Christophe Tartary

According to our database1, Christophe Tartary authored at least 24 papers between 2006 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware., 2016

Attack simulation based software protection assessment method.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2012
A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries.
IEEE Trans. Inf. Forensics Secur., 2012

Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptol., 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Authentication of Digital Streams.
IEEE Trans. Inf. Theory, 2011

Bounds and trade-offs for Double-Base Number Systems.
Inf. Process. Lett., 2011

An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials.
Int. J. Found. Comput. Sci., 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).
IACR Cryptol. ePrint Arch., 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2009
Ensuring Authentication of Digital Information Using Cryptographic Accumulators.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec., 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Inf. Secur., 2008

Counting Method for Multi-party Computation over Non-abelian Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Graph Design for Secure Multiparty Computation over Non-Abelian Groups.
Proceedings of the Advances in Cryptology, 2008

2007
Efficient multicast stream authentication for the fully adversarial network model.
Int. J. Secur. Networks, 2007

Privacy-Preserving Distributed Set Intersection.
IACR Cryptol. ePrint Arch., 2007

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Rateless Codes for the Multicast Stream Authentication Problem.
Proceedings of the Advances in Information and Computer Security, 2006

Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Achieving Multicast Stream Authentication Using MDS Codes.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...