Christophe Petit

Dr.

20082023

Research activity per year

Search results

  • 2023

    Guest Editorial on special issue: Cryptanalysis of (NIST PQC) post-quantum proposals

    Otmani, A., Petit, C. & Tibouchi, M., 31 Jan 2023, (E-pub ahead of print) In: IET Information Security.

    Research output: Contribution to journalEditorialpeer-review

    Open Access
  • Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH

    Chen, M., Imran, M., Ivanyos, G., Kutas, P., Leroux, A. & Petit, C., 18 Dec 2023, Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III. Guo, J. & Steinfeld, R. (eds.). 1 ed. Singapore: Springer, Vol. 3. p. 99-130 31 p. (Lecture Notes in Computer Science; vol. 14440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies

    Chen, M., Lai, Y-F., Laval, A., Marco, L. & Petit, C., 20 Oct 2023, (Accepted/In press) Progress in Cryptology – INDOCRYPT 2023. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Downloads (Pure)
  • M-SIDH and MD-SIDH: countering SIDH attacks by masking information

    Fouotsa, T. B., Moriya, T. & Petit, C., 16 Apr 2023, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). 1 ed. Springer, p. 282-309 (Lecture Notes in Computer Science; vol. 14008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Proving knowledge of isogenies: a survey

    Beullens, W., De Feo, L., Galbraith, S. D. & Petit, C., 2 Jun 2023, (E-pub ahead of print) In: Designs, Codes and Cryptography.

    Research output: Contribution to journalArticlepeer-review

    5 Downloads (Pure)
  • Shorter quantum circuits via single-qubit gate approximation

    Kliuchnikov, V., Lauter, K., Minko, R., Paetznick, A. & Petit, C., 18 Dec 2023, In: Quantum. 7, 87 p., 1208.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
  • 2022

    A new adaptive attack on SIDH

    Fouotsa, T. B. & Petit, C., 1 Jan 2022, Topics in Cryptology – CT-RSA 2022: Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1–2, 2022, Proceedings. Galbraith, S. D. (ed.). 1 ed. Springer, p. 322-344 23 p. (Lecture Notes in Computer Science; vol. 13161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    13 Downloads (Pure)
  • Torsion point attacks on ‘SIDH-like’ cryptosystems

    Kutas, P. & Petit, C., 4 Jul 2022, (E-pub ahead of print) In: IET Information Security.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    File
    16 Downloads (Pure)
  • 2021

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Sanso, A., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 160-184 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    18 Downloads (Pure)
  • Improved torsion-point attacks on SIDH variants

    de Quehen, V., Kutas, P., Leonardi, C., Martindale, C., Panny, L., Petit, C. & Stange, K. E., 11 Aug 2021, Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings, Part III. Malkin, T. & Peikert, C. (eds.). Springer, p. 432-470 39 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    90 Downloads (Pure)
  • New results on quasi-subfield polynomials

    Euler, M. & Petit, C., Oct 2021, In: Finite Fields and Their Applications. 75, 101881.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    10 Downloads (Pure)
  • One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols

    Kutas, P., Merz, S-P., Petit, C. & Weitkaemper, C., 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I. Canteaut, A. & Standaert, F-X. (eds.). Springer, p. 242-271 30 p. (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    219 Downloads (Pure)
  • On index calculus algorithms for subfield curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 21 Jul 2021, Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 115-138 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    147 Downloads (Pure)
  • Séta: supersingular encryption from torsion attacks

    De Feo, L., Delpech de Saint Guilhem, C., Fouotsa, T. B., Kutas, P., Leroux, A., Petit, C., Silva, J. & Wesolowski, B., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 249-278 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    26 Downloads (Pure)
  • SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH

    Fouotsa, T. B. & Petit, C., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 279-307 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    21 Downloads (Pure)
  • SimS: a simplification of SiGamal

    Fouotsa, T. B. & Petit, C., 15 Jul 2021, Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). Springer, p. 277-295 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    131 Downloads (Pure)
  • Trapdoor DDH groups from pairings and isogenies

    Kutas, P., Petit, C. & Silva, J., 21 Jul 2021, Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 431-450 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    157 Downloads (Pure)
  • 2020

    Another look at some isogeny hardness assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020. Jarecki, S. (ed.). Springer, p. 496-511 16 p. (Lecture Notes in Computer Science; vol. 12006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    527 Downloads (Pure)
  • Identification protocols and signature schemes based on supersingular isogeny problems

