Christophe Petit

Dr.

20082024

Research activity per year

Search results

  • 2012

    Improving the complexity of index calculus algorithms in elliptic curves over binary fields

    Faugère, J. C., Perret, L., Petit, C. & Renault, G., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 27-44 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Masking with randomized look up tables: Towards preventing side-channel attacks of all orders

    Standaert, F. X., Petit, C. & Veyrat-Charvillon, N., 2012, Cryptography and Security: FromTheory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. Naccache, D. (ed.). p. 283-299 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6805 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • On polynomial systems arising from a Weil descent

    Petit, C. & Quisquater, J. J., 2012, Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 451-466 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7658 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2011

    Fresh re-keying II: Securing multiple parties against side-channel and fault attacks

    Medwed, M., Petit, C., Regazzoni, F., Renauld, M. & Standaert, F. X., 2011, Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Revised Selected Papers. p. 115-132 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7079 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • One-time trapdoor one-way functions

    Cathalo, J. & Petit, C., 2011, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Springer Verlag, p. 283-298 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Preimages for the tillich-zémor hash function

    Petit, C. & Quisquater, J. J., 2011, Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Revised Selected Papers. p. 282-301 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6544 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2009

    Hard and easy components of collision search in the Źemor-tillich hash function: New attacks and reduced variants with equivalent security

    Petit, C., Quisquater, J. J., Tillich, J. P. & Źemor, G., 2009, Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, Proceedings. Springer Verlag, p. 182-194 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    A block cipher based pseudo random number generator secure against side-channel key recovery

    Petit, C., Standaert, F. X., Pereira, O., Malkin, T. G. & Yung, M., 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 56-65 10 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function

    Petit, C., Veyrat-Charvillon, N. & Quisquater, J. J., 2008, Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008. p. 906-909 4 p. 4675001. (Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fault attacks on public key elements: Application to DLP-based schemes

    Kim, C. H., Bulens, P., Petit, C. & Quisquater, J. J., 2008, Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Proceedings. p. 182-195 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5057 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Full cryptanalysis of LPS and Morgenstern hash functions

    Petit, C., Lauter, K. & Quisquater, J. J., 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution