Christophe Petit
Christophe Petit
Université libre de Bruxelles - University of Birmingham - University of Oxford
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
On the Security of Supersingular Isogeny Cryptosystems
S Galbraith, C Petit, B Shani, YB Ti
Asiacrypt 2016, 63-91, 0
Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting
J Bootle, A Cerulli, P Chaidos, J Groth, C Petit
Annual International Conference on the Theory and Applications of …, 2016
A block cipher based pseudo random number generator secure against side-channel key recovery
C Petit, FX Standaert, O Pereira, TG Malkin, M Yung
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Identification protocols and signature schemes based on supersingular isogeny problems
SD Galbraith, C Petit, J Silva
Journal of Cryptology 33 (1), 130-175, 2020
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields
JC Faugère, L Perret, C Petit, G Renault
EUROCRYPT2012, 2012
On Polynomial Systems Arising from a Weil Descent
C Petit, JJ Quisquater
Faster algorithms for isogeny problems using torsion point images
C Petit
International Conference on the Theory and Application of Cryptology and …, 2017
Short accountable ring signatures based on DDH
J Bootle, A Cerulli, P Chaidos, E Ghadafi, J Groth, C Petit
European Symposium on Research in Computer Security, 243-265, 2015
On the quaternion $\def\xmlpi# 1 {}\def\mathsfbi# 1 {\boldsymbol {\mathsf {# 1}}}\let\le=\leqslant\let\leq=\leqslant\let\ge=\geqslant\let\geq=\geqslant\def\Pr {\mathit {Pr …
D Kohel, K Lauter, C Petit, JP Tignol
LMS Journal of Computation and Mathematics 17 (A), 418-432, 2014
Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
M Medwed, C Petit, F Regazzoni, M Renauld, FX Standaert
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
K Eisenträger, S Hallgren, K Lauter, T Morrison, C Petit
Annual International Conference on the Theory and Applications of …, 2018
Full cryptanalysis of LPS and Morgenstern hash functions
C Petit, K Lauter, JJ Quisquater
Security and Cryptography for Networks, 263-277, 2008
Rubik's for cryptographers
C Petit, JJ Quisquater
Notices of the AMS 60 (June/July 2013), 733-739, 2013
Verifiable delay functions from supersingular isogenies and pairings
L De Feo, S Masson, C Petit, A Sanso
International Conference on the Theory and Application of Cryptology and …, 2019
Preimages for the Tillich-Zémor hash function
C Petit, JJ Quisquater
International Workshop on Selected Areas in Cryptography, 282-301, 2010
A Practical Cryptanalysis of WalnutDSA
D Hart, DH Kim, G Micheli, G Pascual-Perez, C Petit, Y Quek
IACR International Workshop on Public Key Cryptography, 381-406, 2018
Algebraic approaches for the elliptic curve discrete logarithm problem over prime fields
C Petit, M Kosters, A Messeng
Public-Key Cryptography--PKC 2016, 3-18, 2016
Improvement of Faugère et al.’s Method to Solve ECDLP
YJ Huang, C Petit, N Shinohara, T Takagi
International Workshop on Security, 115-132, 2013
Hard and Easy Problems for Supersingular Isogeny Graphs.
C Petit, KE Lauter
IACR Cryptol. ePrint Arch. 2017, 962, 2017
Hard and easy components of collision search in the Zémor-Tillich hash function: New attacks and reduced variants with equivalent security
C Petit, JJ Quisquater, JP Tillich, G Zémor
Cryptographers’ Track at the RSA Conference, 182-194, 2009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20