Dr Christophe Petit PhD

Dr Christophe Petit

School of Computer Science
Senior Lecturer in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

I am a Senior Lecturer at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity.

For more information, please see Christophe's Computer Science profile.

Biography

I am a Lecturer in Computer Security in the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I am also actively involved within Oxford's Mathematical Institute, where I helped founding the Cryptography group.

I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity. I will also teach an Advanced Cryptography reading course for the Master in Mathematics and Foundations of Computer Science at Oxford.

I am always willing to supervise good and well-motivated students at undergraduate, master and PhD levels. Have a look at previous student projects and feel free to contact me to learn more about potential research projects.

Previously I was a Research Fellow at the University of Oxford's Mathematical Institute, and prior to that I worked at Université catholique de Louvain's Department of Electrical Engineering and at University College London's Computer Science Department.

Teaching

  • Advanced Cryptography
  • Secure Programming

Postgraduate supervision

  • 2018 Alex Litowczuk Post-quantum cryptography. 
  • 2018 Ran Pang Post-quantum cryptography. 

Research

My main research interests are in Cryptography and related topics, mostly at the intersection of Mathematics and Computer Science.

Publications

Recent publications

Article

Petit, C & Euler, M 2021, 'New Results on Quasi-Subfield Polynomials', Finite Fields and Their Applications.

Galbraith, SD, Petit, C & Silva, J 2020, 'Identification protocols and signature schemes based on supersingular isogeny problems', Journal of Cryptology, vol. 33, no. 1, pp. 130-175. https://doi.org/10.1007/s00145-019-09316-0

Huang, M-D, Kosters, M, Petit, C, Yeo, SL & Yun, Y 2020, 'Quasi-subfield polynomials and the elliptic curve discrete logarithm problem', Journal of Mathematical Cryptology, vol. 14, no. 1, pp. 25-38. https://doi.org/10.1515/jmc-2015-0049

Gorla, E, Mueller, D & Petit, C 2020, 'Stronger bounds on the cost of computing Gröbner bases for HFE systems', Journal of Symbolic Computation. https://doi.org/10.1016/j.jsc.2020.07.011

Conference contribution

Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2021, One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. in Advances in Cryptology – EUROCRYPT 2021. Lecture Notes in Computer Science.

Merz, S-P, Minko, R & Petit, C 2020, Another look at some isogeny hardness assumptions. in S Jarecki (ed.), Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020. Lecture Notes in Computer Science, vol. 12006, Springer, pp. 496-511, The Cryptographer's Track at the RSA Conference (CT-RSA 2020), San Francisco, United States, 24/02/20. https://doi.org/10.1007/978-3-030-40186-3_21

Basso, A, Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2020, On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. in A Nitaj & A Youssef (eds), Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings. Lecture Notes in Computer Science - Security and Cryptology, vol. 12174, Springer, 12th International Conference on Cryptology in Africa (Africacrypt2020), 20/07/20.

Galbraith, SD, Granger, R, Merz, S-P & Petit, C 2020, On Index Calculus Algorithms for Subfield Curves. in Selected Areas in Cryptography - SAC 2020. Lecture Notes in Computer Science, Springer, Selected Areas in Cryptography - SAC 2020, Virtual Event, 21/10/20.

Basso, A, Kutas, P, Merz, SP, Petit, C & Weitkämper, C 2020, On adaptive attacks against jao-urbanik’s isogeny-based protocol. in A Nitaj & A Youssef (eds), Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12174 LNCS, Springer Vieweg, pp. 195-213, 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, Cairo, Egypt, 20/07/20. https://doi.org/10.1007/978-3-030-51938-4_10

De Feo, L, Kohel, D, Leroux, A, Petit, C & Wesolowski, B 2020, SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. in S Moriai & H Wang (eds), Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12491 LNCS, Springer, pp. 64-93, 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, Daejeon, Korea, Republic of, 7/12/20. https://doi.org/10.1007/978-3-030-64837-4_3

De Feo, L, Kohel, D, Leroux, A, Petit, C & Wesolowski, B 2020, SQISign: Compact Post-Quantum Signatures from Quaternions and Isogenies. in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Springer, 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), Virtual Event, 7/12/20.

de Saint Guilhem, CD, Orsini, E, Petit, C & Smart, NP 2020, Semi-commutative masking: A framework for isogeny-based protocols, with an application to fully secure two-round isogeny-based OT. in S Krenn, H Shulman & S Vaudenay (eds), Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12579 LNCS, Springer, pp. 235-258, 19th International Conference on Cryptology and Network Security, CANS 2020, Vienna, Austria, 14/12/20. https://doi.org/10.1007/978-3-030-65411-5_12

Kutas, P, Petit, C & Silva, J 2020, Trapdoor DDH groups from pairings and isogenies. in Selected Areas in Cryptography - SAC 2020. Lecture Notes in Computer Science, Springer, Selected Areas in Cryptography - SAC 2020, Virtual Event, 21/10/20.

Merz, S-P & Petit, C 2019, Factoring Products of Braids via Garside Normal Form. in K Sako & D Lin (eds), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11443 LNCS, Springer, pp. 646-678, 2nd IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2019), Beijing, China, 14/04/19. https://doi.org/10.1007/978-3-030-17259-6_22

de Feo, L, Masson, S, Petit, C & Sanso, A 2019, Verifiable delay functions from supersingular isogenies and pairings. in SD Galbraith & S Moriai (eds), Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security Kobe, Japan, December 8–12, 2019 Proceedings, Part I. Lecture Notes in Computer Science, vol. 11921, Springer, pp. 248-277, Asiacrypt 2019, the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8/12/19. https://doi.org/10.1007/978-3-030-34578-5_10

View all publications in research portal