Dr. Thomas Plantard is a senior research fellow at the Institute for Cybersecurity and Cryptology at the University of Wollongong.
Dr. Thomas Plantard has worked for more than 10 years at the University of Wollongong on various topics in cryptography. His particular expertise has been in post-quantum cryptography, which refers to cryptographic algorithms that are resistant to quantum computer attacks.
His works have been supported by various grants awarded by the Department of the Prime Minister and Cabinet or the National Security Science and Technology Centre to collaborate with Australian Signals Directorate and the Defence Science and Technology Group.
He is currently funded by the U.S. Department of Commerce to create standard for the next generation of (quantum resistant) cryptographic protocols and has proposed two candidates to NIST Call for Post-Quantum Cryptography Standardization.
Year | Title |
---|---|
2020 |
Published In
Information
|
2020 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2020 |
Published In
Journal of Mathematical Cryptology
|
2019 |
Published In
Journal of Cryptographic Engineering
|
2019 |
Published In
Journal of Mathematical Cryptology
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2017 |
Published In
Lecture Notes in Artificial Intelligence
|
2017 |
Published In
Journal of Cryptographic Engineering
|
2017 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
International Journal of Information Security
|
2016 |
Published In
Journal of Internet Services and Information Security
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Designs, Codes and Cryptography
|
2015 |
Published In
IET Information Security
|
2015 |
Published In
Theoretical Computer Science
|
2014 |
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
IEEE Transactions on Information Forensics and Security
|
2013 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2011 |
Published In
Lecture Notes in Computer Science
|
2010 |
Published In
Lecture Notes in Computer Science
|
2010 |
Published In
IEEE Transactions on Computers
|
2009 |
Published In
Lecture notes in computer science
|
2008 |
Published In
International Journal of Applied Cryptography
|
Year | Title |
---|---|
2017 |
Published In
24th IEEE Symposium on Computer Arithmetic (ARITH 2017)
|
2016 |
Published In
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016)
|
2015 |
Published In
Proceedings of the 14th International Symposium on Integrated Circuits (ISIC)
|
2015 |
Published In
Information Security and Privacy: Proceedings of the 20th Australasian Conference, ACISP 2015
|
2015 |
Published In
Proceedings of the 2015 IEEE Symposium on Computer Arithmetic (ARITH 22)
|
2015 |
Published In
Proceedings of the 2015 IEEE Symposium on Computer Arithmetic (ARITH 22)
|
2009 |
Published In
International ICST Conference on Quantum Communication and Quantum Networking
|
2009 |
Published In
Symposium on Computer Arithmetic
|
2008 |
Published In
International Conference/Workshop on Practice and Theory in Public Key Cryptography
|
2008 |
Published In
Australasian Conference on Information Security and Privacy
|
2007 |
Published In
International Conference on Information Security and Cryptography
|
Year | Title |
---|---|
2019 | Awarded by: Funding Scheme: International Programme |
2019 | Awarded by: Funding Scheme: Grant |
2016 - 2019 | Funding Scheme: Measurement Science and Engineering (MSE) Research Grant Programs |
2010 | Awarded by: Funding Scheme: Merit Allocation Scheme |
2009 | Awarded by: Funding Scheme: Research Support for Counter Terrorism |
Funding Scheme: Project International for Scientific Cooperation (PICS) |
Degree | Research Title | Advisee | |
---|---|---|---|
Doctor of Philosophy | Lattice-based Cryptography: Expanding the Design Space | Sipasseuth, Arnaud | |
Doctor of Philosophy | Lattices for a post-quantum cryptography | Lesavourey, Andrea | |
Doctor of Philosophy | Contributions to Lattice-based Cryptography | Le, Huy |
Post-quantum cryptography (i.e quantum resistant cryptography), homomorphic encryption, lattice based cryptology, elliptic curve cryptography, side chanel resistant, modular arithmetic, number system
Year | Title |
---|---|
2020 |
Published In
Information
|
2020 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2020 |
Published In
Journal of Mathematical Cryptology
|
2019 |
Published In
Journal of Cryptographic Engineering
|
2019 |
Published In
Journal of Mathematical Cryptology
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2017 |
Published In
Lecture Notes in Artificial Intelligence
|
2017 |
Published In
Journal of Cryptographic Engineering
|
2017 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
International Journal of Information Security
|
2016 |
Published In
Journal of Internet Services and Information Security
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Designs, Codes and Cryptography
|
2015 |
Published In
IET Information Security
|
2015 |
Published In
Theoretical Computer Science
|
2014 |
Published In
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
IEEE Transactions on Information Forensics and Security
|
2013 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2011 |
Published In
Lecture Notes in Computer Science
|
2010 |
Published In
Lecture Notes in Computer Science
|
2010 |
Published In
IEEE Transactions on Computers
|
2009 |
Published In
Lecture notes in computer science
|
2008 |
Published In
International Journal of Applied Cryptography
|
Year | Title |
---|---|
2017 |
Published In
24th IEEE Symposium on Computer Arithmetic (ARITH 2017)
|
2016 |
Published In
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016)
|
2015 |
Published In
Proceedings of the 14th International Symposium on Integrated Circuits (ISIC)
|
2015 |
Published In
Information Security and Privacy: Proceedings of the 20th Australasian Conference, ACISP 2015
|
2015 |
Published In
Proceedings of the 2015 IEEE Symposium on Computer Arithmetic (ARITH 22)
|
2015 |
Published In
Proceedings of the 2015 IEEE Symposium on Computer Arithmetic (ARITH 22)
|
2009 |
Published In
International ICST Conference on Quantum Communication and Quantum Networking
|
2009 |
Published In
Symposium on Computer Arithmetic
|
2008 |
Published In
International Conference/Workshop on Practice and Theory in Public Key Cryptography
|
2008 |
Published In
Australasian Conference on Information Security and Privacy
|
2007 |
Published In
International Conference on Information Security and Cryptography
|
Year | Title |
---|---|
2019 | Awarded by: Funding Scheme: International Programme |
2019 | Awarded by: Funding Scheme: Grant |
2016 - 2019 | Funding Scheme: Measurement Science and Engineering (MSE) Research Grant Programs |
2010 | Awarded by: Funding Scheme: Merit Allocation Scheme |
2009 | Awarded by: Funding Scheme: Research Support for Counter Terrorism |
Funding Scheme: Project International for Scientific Cooperation (PICS) |
Degree | Research Title | Advisee | |
---|---|---|---|
Doctor of Philosophy | Lattice-based Cryptography: Expanding the Design Space | Sipasseuth, Arnaud | |
Doctor of Philosophy | Lattices for a post-quantum cryptography | Lesavourey, Andrea | |
Doctor of Philosophy | Contributions to Lattice-based Cryptography | Le, Huy |
Post-quantum cryptography (i.e quantum resistant cryptography), homomorphic encryption, lattice based cryptology, elliptic curve cryptography, side chanel resistant, modular arithmetic, number system