Parties d'ouvrages collectifs (1)

  1. 1. Petit, C., & Quisquater, J.-J. (2025). Cayley Hash Functions. In Encyclopedia of Cryptography, Security and Privacy, Third Edition (pp. 326-328). Springer Nature. doi:10.1007/978-3-030-71522-9_126
  2.   Articles dans des revues avec comité de lecture (56)

  3. 1. Euler, M., & Petit, C. (2021). New results on quasi-subfield polynomials. Finite fields and their applications, 75, 101881. doi:10.1016/j.ffa.2021.101881
  4. 2. Decru, T., Fouotsa, T. B., Frixons, P., Gilchrist, V., & Petit, C. (2024). Attacking trapdoors from matrix products. IACR communications in cryptology, 3.
  5. 3. Chen, M., Lai, Y.-F., Laval, A., Marco, L., & Petit, C. (2024). Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies. Lecture notes in computer science, 14459 LNCS, 221-243. doi:10.1007/978-3-031-56232-7_11
  6. 4. Booher, J., Bowden, R., Doliskani, J., Boris Fouotsa, T., Galbraith, S. D., Kunzweiler, S., Merz, S. P., Petit, C., Smith, B. D., Stange, K. K., Ti, Y. B., Vincent, C., Voloch, J. F., Weitkämper, C., & Zobernig, L. (2024). Failing to Hash Into Supersingular Isogeny Graphs. Computer journal. doi:10.1093/comjnl/bxae038
  7. 5. Kliuchnikov, V., Lauter, K., Minko, R., Paetznick, A., & Petit, C. (2023). Shorter quantum circuits via single-qubit gate approximation. Quantum, 7, 1208. doi:10.22331/q-2023-12-18-1208
  8. 6. Beullens, W., De Feo, L., Galbraith, S. S., & Petit, C. (2023). Proving knowledge of isogenies: a survey. Designs, codes and cryptography. doi:10.1007/s10623-023-01243-3
  9. 7. Fouotsa, T. B., Moriya, T., & Petit, C. (2023). M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information. Lecture notes in computer science, 14008 LNCS, 282-309. doi:10.1007/978-3-031-30589-4_10
  10. 8. Chen, M., Imran, M., Ivanyos, G., Kutas, P., Leroux, A., & Petit, C. (2023). Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH. Lecture notes in computer science, 14440 LNCS, 99-130. doi:10.1007/978-981-99-8727-6_4
  11. 9. Otmani, A., Petit, C., & Tibouchi, M. (2023). Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. I E T Information Security, 17(2), 159-160. doi:10.1049/ise2.12105
  12. 10. Kutas, P., & Petit, C. (2022). Torsion point attacks on ‘SIDH-like’ cryptosystems. I E T Information Security. doi:10.1049/ise2.12076
  13. 11. Fouotsa, T. B., & Petit, C. (2022). A New Adaptive Attack on SIDH. Lecture notes in computer science, 13161 LNCS, 322-344. doi:10.1007/978-3-030-95312-6_14

  14. << Précédent 1 2 3 4 5 6 Suivant >>