Dr Christophe Petit PhD

Dr Christophe Petit

School of Computer Science
Senior Lecturer in Computer Security

Contact details

Address
School of Computer Science
University of Birmingham
Edgbaston
Birmingham
B15 2TT
UK

I am a Senior Lecturer at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity.

For more information, please see Christophe's Computer Science profile.

Biography

I am a Lecturer in Computer Security in the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. I am also actively involved within Oxford's Mathematical Institute, where I helped founding the Cryptography group.

I teach the Secure Programming and part of the Advanced Cryptography modules at Birmingham, both of them part of our Master in Cybersecurity. I will also teach an Advanced Cryptography reading course for the Master in Mathematics and Foundations of Computer Science at Oxford.

I am always willing to supervise good and well-motivated students at undergraduate, master and PhD levels. Have a look at previous student projects and feel free to contact me to learn more about potential research projects.

Previously I was a Research Fellow at the University of Oxford's Mathematical Institute, and prior to that I worked at Université catholique de Louvain's Department of Electrical Engineering and at University College London's Computer Science Department.

Teaching

  • Advanced Cryptography
  • Secure Programming

Postgraduate supervision

  • 2018 Alex Litowczuk Post-quantum cryptography. 
  • 2018 Ran Pang Post-quantum cryptography. 

Research

My main research interests are in Cryptography and related topics, mostly at the intersection of Mathematics and Computer Science.

Publications

Recent publications

Article

Euler, M & Petit, C 2021, 'New results on quasi-subfield polynomials', Finite Fields and Their Applications, vol. 75, 101881. https://doi.org/10.1016/j.ffa.2021.101881

Galbraith, SD, Petit, C & Silva, J 2020, 'Identification protocols and signature schemes based on supersingular isogeny problems', Journal of Cryptology, vol. 33, no. 1, pp. 130-175. https://doi.org/10.1007/s00145-019-09316-0

Huang, M-D, Kosters, M, Petit, C, Yeo, SL & Yun, Y 2020, 'Quasi-subfield polynomials and the elliptic curve discrete logarithm problem', Journal of Mathematical Cryptology, vol. 14, no. 1, pp. 25-38. https://doi.org/10.1515/jmc-2015-0049

Gorla, E, Mueller, D & Petit, C 2020, 'Stronger bounds on the cost of computing Gröbner bases for HFE systems', Journal of Symbolic Computation. https://doi.org/10.1016/j.jsc.2020.07.011

Conference contribution

Galbraith, SD, Granger, R, Merz, S-P & Petit, C 2021, On index calculus algorithms for subfield curves. in O Dunkelman, MJ Jacobson, Jr. & C O’Flynn (eds), Selected Areas in Cryptography - 27th International Conference, 2020, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12804, Springer, pp. 115-138, 27th International Conference on Selected Areas in Cryptography, SAC 2020, Virtual, Online, 21/10/20. https://doi.org/10.1007/978-3-030-81652-0_5

Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2021, One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols. in A Canteaut & F-X Standaert (eds), Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12696, Springer, pp. 242-271, 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 17/10/21. https://doi.org/10.1007/978-3-030-77870-5_9

Fouotsa, TB & Petit, C 2021, SimS: a simplification of SiGamal. in JH Cheon & J-P Tillich (eds), Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12841 LNCS, Springer, pp. 277-295, 12th International Conference on post-quantum cryptography, PQCrypto 2021, Daejeon, Korea, Republic of, 20/07/21. https://doi.org/10.1007/978-3-030-81293-5_15

Kutas, P, Petit, C & Silva, J 2021, Trapdoor DDH groups from pairings and isogenies. in O Dunkelman, MJ Jacobson, Jr. & C O’Flynn (eds), Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science, Springer, pp. 431-450, 27th International Conference on Selected Areas in Cryptography, SAC 2020, Virtual, Online, 21/10/20. https://doi.org/10.1007/978-3-030-81652-0_17

Merz, S-P, Minko, R & Petit, C 2020, Another look at some isogeny hardness assumptions. in S Jarecki (ed.), Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020. Lecture Notes in Computer Science, vol. 12006, Springer, pp. 496-511, The Cryptographer's Track at the RSA Conference (CT-RSA 2020), San Francisco, United States, 24/02/20. https://doi.org/10.1007/978-3-030-40186-3_21

Basso, A, Kutas, P, Merz, S-P, Petit, C & Weitkaemper, C 2020, On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. in A Nitaj & A Youssef (eds), Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings. Lecture Notes in Computer Science - Security and Cryptology, vol. 12174, Springer, 12th International Conference on Cryptology in Africa (Africacrypt2020), 20/07/20.

Basso, A, Kutas, P, Merz, SP, Petit, C & Weitkämper, C 2020, On adaptive attacks against jao-urbanik’s isogeny-based protocol. in A Nitaj & A Youssef (eds), Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12174 LNCS, Springer Vieweg, pp. 195-213, 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, Cairo, Egypt, 20/07/20. https://doi.org/10.1007/978-3-030-51938-4_10

De Feo, L, Kohel, D, Leroux, A, Petit, C & Wesolowski, B 2020, SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. in S Moriai & H Wang (eds), Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12491 LNCS, Springer, pp. 64-93, 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, Daejeon, Korea, Republic of, 7/12/20. https://doi.org/10.1007/978-3-030-64837-4_3

De Feo, L, