Christophe Petit

According to our database1, Christophe Petit authored at least 52 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Another look at some isogeny hardness assumptions.
IACR Cryptology ePrint Archive, 2019

Verifiable Delay Functions from Supersingular Isogenies and Pairings.
IACR Cryptology ePrint Archive, 2019

Factoring Products of Braids via Garside Normal Form.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Better path-finding algorithms in LPS Ramanujan graphs.
J. Mathematical Cryptology, 2018

On the (non) obfuscating power of Garside Normal Forms.
IACR Cryptology ePrint Archive, 2018

Secure Oblivious Transfer from Semi-Commutative Masking.
IACR Cryptology ePrint Archive, 2018

Supersingular isogeny graphs and endomorphism rings: reductions and solutions.
IACR Cryptology ePrint Archive, 2018

A Practical Cryptanalysis of WalnutDSA TM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs.
IEICE Transactions, 2017

Hard and Easy Problems for Supersingular Isogeny Graphs.
IACR Cryptology ePrint Archive, 2017

Faster Algorithms for Isogeny Problems using Torsion Point Images.
IACR Cryptology ePrint Archive, 2017

A Practical Cryptanalysis of WalnutDSA.
IACR Cryptology ePrint Archive, 2017

Faster Algorithms for Isogeny Problems Using Torsion Point Images.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
On the Security of Supersingular Isogeny Cryptosystems.
IACR Cryptology ePrint Archive, 2016

Signature Schemes Based On Supersingular Isogeny Problems.
IACR Cryptology ePrint Archive, 2016

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
IACR Cryptology ePrint Archive, 2016

A Generalised Successive Resultants Algorithm.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Cryptographic Hash Functions and Expander Graphs: The End of the Story?
Proceedings of the New Codebreakers, 2016

On the Security of Supersingular Isogeny Cryptosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
On Generalized First Fall Degree Assumptions.
IACR Cryptology ePrint Archive, 2015

Short Accountable Ring Signatures Based on DDH.
IACR Cryptology ePrint Archive, 2015

Deterministic root finding in finite fields.
ACM Comm. Computer Algebra, 2015

Short Accountable Ring Signatures Based on DDH.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Finding Roots in GF(pn) with the Successive Resultant Algorithm.
IACR Cryptology ePrint Archive, 2014

On the quaternion ℓ-isogeny path problem.
IACR Cryptology ePrint Archive, 2014

First fall degree and Weil descent.
Finite Fields and Their Applications, 2014

Towards factoring in $${SL(2, \, \mathbb{F}_{2^n})}$$.
Des. Codes Cryptogr., 2014

2013
Improvement of Faugère et al.'s Method to Solve ECDLP.
Proceedings of the Advances in Information and Computer Security, 2013

2012
On Polynomial Systems Arising from a Weil Descent.
IACR Cryptology ePrint Archive, 2012

Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

On Polynomial Systems Arising from a Weil Descent.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Cayley Hash Functions.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Rubik's for cryptographers.
IACR Cryptology ePrint Archive, 2011

New Subexponential Algorithms for Factoring in SL(2, fq).
IACR Cryptology ePrint Archive, 2011

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Specification of a Knowledge Crossroads for a Productive and Optimised Design.
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010

Preimages for the Tillich-Zémor Hash Function.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

One-Time Trapdoor One-Way Functions.
Proceedings of the Information Security - 13th International Conference, 2010

2009
On graph-based cryptographic hash functions.
PhD thesis, 2009

Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
IACR Cryptology ePrint Archive, 2009

Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Proceedings of the Topics in Cryptology, 2009

2008
Full Cryptanalysis of LPS and Morgenstern Hash Function.
IACR Cryptology ePrint Archive, 2008

Full Cryptanalysis of LPS and Morgenstern Hash Functions.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
Proceedings of the Public Key Infrastructure, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptology ePrint Archive, 2007


  Loading...