Dr Christophe Petit PhD

Dr Christophe Petit

School of Computer Science
Senior Lecturer in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

I am a Senior Lecturer at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity.

For more information, please see Christophe's Computer Science profile.

Biography

I am a Lecturer in Computer Security in the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I am also actively involved within Oxford's Mathematical Institute, where I helped founding the Cryptography group.

I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity. I will also teach an Advanced Cryptography reading course for the Master in Mathematics and Foundations of Computer Science at Oxford.

I am always willing to supervise good and well-motivated students at undergraduate, master and PhD levels. Have a look at previous student projects and feel free to contact me to learn more about potential research projects.

Previously I was a Research Fellow at the University of Oxford's Mathematical Institute, and prior to that I worked at Université catholique de Louvain's Department of Electrical Engineering and at University College London's Computer Science Department.

Teaching

  • Advanced Cryptography
  • Secure Programming

Postgraduate supervision

  • 2018 Alex Litowczuk Post-quantum cryptography. 
  • 2018 Ran Pang Post-quantum cryptography. 

Research

My main research interests are in Cryptography and related topics, mostly at the intersection of Mathematics and Computer Science.

Publications

Recent publications

Article

Euler, M & Petit, C 2021, 'New results on quasi-subfield polynomials', Finite Fields and Their Applications, vol. 75, 101881. https://doi.org/10.1016/j.ffa.2021.101881

Galbraith, SD, Petit, C & Silva, J 2020, 'Identification protocols and signature schemes based on supersingular isogeny problems', Journal of Cryptology, vol. 33, no. 1, pp. 130-175. https://doi.org/10.1007/s00145-019-09316-0

Huang, M-D, Kosters, M, Petit, C, Yeo, SL & Yun, Y 2020, 'Quasi-subfield polynomials and the elliptic curve discrete logarithm problem', Journal of Mathematical Cryptology, vol. 14, no. 1, pp. 25-38. https://doi.org/10.1515/jmc-2015-0049

Conference contribution

Fouotsa, TB & Petit, C 2022, A new adaptive attack on SIDH. in SD Galbraith (ed.), Topics in Cryptology – CT-RSA 2022: Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1–2, 2022, Proceedings. 1 edn, Lecture Notes in Computer Science, vol. 13161, Springer, pp. 322-344, Cryptographers’ Track RSA Conference, 7/02/22. https://doi.org/10.1007/978-3-030-95312-6_14

Basso, A, Kutas, P, Merz, SP, Petit, C & Sanso, A 2021, Cryptanalysis of an oblivious PRF from supersingular isogenies. in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13090 LNCS, Springer, pp. 160-184, 27th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, Virtual, Online, 6/12/21. https://doi.org/10.1007/978-3-030-92062-3_6

de Quehen, V, Kutas, P, Leonardi, C, Martindale, C, Panny, L, Petit, C & Stange, KE 2021, Improved torsion-point attacks on SIDH variants. in T Malkin & C Peikert (eds), Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings, Part III. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12827 LNCS, Springer, pp. 432-470, 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual, Online, 16/08/21. https://doi.org/10.1007/978-3-030-84252-9_15

Galbraith, SD, Granger, R, Merz, S-P & Petit, C 2021, On index calculus algorithms for subfield curves. in O Dunkelman, MJ Jacobson, Jr. & C O’Flynn (eds), Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12804, Springer, pp. 115-138, 27th International Conference on Selected Areas in Cryptography, SAC 2020, Virtual, Online, 21/10/20. https://doi.org/10.1007/978-3-030-81652-0_5

Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2021, One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols. in A Canteaut & F-X Standaert (eds), Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12696, Springer, pp. 242-271, 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 17/10/21. https://doi.org/10.1007/978-3-030-77870-5_9

Fouotsa, TB & Petit, C 2021, SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH. in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13093 LNCS, Springer, pp. 279-307, 27th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, Virtual, Online, 6/12/21. https://doi.org/10.1007/978-3-030-92068-5_10

Fouotsa, TB & Petit, C 2021, SimS: a simplification of SiGamal. in JH Cheon & J-P Tillich (eds), Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12841 LNCS, Springer, pp. 277-295, 12th International Conference on post-quantum cryptography, PQCrypto 2021, Daejeon, Korea, Republic of, 20/07/21. https://doi.org/10.1007/978-3-030-81293-5_15

De Feo, L, Delpech de Saint Guilhem, C, Fouotsa, TB, Kutas, P, Leroux, A, Petit, C, Silva, J & Wesolowski, B 2021, Séta: supersingular encryption from torsion attacks. in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13093 LNCS, Springer, pp. 249-278, 27th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, Virtual, Online, 6/12/21. https://doi.org/10.1007/978-3-030-92068-5_9

Kutas, P, Petit, C & Silva, J 2021, Trapdoor DDH groups from pairings and isogenies. in O Dunkelman, MJ Jacobson, Jr. & C O’Flynn (eds), Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science, Springer, pp. 431-450, 27th International Conference on Selected Areas in Cryptography, SAC 2020, Virtual, Online, 21/10/20. https://doi.org/10.1007/978-3-030-81652-0_17

Merz, S-P, Minko, R & Petit, C 2020, Another look at some isogeny hardness assumptions. in S Jarecki (ed.), Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020. Lecture Notes in Computer Science, vol. 12006, Springer, pp. 496-511, The Cryptographer's Track at the RSA Conference (CT-RSA 2020), San Francisco, United States, 24/02/20. https://doi.org/10.1007/978-3-030-40186-3_21

Basso, A, Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2020, On adaptive attacks against Jao-Urbanik's isogeny-based protocol. in A Nitaj & A Youssef (eds), Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings. 1 edn, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12174 LNCS, Springer, pp. 195-213, 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, Cairo, Egypt, 20/07/20. https://doi.org/10.1007/978-3-030-51938-4_10

De Feo, L, Kohel, D, Leroux, A, Petit, C & Wesolowski, B 2020, SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. in S Moriai & H Wang (eds), Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12491 LNCS, Springer, pp. 64-93, 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, Daejeon, Korea, Republic of, 7/12/20. https://doi.org/10.1007/978-3-030-64837-4_3

View all publications in research portal