# Dr. Christophe Petit

Disclaimer: This page refers to former member of the group. Validity or accuracy of the following information is thus not guaranteed in any way.

My research interests go from the mathematical aspects of Cryptography to the modeling and analysis of side-channel and fault attacks.
 Address: Microelectronics Laboratory, Place du Levant, 3 Office: b.127.20 Voice: +32 (0) 10 47 81 39 Fax: +32 (0) 10 47 25 98 E-Mail: Homepage: http://perso.uclouvain.be/christophe.petit/index.html
BibTeX - Petit

## Publications

Christophe Petit. Finding Roots in GF(p^n) with the Successive Resultant Algorithm, In LMS Journal of Computation and Mathematics, August 2014, (to appear) BibTeX

David Kohel, Kristin Lauter, Christophe Petit, and Jean-Pierre Tignol. On the quaternion $\ell$-isogeny path problem, In LMS Journal of Computation and Mathematics, August 2014, (to appear) BibTeX

Timothy Hodges, Christophe Petit, and Jacob Schlather. First fall degree and Weil descent, In Finite Fields and their Applications, July 2014, (to appear) BibTeX

Christophe Petit, Mathieu Renauld, and François-Xavier Standaert. On a particular case of the bisymmetric equation for quasigroups, In Acta Mathematica Hungarica, June 2014, DOI 10.1007/s10474-014-0428-y BibTeX

Christophe Petit. Towards factoring in SL(2,2^n), In Designs Codes and Cryptography, Volume 71-3, pages 409-431, June 2014 BibTeX

Christophe Petit. Rubik's for Cryptographers, In Mathematical Advance in Translation, Volume 33-1, pages 5-13, April 2014, (Chinese translation of AMS Notices, Vol 60 paper) BibTeX

Huang Yun-Ju, Naoyuki Shinohara, Christophe Petit, and Tsuyoshi Takagi. Improvement of Faugère et al.'s method to solve ECDLP, IWSEC 2013, Volume 8231 of Lecture Notes in Computer Science (LNCS), pages 115-132, November 2013 BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Rubik's for cryptographers, In Notices of the American Mathematical Society, Volume 60, pages 733-739, June 2013 BibTeX

Christophe Petit, and Jean-Jacques Quisquater. On polynomial systems arising from a Weil descent, Asiacrypt 2012, Lecture Notes in Computer Science (LNCS), Springer, December 2012 PDF BibTeX

Timothy Hodges, Christophe Petit, and Jacob Schlather. Degree of Regularity for Systems arising from Weil Descent, YAC2012 - Yet Another Conference in Cryptography, September 2012 BibTeX

Jean-Charles Faugère, Christophe Petit, Ludovic Perret, and Guénaël Renault. Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields, Eurocrypt 2012, April 2012 PDF BibTeX

François-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon. Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders, Volume 6805 of Lecture Notes in Computer Science (LNCS), pages 283-299, Springer, January 2012 BibTeX

Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and François-Xavier Standaert. Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks, 10th Smart Card Research and Advanced Application Conference (CARDIS) 2011, September 2011 BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Cayley hash functions, Henk C. A. van Tilborg and Sushil Jajodia ed., In Encyclopedia of cryptography and security - 2nd edition, Springer, January 2011 BibTeX

Sophie Mawet, Olivier Pereira, and Christophe Petit. Equitable cake cutting without mediator, In Svetla Nikova and Lejla Batina, editor(s), 5th Benelux Workshop on Information and System Security, November 2010 PDF BibTeX

Julien Cathalo, and Christophe Petit. One-time trapdoor one-way functions, In Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic, editor(s), Information Security - 13th International Conference (ISC 2010) , Volume 6531 of Lecture Notes in Computer Science, pages 283-298, Springer, October 2010 PDF BibTeX

Christophe Petit, and Jean-Jacques Quisquater. Preimages for the Tillich-Zémor hash function, In Alex Biryukov and Guang Gong and Douglas R. Stinson, editor(s), SAC2010 Selected Areas in Cryptography, Volume 6544 of Lecture Notes in Computer Science, pages 282-301, Springer, August 2010 PDF BibTeX

Giacomo de Meulenaer, Christophe Petit, and Jean-Jacques Quisquater. Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?, In Cryptology ePrint Archive, May 2009, Report 2009/229 PDF BibTeX

Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, and Gilles Zémor. Hard and Easy Components of Collision Search for the Zémor-Tillich Hash Function : new Attacks and reduced variants with equival, In Marc Fischlin, editor(s), CT-RSA, Lecture Notes in Computer Science, pages 182-194, Springer, April 2009 PDF BibTeX

Christophe Petit, Kristin Lauter, and Jean-Jacques Quisquater. Full Cryptanalysis of LPS and Morgenstern Hash Functions, In Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti, editor(s), SCN 2008 - Sixth Conference on Security and Cryptography for Networks, Volume 5229 of Lecture Notes in Computer Science, pages 263-277, Springer Verlag, September 2008 PDF BibTeX

Christophe Petit, Jean-Jacques Quisquater, and Nicolas Veyrat-Charvillon. Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function, In Joseph Micallef , editor(s), ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems, pages 906-909, IEEE, August 2008 PDF BibTeX

Chong Hee Kim, Philippe Bulens, Christophe Petit, and Jean-Jacques Quisquater. Fault Attacks on Public Key Elements: Application to DLP based Schemes, Fifth European PKI Workshop - EUROPKI 2008, Volume 5057 of Lecture Notes in Computer Science, pages 182 - 195, Springer, June 2008 PDF BibTeX

Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, and Moti Yung. A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery, In M. Abe and V. Gligor, editor(s), ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 56--65, ACM, March 2008 PDF BibTeX