Articles dans des revues avec comité de lecture (52)

  1. 1. Euler, M., & Petit, C. (2021). New results on quasi-subfield polynomials. Finite fields and their applications, 75, 101881. doi:10.1016/j.ffa.2021.101881
  2. 2. Kliuchnikov, V., Lauter, K., Minko, R., Paetznick, A., & Petit, C. (2023). Shorter quantum circuits via single-qubit gate approximation. Quantum, 7, 1208. doi:10.22331/q-2023-12-18-1208
  3. 3. Fouotsa, T. B., Moriya, T., & Petit, C. (2023). M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information. Lecture notes in computer science, 14008 LNCS, 282-309. doi:10.1007/978-3-031-30589-4_10
  4. 4. Beullens, W., De Feo, L., Galbraith, S. S., & Petit, C. (2023). Proving knowledge of isogenies: a survey. Designs, codes and cryptography. doi:10.1007/s10623-023-01243-3
  5. 5. Otmani, A., Petit, C., & Tibouchi, M. (2023). Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. I E T Information Security, 17(2), 159-160. doi:10.1049/ise2.12105
  6. 6. Kutas, P., & Petit, C. (2022). Torsion point attacks on ‘SIDH-like’ cryptosystems. I E T Information Security. doi:10.1049/ise2.12076
  7. 7. Fouotsa, T. B., & Petit, C. (2022). A New Adaptive Attack on SIDH. Lecture notes in computer science, 13161 LNCS, 322-344. doi:10.1007/978-3-030-95312-6_14
  8. 8. de Quehen, V., Kutas, P., Leonardi, C., Martindale, C., Panny, L., Petit, C., & Stange, K. K. (2021). Improved Torsion-Point Attacks on SIDH Variants. Lecture notes in computer science, 12827 LNCS, 432-470. doi:10.1007/978-3-030-84252-9_15
  9. 9. Galbraith, S. S., Granger, R., Merz, S. P., & Petit, C. (2021). On Index Calculus Algorithms for Subfield Curves. Lecture notes in computer science, 12804 LNCS, 115-138. doi:10.1007/978-3-030-81652-0_5
  10. 10. Kutas, P., Petit, C., & Silva, J. (2021). Trapdoor DDH Groups from Pairings and Isogenies. Lecture notes in computer science, 12804 LNCS, 431-450. doi:10.1007/978-3-030-81652-0_17
  11. 11. Fouotsa, T. B., & Petit, C. (2021). SimS: A Simplification of SiGamal. Lecture notes in computer science, 12841 LNCS, 277-295. doi:10.1007/978-3-030-81293-5_15
  12. 12. Kutas, P., Merz, S. P., Petit, C., & Weitkämper, C. (2021). One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols. Lecture notes in computer science, 12696 LNCS, 242-271. doi:10.1007/978-3-030-77870-5_9

  13. << Précédent 1 2 3 4 5 Suivant >>