@ARTICLE{cgUCL-P14,
 	AUTHOR={Petit, Christophe},
	TITLE={{Finding Roots in GF(p^n) with the Successive Resultant Algorithm}},
	JOURNAL={LMS Journal of Computation and Mathematics},
	NOTE={(to appear)},
	MONTH={8},
	YEAR={2014},
}

@ARTICLE{cgUCL-KLPT14,
 	AUTHOR={Kohel, David and Lauter, Kristin and Petit, Christophe and Tignol, Jean-Pierre},
	TITLE={{On the quaternion $\ell$-isogeny path problem}},
	JOURNAL={LMS Journal of Computation and Mathematics},
	NOTE={(to appear)},
	MONTH={8},
	YEAR={2014},
}

@ARTICLE{cgUCL-HPS14,
 	AUTHOR={Hodges, Timothy and Petit, Christophe and Schlather, Jacob},
	TITLE={{First fall degree and Weil descent}},
	PUBLISHER={Elsevier},
	JOURNAL={Finite Fields and their Applications},
	NOTE={(to appear)},
	MONTH={7},
	YEAR={2014},
}

@ARTICLE{cgUCL-PRS14,
 	AUTHOR={Petit, Christophe and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{On a particular case of the bisymmetric equation for quasigroups}},
	PUBLISHER={Spinger},
	JOURNAL={Acta Mathematica Hungarica},
	NOTE={DOI 10.1007/s10474-014-0428-y},
	MONTH={6},
	YEAR={2014},
}

@ARTICLE{cgUCL-P14,
 	AUTHOR={Petit, Christophe},
	TITLE={{Towards factoring in SL(2,2^n)}},
	PUBLISHER={Springer},
	JOURNAL={Designs Codes and Cryptography},
	VOLUME={71},
	PAGES={409-431},
	MONTH={6},
	YEAR={2014},
}

@ARTICLE{cgUCL-P14,
 	AUTHOR={Petit, Christophe},
	TITLE={{Rubik's for Cryptographers}},
	JOURNAL={Mathematical Advance in Translation},
	VOLUME={33},
	PAGES={5-13},
	NOTE={(Chinese translation of AMS Notices, Vol 60 paper)},
	MONTH={4},
	YEAR={2014},
}

@INPROCEEDINGS{cgUCL-YSPT13,
 	AUTHOR={Yun-Ju, Huang and Shinohara, Naoyuki and Petit, Christophe and Takagi, Tsuyoshi},
	TITLE={{Improvement of Faugère et al.'s method to solve ECDLP}},
	BOOKTITLE={IWSEC 2013},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={8231},
	PAGES={115-132},
	MONTH={11},
	YEAR={2013},
}

@ARTICLE{cgUCL-PQ13,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Rubik's for cryptographers}},
	JOURNAL={Notices of the American Mathematical Society},
	VOLUME={60},
	PAGES={733-739},
	MONTH={6},
	YEAR={2013},
}

@INPROCEEDINGS{cgUCL-PQ12,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{On polynomial systems arising from a Weil descent}},
	BOOKTITLE={Asiacrypt 2012},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	MONTH={12},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-HPS12,
 	AUTHOR={Hodges, Timothy and Petit, Christophe and Schlather, Jacob},
	TITLE={{Degree of Regularity for Systems arising from Weil Descent}},
	BOOKTITLE={YAC2012 - Yet Another Conference in Cryptography},
	MONTH={9},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-FPPR12,
 	AUTHOR={Faugère, Jean-Charles and Petit, Christophe and Perret, Ludovic and Renault, Guénaël},
	TITLE={{Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields}},
	BOOKTITLE={Eurocrypt 2012},
	MONTH={4},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-SPV12,
 	AUTHOR={Standaert, François-Xavier and Petit, Christophe and Veyrat-Charvillon, Nicolas},
	TITLE={{Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders}},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science (LNCS)},
	VOLUME={6805},
	PAGES={283-299},
	MONTH={1},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-MPRRS11,
 	AUTHOR={Medwed, Marcel and Petit, Christophe and Regazzoni, Francesco and Renauld, Mathieu and Standaert, François-Xavier},
	TITLE={{Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks}},
	BOOKTITLE={10th Smart Card Research and Advanced Application Conference (CARDIS) 2011},
	MONTH={9},
	YEAR={2011},
}

