Dr Christophe Petit PhD

Dr Christophe Petit

School of Computer Science
Senior Lecturer in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

I am a Senior Lecturer at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity.

For more information, please see Christophe's Computer Science profile.

Biography

I am a Lecturer in Computer Security in the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I am also actively involved within Oxford's Mathematical Institute, where I helped founding the Cryptography group.

I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity. I will also teach an Advanced Cryptography reading course for the Master in Mathematics and Foundations of Computer Science at Oxford.

I am always willing to supervise good and well-motivated students at undergraduate, master and PhD levels. Have a look at previous student projects and feel free to contact me to learn more about potential research projects.

Previously I was a Research Fellow at the University of Oxford's Mathematical Institute, and prior to that I worked at Université catholique de Louvain's Department of Electrical Engineering and at University College London's Computer Science Department.

Teaching

  • Advanced Cryptography
  • Secure Programming

Postgraduate supervision

  • 2018 Alex Litowczuk Post-quantum cryptography. 
  • 2018 Ran Pang Post-quantum cryptography. 

Research

My main research interests are in Cryptography and related topics, mostly at the intersection of Mathematics and Computer Science.

Publications

Recent publications

Article

Booher, J, Bowden, R, Doliskani, J, Fouotsa, TB, Galbraith, SD, Kunzweiler, S, Merz, S-P, Petit, C, Smith, B, Stange, KE, Ti, YB, Vincent, C, Voloch, JF, Weitkämper, C & Zobernig, L 2024, 'Failing to Hash Into Supersingular Isogeny Graphs', The Computer Journal, vol. 67, no. 8, pp. 2702-2719. https://doi.org/10.1093/comjnl/bxae038

Beullens, W, De Feo, L, Galbraith, SD & Petit, C 2023, 'Proving knowledge of isogenies: a survey', Designs, Codes and Cryptography. https://doi.org/10.1007/s10623-023-01243-3

Kliuchnikov, V, Lauter, K, Minko, R, Paetznick, A & Petit, C 2023, 'Shorter quantum circuits via single-qubit gate approximation', Quantum, vol. 7, 1208. https://doi.org/10.22331/q-2023-12-18-1208

Conference contribution

Cai, S, Chen, M & Petit, C 2024, Faster algorithms for isogeny computations over extensions of finite fields. in Number-Theoretic Methods in Cryptology. Lecture Notes in Computer Science, Springer, Number-Theoretic Methods in Cryptology 2024, Szczecin, Poland, 24/06/24.

Benčina, B, Kutas, P, Merz, S-P, Petit, C, Stopar, M & Weitkämper, C 2024, Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves. in L Reyzin & D Stebila (eds), Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part V. vol. 5, Lecture Notes in Computer Science, vol. 14924, Springer, pp. 183-217, CRYPTO 2024, 18/08/24. https://doi.org/10.1007/978-3-031-68388-6_8

Chen, M, Lai, Y-F, Laval, A, Marco, L & Petit, C 2024, Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies. in A Chattopadhyay, S Bhasin, S Picek & C Rebeiro (eds), Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part I. 1 edn, Lecture Notes in Computer Science, vol. 14459, Springer, pp. 221–243, 24th International Conference on Cryptology in India, Goa, India, 10/12/23. https://doi.org/10.1007/978-3-031-56232-7_11

Gilchrist, V, Marco, L, Petit, C & Tang, G 2024, Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. in L Reyzin & D Stebila (eds), Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part I. Lecture Notes in Computer Science, vol. 14920, Springer, pp. 141-173, CRYPTO 2024, 18/08/24. https://doi.org/10.1007/978-3-031-68376-3_5

Chen, M, Imran, M, Ivanyos, G, Kutas, P, Leroux, A & Petit, C 2023, Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. in J Guo & R Steinfeld (eds), Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III. 1 edn, vol. 3, Lecture Notes in Computer Science, vol. 14440, Springer, Singapore, pp. 99-130, 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, Guangzhou, China, 4/12/23. https://doi.org/10.1007/978-981-99-8727-6_4

Fouotsa, TB, Moriya, T & Petit, C 2023, M-SIDH and MD-SIDH: countering SIDH attacks by masking information. in C Hazay & M Stam (eds), Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 14008, Springer, pp. 282-309, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23/04/23. https://doi.org/10.1007/978-3-031-30589-4_10

Fouotsa, TB & Petit, C 2022, A new adaptive attack on SIDH. in SD Galbraith (ed.), Topics in Cryptology – CT-RSA 2022: Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1–2, 2022, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 13161, Springer, pp. 322-344, Cryptographers’ Track RSA Conference, 7/02/22. https://doi.org/10.1007/978-3-030-95312-6_14

Basso, A, Kutas, P, Merz, SP, Petit, C & Sanso, A 2021, Cryptanalysis of an oblivious PRF from supersingular isogenies. in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13090 LNCS, Springer, pp. 160-184, 27th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, Virtual, Online, 6/12/21. https://doi.org/10.1007/978-3-030-92062-3_6

de Quehen, V, Kutas, P, Leonardi, C, Martindale, C, Panny, L, Petit, C & Stange, KE 2021, Improved torsion-point attacks on SIDH variants. in T Malkin & C Peikert (eds), Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings, Part III. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12827 LNCS, Springer, pp. 432-470, 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual, Online, 16/08/21. https://doi.org/10.1007/978-3-030-84252-9_15

Editorial

Otmani, A, Petit, C & Tibouchi, M 2023, 'Guest Editorial on special issue: Cryptanalysis of (NIST PQC) post-quantum proposals', IET Information Security. https://doi.org/10.1049/ise2.12105

Foreword/postscript

Vaudenay, S & Petit, C 2024, Preface. in S Vaudenay & C Petit (eds), Progress in Cryptology - AFRICACRYPT 2024: 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10–12, 2024, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 14861, Springer, pp. v-vi, 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, Douala, Cameroon, 10/07/24. https://doi.org/10.1007/978-3-031-64381-1

Review article

Kutas, P & Petit, C 2022, 'Torsion point attacks on ‘SIDH-like’ cryptosystems', IET Information Security. https://doi.org/10.1049/ise2.12076

View all publications in research portal