Christophe Petit

From MaRDI portal
(Redirected from Person:405964)
Christophe Petit Q405964



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\(\mathrm{KLPT}^2\): algebraic pathfinding in dimension two and applications2026-02-04Paper
Computing the endomorphism ring of a supersingular elliptic curve from a full rank suborder2025-12-02Paper
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 32025-07-29Paper
Faster algorithms for isogeny computations over extensions of finite fields2025-04-15Paper
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves2024-12-13Paper
Solving the tensor isomorphism problem for special orbits with low rank points: cryptanalysis and repair of an Asiacrypt 2023 commitment scheme2024-12-04Paper
Malleable commitments from group actions and zero-knowledge proofs for circuits based on isogenies2024-10-23Paper
Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH2024-08-30Paper
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Proving knowledge of isogenies: a survey
Designs, Codes and Cryptography
2023-11-07Paper
Séta: Supersingular Encryption from Torsion Attacks
Lecture Notes in Computer Science
2023-05-26Paper
SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
Lecture Notes in Computer Science
2023-05-26Paper
Cryptanalysis of an oblivious PRF from supersingular isogenies
Lecture Notes in Computer Science
2023-05-12Paper
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT2023-03-22Paper
SQISign: compact post-quantum signatures from quaternions and isogenies2023-03-21Paper
On adaptive attacks against Jao-Urbanik's isogeny-based protocol
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Short accountable ring signatures based on DDH
Computer Security -- ESORICS 2015
2022-08-19Paper
Failing to hash into supersingular isogeny graphs2022-04-29Paper
Improved torsion-point attacks on SIDH variants
(available as arXiv preprint)
2022-04-22Paper
On index calculus algorithms for subfield curves2022-03-25Paper
Trapdoor DDH groups from pairings and isogenies2022-03-25Paper
One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols2021-12-08Paper
Stronger bounds on the cost of computing Gröbner bases for HFE systems
Journal of Symbolic Computation
2021-09-29Paper
New results on quasi-subfield polynomials
Finite Fields and their Applications
2021-09-03Paper
Supersingular isogeny graphs in cryptography
Surveys in Combinatorics 2019
2021-02-06Paper
Another look at some isogeny hardness assumptions2020-08-05Paper
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem
Journal of Mathematical Cryptology
2020-06-24Paper
Verifiable delay functions from supersingular isogenies and pairings2020-05-20Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Journal of Cryptology
2020-03-03Paper
Factoring products of braids via Garside normal form2020-01-28Paper
Better path-finding algorithms in LPS Ramanujan graphs
Journal of Mathematical Cryptology
2019-01-11Paper
Supersingular isogeny graphs and endomorphism rings: reductions and solutions2018-07-17Paper
A practical cryptanalysis of \({\mathrm {walnutdsa}^{\mathrm {TM}}}\)2018-05-16Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Advances in Cryptology – ASIACRYPT 2017
2018-04-06Paper
Faster algorithms for isogeny problems using torsion point images2018-03-08Paper
Deterministic root finding in finite fields
ACM Communications in Computer Algebra
2017-06-22Paper
A generalized successive resultants algorithm
Arithmetic of Finite Fields
2017-06-13Paper
On the Security of Supersingular Isogeny Cryptosystems
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Improvement of FPPR method to solve ECDLP
Pacific Journal of Mathematics for Industry
2016-08-12Paper
Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Cryptographic hash functions and expander graphs: the end of the story?
The New Codebreakers
2016-05-02Paper
Algebraic approaches for the elliptic curve discrete logarithm problem over prime fields
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Rubik’s for Cryptographers
Notices of the American Mathematical Society
2015-10-14Paper
Improvement of Faugère et al.'s method to solve ECDLP
Advances in Information and Computer Security
2014-09-15Paper
First fall degree and Weil descent
Finite Fields and their Applications
2014-09-08Paper
On the quaternion \(\ell\)-isogeny path problem
LMS Journal of Computation and Mathematics
2014-09-05Paper
Finding roots in \(\mathbb F_{p^n}\) with the successive resultants algorithm
LMS Journal of Computation and Mathematics
2014-09-05Paper
On a particular case of the bisymmetric equation for quasigroups
Acta Mathematica Hungarica
2014-08-14Paper
Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
Designs, Codes and Cryptography
2014-04-29Paper
On polynomial systems arising from a Weil descent
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Improving the complexity of index calculus algorithms in elliptic curves over binary fields
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Preimages for the Tillich-Zémor hash function
Selected Areas in Cryptography
2011-03-15Paper
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Full Cryptanalysis of LPS and Morgenstern Hash Functions
Lecture Notes in Computer Science
2008-11-20Paper
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
Public Key Infrastructure
2008-06-12Paper


Research outcomes over time


This page was built for person: Christophe Petit