    Galbraith, S. D., Petit, C. & Silva, J., Jan 2020, In: Journal of Cryptology. 33, 1, p. 130-175

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    265 Downloads (Pure)
  • On adaptive attacks against Jao-Urbanik's isogeny-based protocol

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Weitkaemper, C., 5 Jul 2020, Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings. Nitaj, A. & Youssef, A. (eds.). 1 ed. Springer, p. 195-213 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    23 Downloads (Pure)
  • Quasi-subfield polynomials and the elliptic curve discrete logarithm problem

    Huang, M-D., Kosters, M., Petit, C., Yeo, S. L. & Yun, Y., 14 Jun 2020, In: Journal of Mathematical Cryptology. 14, 1, p. 25-38

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    123 Downloads (Pure)
  • Semi-commutative masking: A framework for isogeny-based protocols, with an application to fully secure two-round isogeny-based OT

    de Saint Guilhem, C. D., Orsini, E., Petit, C. & Smart, N. P., 2020, Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Krenn, S., Shulman, H. & Vaudenay, S. (eds.). Springer, p. 235-258 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12579 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

    De Feo, L., Kohel, D., Leroux, A., Petit, C. & Wesolowski, B., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer, p. 64-93 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12491 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SQISign: Compact Post-Quantum Signatures from Quaternions and Isogenies

    De Feo, L., Kohel, D., Leroux, A., Petit, C. & Wesolowski, B., 16 Aug 2020, (Accepted/In press) 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Stronger bounds on the cost of computing Gröbner bases for HFE systems

    Gorla, E., Mueller, D. & Petit, C., 8 Jul 2020, (E-pub ahead of print) In: Journal of Symbolic Computation.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    24 Downloads (Pure)
  • 2019

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, (E-pub ahead of print) Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Sako, K. & Lin, D. (eds.). Springer, p. 646-678 33 p. (Lecture Notes in Computer Science; vol. 11443 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Citations (Scopus)
    203 Downloads (Pure)
  • Supersingular isogeny graphs in cryptography

    Lauter, K. E. & Petit, C., 1 Jan 2019, Surveys in Combinatorics 2019. CRC Press, p. 143-166 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Verifiable delay functions from supersingular isogenies and pairings

    de Feo, L., Masson, S., Petit, C. & Sanso, A., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings, Part I. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 248-277 30 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    5 Citations (Scopus)
    210 Downloads (Pure)
  • 2018

    A Practical Cryptanalysis of WalnutDSA

    Hart, D., Kim, D., Micheli, G., Perez, G. P., Petit, C. & Quek, Y., 2018, Proceedings of the 21st International Conference on Practice and Theory of Public Key Cryptography. Abdalla, M. & Dahab, R. (eds.). Springer, Vol. Vol 1. p. 381-406 27 p. (Lecture Notes in Computer Science; vol. 10769).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    149 Downloads (Pure)
  • Better path-finding algorithms in LPS Ramanujan graphs

    Carvalho Pinto, E. & Petit, C., 1 Dec 2018, In: Journal of Mathematical Cryptology. 12, 4, p. 191-202 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    1 Citation (Scopus)
    230 Downloads (Pure)
  • Supersingular isogeny graphs and endomorphism rings: reductions and solutions

    Eisenträger, K., Hallgren, S., Lauter, K., Morrison, T. & Petit, C., 31 Mar 2018, Advances in Cryptology – EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Nielsen, J. B. & Rijmen, V. (eds.). Springer, p. 329-368 40 p. (Lecture Notes in Computer Science; vol. 10822).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    16 Citations (Scopus)
    517 Downloads (Pure)
  • 2017

    A Generalised Successive Resultants Algorithm

    Davenport, J. H., Petit, C. & Pring, B., 9 Mar 2017, Arithmetic of Finite Fields: 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers. Duquesne, S. & Petkova-Nikova, S. (eds.). Springer, p. 105-124 (Lecture Notes in Computer Science; vol. 10064).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Faster algorithms for isogeny problems using torsion point images

    Petit, C., 18 Nov 2017, Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Takagi, T. & Peyrin, T. (eds.). Springer, p. 330-353 24 p. (Lecture Notes in Computer Science (LNCS); vol. 10625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    28 Citations (Scopus)
    295 Downloads (Pure)
  • Full cryptanalysis of hash functions based on cubic Ramanujan graphs

    Jo, H., Petit, C. & Takagi, T., Sept 2017, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 9, p. 1891-1899 9 p.

