavourey, C. Negre and T. Plantard,
SECRYPT 2016. The 13th International Conference on Security and Cryptography. Lisbon, Portugal, July 26-28, 2016, pages 368-375.
- Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy,
C. Gritti, W. Susilo and T. Plantard
Lecture Notes in Computer Science, Volume 9144, 2015. Proceedings of Information Security and Privacy. 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29-July 1, 2015, pages 395-412.
- Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand,
C. Negre, T. Plantard and J.-M. Robert
Proceedings of ARITH 22. 22nd IEEE Symposium on Computer Arithmetic. Lyon, France, June 22-24, 2015, pages 144-151.(paper.pdf)
- RNS Arithmetic Approach in Lattice-based Cryptography - Accelerating the "Rounding-off" Core Procedure,
J.-C. Bajard, J. Eynard, N. Merkiche and T. Plantard
Proceeding of ARITH 22. 22nd IEEE Symposium on Computer Arithmetic. Lyon, France, June 22-24, 2015, pages 113-120. (paper.pdf)
- Efficient File Sharing in Electronic Health Records,
C. Gritti, W. Susilo, T. Plantard,
Lecture Notes in Computer Science, Volume 9065, 2015. Proceedings of Information Security Practice and Experience. 11th International Conference, ISPEC 2015, Hangzhou, China, April 9-12, 2012, pages 499-513. (paper.pdf)
- Babai Round-Off CVP method in RNS - Application to Lattice based cryptographic protocols,
J.-C. Bajard, J. Eynard, N. Merkiche and T. Plantard
Proceedings of ISIC 2014, International Symposium on Integrated Circuits. Singapore, 10-12 December 2014.(paper.pdf)
- Adaptive Precision Floating Point LLL,
T. Plantard, W. Susilo and Z. Zhang
Lecture Notes in Computer Science, Volume 7959, 2013. Proceedings of Information Security and Privacy. 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, pages 104-117. (paper.pdf)
- Lattice Reduction for Modular Knapsack,
T. Plantard, W. Susilo and Z. Zhang
Lecture Notes in Computer Science, Volume 7707, 2013. Revised Selected Papers of Selected Areas in Cryptography. 19th International Workshop, SAC 2012, Windsor, Ontario, Canada, August 15-16, 2012. (paper.pdf,talk.pdf)
- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers,
Z. Zhang, T. Plantard and W. Susilo,
Lecture Notes in Computer Science, Volume 7232, 2012. Proceedings of Information Security Practice and Experience. 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. (paper.pdf)
- Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes,
Z. Zhang, T. Plantard and W. Susilo,
Lecture Notes in Computer Science, Volume 7259, 2011. Revised Selected Papers of Information Security and Cryptology. 14th International Conference, ICISC 2011, Seoul, Korea, November 30 - December 2, 2011. (paper.pdf)
- Improving BDD Cryptosystems in General Lattices,
M. Rose, T. Plantard and W. Susilo,
Lecture Notes in Computer Science, Volume 6672, 2011. Proceedings of Information Security Practice and Experience. 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011, pages 152-167. (paper.pdf)
- Recursive Lattice Reduction,
T. Plantard and W. Susilo,
Lecture Notes in Computer Science, Volume 6280, 2010. Proceedings of Security and Cryptography for Networks. 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, pages 329-344. (paper.pdf,talk.pdf)
- Improvement of Lattice-based Cryptography using CRT,
T. Plantard, M. Rose and W. Susilo,
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Volume 36, 2010. Revised Selected Papers of Quantum Communication and Quantum Networking. First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, pages 275-182. (paper.pdf)
- Selected RNS Bases for Modular Multiplication,
J.-C. Bajard, M. Kaihara and T. Plantard,
Proceeding of ARITH 19. 19th IEEE Symposium on Computer Arithmetic. Portland, Oregon, USA, June 8-10, 2009, pages 25-32. (paper.pdf)
- Broadcast Attacks against Lattice-based Cryptosystems,
T. Plantard and W. Susilo,
Lecture Notes in Computer Science, Volume 5536, 2009. Proceedings of Applied Cryptography and Network Security. 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, pages 456-472. (paper.pdf,talk.pdf)
- Efficient modular arithmetic in Adapted Modular Number System using Lagrange representation,
C. Negre and T. Plantard
Lecture Notes in Computer Science, Volume 5107, 2008. Proceedings of Information Security and Privacy. 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, pages 463-477. (paper.pdf,talk.pdf)
- A Digital Signature Scheme based on $CVP_\infty$,
T. Plantard, W. Susilo and K. T. Win
Lecture Notes in Computer Science, Volume 4939, 2008. Proceedings of Public Key Cryptography -PKC 2008. 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, pages 288-307. (paper.pdf,talk.pdf)
- Subquadratic Binary Field Multiplier in Double Polynomial System,
P. Giorgi, C. Negre and T. Plantard,
