Recent publications
Article
Booher, J, Bowden, R, Doliskani, J, Fouotsa, TB, Galbraith, SD, Kunzweiler, S, Merz, S-P, Petit, C, Smith, B, Stange, KE, Ti, YB, Vincent, C, Voloch, JF, Weitkämper, C & Zobernig, L 2024, 'Failing to Hash Into Supersingular Isogeny Graphs', The Computer Journal, vol. 67, no. 8, pp. 2702-2719. https://doi.org/10.1093/comjnl/bxae038
Beullens, W, De Feo, L, Galbraith, SD & Petit, C 2023, 'Proving knowledge of isogenies: a survey', Designs, Codes and Cryptography. https://doi.org/10.1007/s10623-023-01243-3
Kliuchnikov, V, Lauter, K, Minko, R, Paetznick, A & Petit, C 2023, 'Shorter quantum circuits via single-qubit gate approximation', Quantum, vol. 7, 1208. https://doi.org/10.22331/q-2023-12-18-1208
Conference contribution
Cai, S, Chen, M & Petit, C 2024, Faster algorithms for isogeny computations over extensions of finite fields. in Number-Theoretic Methods in Cryptology. Lecture Notes in Computer Science, Springer, Number-Theoretic Methods in Cryptology 2024, Szczecin, Poland, 24/06/24.
Benčina, B, Kutas, P, Merz, S-P, Petit, C, Stopar, M & Weitkämper, C 2024, Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves. in L Reyzin & D Stebila (eds), Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part V. vol. 5, Lecture Notes in Computer Science, vol. 14924, Springer, pp. 183-217, CRYPTO 2024, 18/08/24. https://doi.org/10.1007/978-3-031-68388-6_8
Chen, M, Lai, Y-F, Laval, A, Marco, L & Petit, C 2024, Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies. in A Chattopadhyay, S Bhasin, S Picek & C Rebeiro (eds), Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part I. 1 edn, Lecture Notes in Computer Science, vol. 14459, Springer, pp. 221–243, 24th International Conference on Cryptology in India, Goa, India, 10/12/23. https://doi.org/10.1007/978-3-031-56232-7_11
Gilchrist, V, Marco, L, Petit, C & Tang, G 2024, Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. in L Reyzin & D Stebila (eds), Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part I. Lecture Notes in Computer Science, vol. 14920, Springer, pp. 141-173, CRYPTO 2024, 18/08/24. https://doi.org/10.1007/978-3-031-68376-3_5
Chen, M, Imran, M, Ivanyos, G, Kutas, P, Leroux, A & Petit, C 2023, Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. in J Guo & R Steinfeld (eds), Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III. 1 edn, vol. 3, Lecture Notes in Computer Science, vol. 14440, Springer, Singapore, pp. 99-130, 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, Guangzhou, China, 4/12/23. https://doi.org/10.1007/978-981-99-8727-6_4
Fouotsa, TB, Moriya, T & Petit, C 2023, M-SIDH and MD-SIDH: countering SIDH attacks by masking information. in C Hazay & M Stam (eds), Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 14008, Springer, pp. 282-309, 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23/04/23. https://doi.org/10.1007/978-3-031-30589-4_10
Fouotsa, TB & Petit, C 2022, A new adaptive attack on SIDH. in SD Galbraith (ed.), Topics in Cryptology – CT-RSA 2022: Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1–2, 2022, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 13161, Springer, pp. 322-344, Cryptographers’ Track RSA Conference, 7/02/22. https://doi.org/10.1007/978-3-030-95312-6_14
Basso, A, Kutas, P, Merz, SP, Petit, C & Sanso, A 2021, Cryptanalysis of an oblivious PRF from supersingular isogenies. in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13090 LNCS, Springer, pp. 160-184, 27th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, Virtual, Online, 6/12/21. https://doi.org/10.1007/978-3-030-92062-3_6
de Quehen, V, Kutas, P, Leonardi, C, Martindale, C, Panny, L, Petit, C & Stange, KE 2021, Improved torsion-point attacks on SIDH variants. in T Malkin & C Peikert (eds), Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings, Part III. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12827 LNCS, Springer, pp. 432-470, 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual, Online, 16/08/21. https://doi.org/10.1007/978-3-030-84252-9_15
Editorial
Otmani, A, Petit, C & Tibouchi, M 2023, 'Guest Editorial on special issue: Cryptanalysis of (NIST PQC) post-quantum proposals', IET Information Security. https://doi.org/10.1049/ise2.12105
Foreword/postscript
Vaudenay, S & Petit, C 2024, Preface. in S Vaudenay & C Petit (eds), Progress in Cryptology - AFRICACRYPT 2024: 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10–12, 2024, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 14861, Springer, pp. v-vi, 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, Douala, Cameroon, 10/07/24. https://doi.org/10.1007/978-3-031-64381-1
Review article
Kutas, P & Petit, C 2022, 'Torsion point attacks on ‘SIDH-like’ cryptosystems', IET Information Security. https://doi.org/10.1049/ise2.12076
View all publications in research portal