Christophe Petit

Dr.

20082024

Research activity per year

Search results

  • Short Accountable Ring Signatures Based on DDH

    Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J. & Petit, C., 13 Jan 2016, Computer Security - ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 243-265 (Lecture Notes in Computer Science; vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Shorter quantum circuits via single-qubit gate approximation

    Kliuchnikov, V., Lauter, K., Minko, R., Paetznick, A. & Petit, C., 18 Dec 2023, In: Quantum. 7, 87 p., 1208.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Downloads (Pure)
  • SimS: a simplification of SiGamal

    Fouotsa, T. B. & Petit, C., 15 Jul 2021, Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). Springer, p. 277-295 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    148 Downloads (Pure)
  • Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme

    Petit, C., Tang, G., Gilchrist, V. & Marco, L., 3 May 2024, (Accepted/In press) Advances in Cryptology – CRYPTO 2024. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    11 Downloads (Pure)
  • SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

    De Feo, L., Kohel, D., Leroux, A., Petit, C. & Wesolowski, B., 6 Dec 2020, Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I. Moriai, S. & Wang, H. (eds.). 1 ed. Springer, p. 64-93 30 p. (Lecture Notes in Computer Science; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Stronger bounds on the cost of computing Gröbner bases for HFE systems

    Gorla, E., Mueller, D. & Petit, C., 8 Jul 2020, (E-pub ahead of print) In: Journal of Symbolic Computation.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    32 Downloads (Pure)
  • Supersingular isogeny graphs and endomorphism rings: reductions and solutions

    Eisenträger, K., Hallgren, S., Lauter, K., Morrison, T. & Petit, C., 31 Mar 2018, Advances in Cryptology – EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Nielsen, J. B. & Rijmen, V. (eds.). Springer, p. 329-368 40 p. (Lecture Notes in Computer Science; vol. 10822).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    16 Citations (Scopus)
    541 Downloads (Pure)
  • Supersingular isogeny graphs in cryptography

    Lauter, K. E. & Petit, C., 1 Jan 2019, Surveys in Combinatorics 2019. CRC Press, p. 143-166 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Torsion point attacks on ‘SIDH-like’ cryptosystems

    Kutas, P. & Petit, C., 4 Jul 2022, (E-pub ahead of print) In: IET Information Security.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    File
    35 Downloads (Pure)
  • Towards factoring in SL(2,2n

    Petit, C., Jun 2014, In: Designs, Codes, and Cryptography. 71, 3, p. 409-431 23 p.

    Research output: Contribution to journalArticlepeer-review

  • Trapdoor DDH groups from pairings and isogenies

    Kutas, P., Petit, C. & Silva, J., 21 Jul 2021, Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 431-450 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    163 Downloads (Pure)
  • Verifiable delay functions from supersingular isogenies and pairings

    de Feo, L., Masson, S., Petit, C. & Sanso, A., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings, Part I. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 248-277 30 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    5 Citations (Scopus)
    233 Downloads (Pure)