Christophe Petit
Orcid: 0000-0003-3482-6743Affiliations:
- Université libre de Bruxelles, Brussels, Belgium
- University of Birmingham, UK
According to our database1,
Christophe Petit
authored at least 84 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
1
6
8
2
6
7
5
4
4
3
3
6
1
2
1
1
1
4
1
2
1
3
1
2
1
2
1
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Quantum, December, 2023
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur., March, 2023
IACR Cryptol. ePrint Arch., 2023
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies.
IACR Cryptol. ePrint Arch., 2023
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH.
IACR Cryptol. ePrint Arch., 2023
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves.
IACR Cryptol. ePrint Arch., 2023
2022
J. Symb. Comput., 2022
2021
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.
J. Cryptol., 2020
J. Math. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Surveys in Combinatorics, 2019: Invited lectures from the 27th British Combinatorial Conference, Birmingham, UK, July 29, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the New Codebreakers, 2016
2015
2014
LMS J. Comput. Math., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Advances in Information and Computer Security, 2013
2012
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011
2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Information Security - 13th International Conference, 2010
2009
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
IACR Cryptol. ePrint Arch., 2009
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Proceedings of the Topics in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the Public Key Infrastructure, 2008
A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007