Dr Christophe Petit PhD

Dr Christophe Petit

School of Computer Science
Senior Lecturer in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

I am a Senior Lecturer at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity.

For more information, please see Christophe's Computer Science profile.

Biography

I am a Lecturer in Computer Security in the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I am also actively involved within Oxford's Mathematical Institute, where I helped founding the Cryptography group.

I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity. I will also teach an Advanced Cryptography reading course for the Master in Mathematics and Foundations of Computer Science at Oxford.

I am always willing to supervise good and well-motivated students at undergraduate, master and PhD levels. Have a look at previous student projects and feel free to contact me to learn more about potential research projects.

Previously I was a Research Fellow at the University of Oxford's Mathematical Institute, and prior to that I worked at Université catholique de Louvain's Department of Electrical Engineering and at University College London's Computer Science Department.

Teaching

  • Advanced Cryptography
  • Secure Programming

Postgraduate supervision

  • 2018 Alex Litowczuk Post-quantum cryptography. 
  • 2018 Ran Pang Post-quantum cryptography. 

Research

My main research interests are in Cryptography and related topics, mostly at the intersection of Mathematics and Computer Science.

Publications

Recent publications

Article

Galbraith, SD, Petit, C & Silva, J 2019, 'Identification protocols and signature schemes based on supersingular isogeny problems', Journal of Cryptology. https://doi.org/10.1007/s00145-019-09316-0

Carvalho Pinto, E & Petit, C 2018, 'Better path-finding algorithms in LPS Ramanujan graphs', Journal of Mathematical Cryptology, vol. 12, no. 4, pp. 191-202. https://doi.org/10.1515/jmc-2017-0051

Huang, M-D, Kosters, M, Petit, C, Yeo, SL & Yun, Y 2018, 'Quasi-subfield polynomials and the elliptic curve discrete logarithm problem', Journal of Mathematical Cryptology.

Chapter

Petit, C & Quisquater, J-J 2016, Cryptographic Hash Functions and Expander Graphs: The End of the Story? in PYA Ryan, D Naccache & J-J Quisquater (eds), The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science, vol. 9100, Springer, pp. 304-311. https://doi.org/10.1007/978-3-662-49301-4_19

Conference contribution

de Feo, L, Masson, S, Petit, C & Sanso, A 2019, Verifiable delay functions from supersingular isogenies and pairings. in Proceedings of Asiacrypt 2019, the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security., 53, Springer, Asiacrypt 2019, the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8/12/19.

Merz, S-P & Petit, C 2019, Factoring Products of Braids via Garside Normal Form. in K Sako & D Lin (eds), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11443 LNCS, Springer, pp. 646-678, 2nd IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2019), Beijing, China, 14/04/19. https://doi.org/10.1007/978-3-030-17259-6_22

Eisenträger, K, Hallgren, S, Lauter, K, Morrison, T & Petit, C 2018, Supersingular isogeny graphs and endomorphism rings: reductions and solutions. in Proceedings of 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2018) . Lecture Notes in Computer Science, vol. 10822, Springer, pp. 329-368, 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2018) , Tel Aviv , Israel, 29/04/18. https://doi.org/10.1007/978-3-319-78372-7_11

Hart, D, Kim, D, Micheli, G, Perez, GP, Petit, C & Quek, Y 2018, A Practical Cryptanalysis of WalnutDSA. in M Abdalla & R Dahab (eds), Proceedings of the 21st International Conference on Practice and Theory of Public Key Cryptography. vol. Vol 1, Lecture Notes in Computer Science, vol. 10769, Springer, pp. 381-406, 21st International Conference on Practice and Theory of Public Key Cryptography, Rio de Janeiro, Brazil, 25/03/18. https://doi.org/10.1007/978-3-319-76578-5_13

Petit, C 2017, Faster Algorithms for Isogeny Problems using Torsion Point Images. in ASIACRYPT 2017: Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Springer, 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2017), Hong Kong, 3/12/17.

Galbraith, SD, Petit, C & Silva, J 2017, Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. in ASIACRYPT 2017: Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2017). Springer, 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2017), Hong Kong, 3/12/17.

Davenport, JH, Petit, C & Pring, B 2017, A Generalised Successive Resultants Algorithm. in S Duquesne & S Petkova-Nikova (eds), Arithmetic of Finite Fields: 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10064, Springer, pp. 105-124, 6th International Workshop on Arithmetic of Finite Fields, WAIFI 2016, Ghent, Belgium, 13/07/16. https://doi.org/10.1007/978-3-319-55227-9_9

Galbraith, SD, Petit, C, Shani, B & Ti, YB 2016, On the Security of Supersingular Isogeny Cryptosystems. in JH Cheon & T Takagi (eds), Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10031, Springer, pp. 63-91, 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016), Hanoi, Viet Nam, 4/12/16. https://doi.org/10.1007/978-3-662-53887-6_3

Bootle, J, Cerulli, A, Chaidos, P, Groth, J & Petit, C 2016, Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. in M Fischlin & J-S Coron (eds), Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9666, Springer, pp. 327-357, 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2016), Vienna, Austria, 8/05/16. https://doi.org/10.1007/978-3-662-49896-5_12

Petit, C, Kosters, M & Messeng, A 2016, Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. in C-M Cheng, K-M Chung, G Persiano & B-Y Yang (eds), Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9615, Springer, pp. 3-18, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, Province of China, 6/03/16. https://doi.org/10.1007/978-3-662-49387-8_1

Bootle, J, Cerulli, A, Chaidos, P, Ghadafi, E, Groth, J & Petit, C 2016, Short Accountable Ring Signatures Based on DDH. in G Pernul, PYA Ryan & E Weippl (eds), Computer Security - ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9326, Springer, pp. 243-265, 20th European Symposium on Research in Computer Security, (ESORICS 2015), Vienna, Austria, 21/09/15. https://doi.org/10.1007/978-3-319-24174-6_13

View all publications in research portal