Christophe Petit

Dr.

20082024

Research activity per year

Search results

  • Conference contribution

    SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH

    Fouotsa, T. B. & Petit, C., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 279-307 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    28 Downloads (Pure)
  • Short Accountable Ring Signatures Based on DDH

    Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J. & Petit, C., 13 Jan 2016, Computer Security - ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 243-265 (Lecture Notes in Computer Science; vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • SimS: a simplification of SiGamal

    Fouotsa, T. B. & Petit, C., 15 Jul 2021, Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). Springer, p. 277-295 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    147 Downloads (Pure)
  • SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

    De Feo, L., Kohel, D., Leroux, A., Petit, C. & Wesolowski, B., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer, p. 64-93 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SQISign: Compact Post-Quantum Signatures from Quaternions and Isogenies

    De Feo, L., Kohel, D., Leroux, A., Petit, C. & Wesolowski, B., 16 Aug 2020, (Accepted/In press) 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Supersingular isogeny graphs and endomorphism rings: reductions and solutions

    Eisenträger, K., Hallgren, S., Lauter, K., Morrison, T. & Petit, C., 31 Mar 2018, Advances in Cryptology – EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Nielsen, J. B. & Rijmen, V. (eds.). Springer, p. 329-368 40 p. (Lecture Notes in Computer Science; vol. 10822).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    16 Citations (Scopus)
    539 Downloads (Pure)
  • Trapdoor DDH groups from pairings and isogenies

    Kutas, P., Petit, C. & Silva, J., 21 Jul 2021, Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 431-450 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    163 Downloads (Pure)
  • Verifiable delay functions from supersingular isogenies and pairings

    de Feo, L., Masson, S., Petit, C. & Sanso, A., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings, Part I. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 248-277 30 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    5 Citations (Scopus)
    230 Downloads (Pure)
  • Editorial

    Guest Editorial on special issue: Cryptanalysis of (NIST PQC) post-quantum proposals

    Otmani, A., Petit, C. & Tibouchi, M., 31 Jan 2023, (E-pub ahead of print) In: IET Information Security.

    Research output: Contribution to journalEditorialpeer-review

    Open Access
  • Review article

    Torsion point attacks on ‘SIDH-like’ cryptosystems

    Kutas, P. & Petit, C., 4 Jul 2022, (E-pub ahead of print) In: IET Information Security.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    File
    33 Downloads (Pure)
  • Special issue

    Finding roots in with the successive resultants algorithm

    Petit, C., 1 Aug 2014, In: Acta Mathematica Hungarica. 17, A, p. 203-217

    Research output: Contribution to journalSpecial issuepeer-review

    3 Citations (Scopus)