Christophe Petit

Orcid: 0000-0003-3482-6743

Affiliations:
  • Université libre de Bruxelles, Brussels, Belgium
  • University of Birmingham, UK


According to our database1, Christophe Petit authored at least 78 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme.
IACR Cryptol. ePrint Arch., 2024

2023
Shorter quantum circuits via single-qubit gate approximation.
Quantum, December, 2023

Proving knowledge of isogenies: a survey.
Des. Codes Cryptogr., November, 2023

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023

Torsion point attacks on 'SIDH-like' cryptosystems.
IET Inf. Secur., March, 2023

M-SIDH and MD-SIDH: countering SIDH attacks by masking information.
IACR Cryptol. ePrint Arch., 2023

Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies.
IACR Cryptol. ePrint Arch., 2023

Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH.
IACR Cryptol. ePrint Arch., 2023

Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves.
IACR Cryptol. ePrint Arch., 2023

2022
Stronger bounds on the cost of computing Gröbner bases for HFE systems.
J. Symb. Comput., 2022

Shorter quantum circuits.
IACR Cryptol. ePrint Arch., 2022

Failing to hash into supersingular isogeny graphs.
IACR Cryptol. ePrint Arch., 2022

2021
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols.
IACR Cryptol. ePrint Arch., 2021

SHealS and HealS: isogeny-based PKEs from akey validation method for SIDH.
IACR Cryptol. ePrint Arch., 2021

A New Adaptive Attack on SIDH.
IACR Cryptol. ePrint Arch., 2021

InSIDH: a Simplification of SiGamal.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of an oblivious PRF from supersingular isogenies.
IACR Cryptol. ePrint Arch., 2021

New results on quasi-subfield polynomials.
Finite Fields Their Appl., 2021

SimS: A Simplification of SiGamal.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Improved Torsion-Point Attacks on SIDH Variants.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Séta: Supersingular Encryption from Torsion Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.
J. Cryptol., 2020

Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem.
J. Math. Cryptol., 2020

Weak instances of SIDH variants under improved torsion-point attacks.
IACR Cryptol. ePrint Arch., 2020

Stronger bounds on the cost of computing Groebner bases for HFE systems.
IACR Cryptol. ePrint Arch., 2020

On Index Calculus Algorithms for Subfield Curves.
IACR Cryptol. ePrint Arch., 2020

SQISign: compact post-quantum signatures from quaternions and isogenies.
IACR Cryptol. ePrint Arch., 2020

On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol.
IACR Cryptol. ePrint Arch., 2020

Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Another look at some isogeny hardness assumptions.
IACR Cryptol. ePrint Arch., 2019

Trapdoor DDH groups from pairings and isogenies.
IACR Cryptol. ePrint Arch., 2019

SÉTA: Supersingular Encryption from Torsion Attacks.
IACR Cryptol. ePrint Arch., 2019

Verifiable Delay Functions from Supersingular Isogenies and Pairings.
IACR Cryptol. ePrint Arch., 2019

Expanding the use of quasi-subfield polynomials.
CoRR, 2019

Factoring Products of Braids via Garside Normal Form.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Supersingular isogeny graphs in cryptography.
Proceedings of the Surveys in Combinatorics, 2019: Invited lectures from the 27th British Combinatorial Conference, Birmingham, UK, July 29, 2019

2018
Better path-finding algorithms in LPS Ramanujan graphs.
J. Math. Cryptol., 2018

On the (non) obfuscating power of Garside Normal Forms.
IACR Cryptol. ePrint Arch., 2018

Secure Oblivious Transfer from Semi-Commutative Masking.
IACR Cryptol. ePrint Arch., 2018

Supersingular isogeny graphs and endomorphism rings: reductions and solutions.
IACR Cryptol. ePrint Arch., 2018

A Practical Cryptanalysis of WalnutDSA TM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Hard and Easy Problems for Supersingular Isogeny Graphs.
IACR Cryptol. ePrint Arch., 2017

A Practical Cryptanalysis of WalnutDSA.
IACR Cryptol. ePrint Arch., 2017

Faster Algorithms for Isogeny Problems Using Torsion Point Images.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
On the Security of Supersingular Isogeny Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Signature Schemes Based On Supersingular Isogeny Problems.
IACR Cryptol. ePrint Arch., 2016

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
IACR Cryptol. ePrint Arch., 2016

A Generalised Successive Resultants Algorithm.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Cryptographic Hash Functions and Expander Graphs: The End of the Story?
Proceedings of the New Codebreakers, 2016

2015
On Generalized First Fall Degree Assumptions.
IACR Cryptol. ePrint Arch., 2015

Short Accountable Ring Signatures Based on DDH.
IACR Cryptol. ePrint Arch., 2015

Deterministic root finding in finite fields.
ACM Commun. Comput. Algebra, 2015

2014
On the quaternion -isogeny path problem.
LMS J. Comput. Math., 2014

Finding roots in with the successive resultants algorithm.
LMS J. Comput. Math., 2014

On the quaternion ℓ-isogeny path problem.
IACR Cryptol. ePrint Arch., 2014

First fall degree and Weil descent.
Finite Fields Their Appl., 2014

Towards factoring in $${SL(2, \, \mathbb{F}_{2^n})}$$.
Des. Codes Cryptogr., 2014

2013
Improvement of Faugère et al.'s Method to Solve ECDLP.
Proceedings of the Advances in Information and Computer Security, 2013

2012
On Polynomial Systems Arising from a Weil Descent.
IACR Cryptol. ePrint Arch., 2012

Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Cayley Hash Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Rubik's for cryptographers.
IACR Cryptol. ePrint Arch., 2011

New Subexponential Algorithms for Factoring in SL(2, fq).
IACR Cryptol. ePrint Arch., 2011

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Preimages for the Tillich-Zémor Hash Function.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

One-Time Trapdoor One-Way Functions.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
IACR Cryptol. ePrint Arch., 2009

Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Proceedings of the Topics in Cryptology, 2009

2008
Full Cryptanalysis of LPS and Morgenstern Hash Function.
IACR Cryptol. ePrint Arch., 2008

Full Cryptanalysis of LPS and Morgenstern Hash Functions.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
Proceedings of the Public Key Infrastructure, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptol. ePrint Arch., 2007


  Loading...