@INBOOK{cgUCL-PQ11,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Cayley hash functions}},
	BOOKTITLE={Encyclopedia of cryptography and security - 2nd edition},
	PUBLISHER={Springer},
	EDITOR={Henk C. A. van Tilborg and  Sushil Jajodia},
	MONTH={1},
	YEAR={2011},
}

@INPROCEEDINGS{cgUCL-MPP10,
 	AUTHOR={Mawet, Sophie and Pereira, Olivier and Petit, Christophe},
	TITLE={{Equitable cake cutting without mediator}},
	BOOKTITLE={5th Benelux Workshop on Information and System Security},
	EDITOR={Svetla Nikova and Lejla Batina},
	MONTH={11},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-CP10,
 	AUTHOR={Cathalo, Julien and Petit, Christophe},
	TITLE={{One-time trapdoor one-way functions}},
	BOOKTITLE={Information Security - 13th International Conference (ISC  2010)  },
	PUBLISHER={Springer},
	EDITOR={Mike Burmester and  Gene Tsudik and Spyros S. Magliveras and Ivana Ilic},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6531},
	PAGES={283-298},
	MONTH={10},
	YEAR={2010},
}

@INPROCEEDINGS{cgUCL-PQ10,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Preimages for the Tillich-Zémor hash function}},
	BOOKTITLE={SAC2010 Selected Areas in Cryptography},
	PUBLISHER={Springer},
	EDITOR={Alex Biryukov and Guang Gong and Douglas R. Stinson},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={6544},
	PAGES={282-301},
	MONTH={8},
	YEAR={2010},
}

@ARTICLE{cgUCL-DPQ09,
 	AUTHOR={de Meulenaer, Giacomo and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?}},
	JOURNAL={Cryptology ePrint Archive},
	NOTE={Report 2009/229},
	MONTH={5},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-PQTZ09,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques and Tillich, Jean-Pierre and Zémor, Gilles},
	TITLE={{Hard and Easy Components of Collision Search for the Zémor-Tillich Hash Function : new Attacks and reduced variants with equival}},
	BOOKTITLE={CT-RSA},
	PUBLISHER={Springer},
	EDITOR={Marc Fischlin},
	SERIES={Lecture Notes in Computer Science},
	PAGES={182-194},
	MONTH={4},
	YEAR={2009},
}

@INPROCEEDINGS{cgUCL-PLQ08,
 	AUTHOR={Petit, Christophe and Lauter, Kristin and Quisquater, Jean-Jacques},
	TITLE={{Full Cryptanalysis of LPS and Morgenstern Hash Functions}},
	BOOKTITLE={SCN 2008 - Sixth Conference on Security and Cryptography for Networks},
	PUBLISHER={Springer Verlag},
	EDITOR={Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5229},
	PAGES={263-277},
	MONTH={9},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PQV08,
 	AUTHOR={Petit, Christophe and Quisquater, Jean-Jacques and Veyrat-Charvillon, Nicolas},
	TITLE={{Efficiency and Pseudo-randomness of a Variant of Zémor-Tillich Hash Function}},
	BOOKTITLE={ICECS2008 - IEEE International Conference on Electronics, Circuits, and Systems},
	PUBLISHER={IEEE},
	EDITOR={Joseph Micallef },
	PAGES={906-909},
	MONTH={8},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-KBPQ08,
 	AUTHOR={Kim, Chong Hee and Bulens, Philippe and Petit, Christophe and Quisquater, Jean-Jacques},
	TITLE={{Fault Attacks on Public Key Elements: Application to DLP based Schemes}},
	BOOKTITLE={Fifth European PKI Workshop - EUROPKI 2008},
	PUBLISHER={Springer},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={5057},
	PAGES={182-195},
	MONTH={6},
	YEAR={2008},
}

@INPROCEEDINGS{cgUCL-PSPMY08,
 	AUTHOR={Petit, Christophe and Standaert, François-Xavier and Pereira, Olivier and Malkin, Tal G. and Yung, Moti},
	TITLE={{A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery}},
	BOOKTITLE={ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security},
	PUBLISHER={ACM},
	EDITOR={M. Abe and V. Gligor},
	PAGES={56--65},
	MONTH={3},
	YEAR={2008},
}