    Research output: Contribution to journalArticlepeer-review

  • Identification protocols and signature schemes based on supersingular isogeny problems

    Galbraith, S. D., Petit, C. & Silva, J., 30 Nov 2017, Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Takagi, T. & Peyrin, T. (eds.). Springer, p. 3-33 30 p. ( Lecture Notes in Computer Science (LNCS); vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    44 Citations (Scopus)
    431 Downloads (Pure)
  • 2016

    Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields

    Petit, C., Kosters, M. & Messeng, A., 18 Feb 2016, Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, p. 3-18 (Lecture Notes in Computer Science; vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Cryptographic Hash Functions and Expander Graphs: The End of the Story?

    Petit, C. & Quisquater, J-J., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 304-311 (Lecture Notes in Computer Science; vol. 9100).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting

    Bootle, J., Cerulli, A., Chaidos, P., Groth, J. & Petit, C., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Fischlin, M. & Coron, J-S. (eds.). Springer, p. 327-357 (Lecture Notes in Computer Science; vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    49 Citations (Scopus)
  • On the security of supersingular isogeny cryptosystems

    Galbraith, S. D., Petit, C., Shani, B. & Ti, Y. B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H. & Takagi, T. (eds.). Springer, p. 63-91 (Lecture Notes in Computer Science (LNCS); vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Citations (Scopus)
  • Short Accountable Ring Signatures Based on DDH

    Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J. & Petit, C., 13 Jan 2016, Computer Security - ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Springer, p. 243-265 (Lecture Notes in Computer Science; vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • 2015

    Deterministic root finding in finite fields

    De Feo, L., Petit, C. & Quisquater, M., 24 Nov 2015, In: ACM Communications in Computer Algebra. 49, 3, p. 87-89 3 p.

    Research output: Contribution to journalArticlepeer-review

  • Improvement of FPPR method to solve ECDLP

    Huang, Y., Petit, C., Shinohara, N. & Takagi, T., 25 Mar 2015, In: Pacific Journal of Mathematics for Industry. 7, 9 p., 1.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    73 Downloads (Pure)
  • 2014

    Finding roots in with the successive resultants algorithm

    Petit, C., 1 Aug 2014, In: Acta Mathematica Hungarica. 17, A, p. 203-217

    Research output: Contribution to journalSpecial issuepeer-review

    3 Citations (Scopus)
  • First fall degree and Weil descent

    Hodges, T. J., Petit, C. & Schlather, J., Nov 2014, In: Finite Fields and Their Applications. 30, p. 155-177 22 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    File
    6 Citations (Scopus)
    167 Downloads (Pure)
  • On a Particular Case of the Bisymmetric Equation for Quasigroups

    Petit, C., Renauld, M. & Standaert, F-X., Aug 2014, In: Acta Mathematica Hungarica. 143, 2, p. 330-336 6 p.

    Research output: Contribution to journalArticlepeer-review

  • On the quaternion ℓ-isogeny path problem

    Kohel, D., Lauter, K., Petit, C. & Tignol, J. P., 1 Aug 2014, In: London Mathematical Society. Journal of Computation and Mathematics. 17, A, p. 418-432 15 p.

    Research output: Contribution to journalArticlepeer-review

    19 Citations (Scopus)
  • Towards factoring in SL(2,2n

    Petit, C., Jun 2014, In: Designs, Codes, and Cryptography. 71, 3, p. 409-431 23 p.

    Research output: Contribution to journalArticlepeer-review

  • 2013

    Improvement of Faugère et al.'s method to solve ECDLP

    Huang, Y. J., Petit, C., Shinohara, N. & Takagi, T., 2013, Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings. p. 115-132 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8231 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Rubik's for cryptographers

    Petit, C. & Quisquater, J. J., Jun 2013, In: Notices of the American Mathematical Society. 60, 6, p. 733-739 7 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2012

    Improving the complexity of index calculus algorithms in elliptic curves over binary fields

    Faugère, J. C., Perret, L., Petit, C. & Renault, G., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 27-44 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access