SECRYPT 2007. The International Conference on Security and Cryptography. Barcelona, Spain, July 28-31, 2007, pages 229-236. (paper.pdf)
- Study of modular inversion in RNS,
J.-C. Bajard, N. Meloni and T. Plantard,
Advanced Signal Processing Algorithms, Architectures, and Implementations XV. Proceedings of SPIE, Volume 5910. San Diego, California, USA, July 31-August 4, 2005. (paper.pdf)
- Efficient RNS Bases for Cryptography,
J.-C. Bajard, N. Meloni and T. Plantard,
World Congress: Scientific Computation, Applied Mathematics and Simulation, IMACS'05. Paris, France, July 11-15, 2005. (paper.pdf)
- Arithmetic Operations in the Polynomial Modular Number System,
J.-C. Bajard, L. Imbert and T. Plantard,
Proceedings og ARITH 17, 17th IEEE Symposium on Computer Arithmetic. Cape Cod, Massachusetts, USA, June 27-29, 2005, pages 206-213. (paper.pdf,talk.pdf)
- Modular Number Systems: Beyond the Mersenne Family,
J.-C. Bajard, L. Imbert and T. Plantard,
Lecture Notes in Computer Science, Volume 3357, 2005. Revised Selected Papers of Selected Areas in Cryptography. 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, pages 159-169. (paper.pdf,talk.pdf)
- RNS bases and conversions,
J.-C. Bajard and T. Plantard,
Advanced Signal Processing Algorithms, Architectures, and Implementations XIV. Proceedings of SPIE, Volume 5559. Denver, Colorado, USA, August 2-6, 2004, pages 60-69. (paper.pdf,talk.pdf)
- Improving euclidean division and modular reduction for some classes of divisors,
J.-C. Bajard, L. Imbert and T. Plantard,
Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, Pacific Grove, California, USA, November 9-12, 2003, pages 2218-2221. (paper.pdf)
- Efficient Multiplication in GF(p^k) for Elliptic Curve Cryptography,
J.-C. Bajard, L. Imbert, C. Negre and T. Plantard,
ARITH 16, 16th IEEE Symposium on Computer Arithmetic. Santiago de Compostela, Spain, June 15-18, 2003, pages 181-187. (paper.pdf)
Ph.D.
- Title : "Arithmetique modulaire pour la cryptographie"
(Modular arithmetic for cryptography)
Thematic : Modular arithmetic, cryptography, number system,
lattice theory.
- Directors : Jean-Claude Bajard, Laurent Imbert
Grants :ACI Crypto OPAC (oct 2002 - oct 2005)
Laboratory: LIRMM
- Defence: December 15, 2005. Montpellier, France.
Pdf: phd.pdf, talk.pdf.
Grant
- Real-Time Visualisation of Intrusion Detection for Combatting Cyber Attacks,
W. Susilo, Y. Mu, J. Seberry, J. Yan, Z. Zhou, J. Baek, Y-W. Chow, G. Yang, L. Zhou, T. Xia, F. Guo, J. Tonien and T. Plantard
UOW MEG Grant (2017-2018)
- Enhancing IoT Security with Blockchain,
W. Susilo, Y-W. Chow, G. Yang, J. Yan and T. Plantard
Data61 CRP (2017-2020)
- Post-quantum Cryptosystems and Their Applications,
W. Susilo, L. Chen, M. S. JR, G. Yang, T. Plantard and P. Barretto
UGPN Research Collaboration Fund. (2017)
- On the Structure of Lattices for Post-Quantum Cryptography,
W. Susilo,T. Plantard and G. Yang
U.S. Departement of Commerce, National Institute of Standards and Technology, Information Technology Lab, NIST ITL (2017-2019)
- Leak Resistant Arithmetics for Cryptography,
J.-C. Bajard, A. Joux, T. Plantard and W. Susilo
International Programs For Scientific Cooperation (PICS) from the French National Center for Scientific Research (CNRS) (2016-2018)
- Lattice Based Cryptanalysis,
W. Susilo, G. Yang and T. Plantard
2015 INTERSECT Resource Allocation Grant (2014)
- Post-quantum Cryptography: New Approach and Investigation,
W. Susilo, G. Yang and T. Plantard
National Security Science and Technology Centre Grant (2014-2016)
- Parallel Lattice Reduction,
W. Susilo, G. Yang and T. Plantard
2014 INTERSECT Resource Allocation Grant (2013)
- Quantum Simulator,
W. Susilo, G. Yang, M. H. Au, T. Plantard, Y.-W. Chow, Z. Zhang
2014 National Computational Merit Allocation Scheme (2013)
- Lattice Reduction Simulation,
W. Susilo, G. Yang and T. Plantard
2013 INTERSECT Resource Allocation Grant (2012)
- Evidence-based medicine: a new paradigm for accurate radiotherapy treatment planning in the fight against cancer,
S. Guatelli, T. Plantard and D. Cutajar
URC Small Grants Scheme (2012)
- Optimal Lattice Reduction Tools for Protecting Future Cryptosystems,
W. Susilo and T. Plantard
National Computational Infrastructure Merit Allocation Scheme (2010)
- Post-quantum Cryptography: Protecting Counter-Terrorism Against Future Capabilities of Quantum Computers,
W. Susilo and T. Plantard
Department of the Prime Minister and Cabinet (2009-2011)
- Fuzzy-based cryptography and its applications,
W. Susilo, Y. Mu, J. Seberry, W. Li, K. T. Win, Z. Zhou, T. Xia, T. Plantard, Q. Wu and L. McAven
Research Infrastructure Block Grant (2007)
- Implementation of efficient new signature schemes,
T. Plantard
RDF Apllication - TITR (2007)
Last Update: November 2, 2017.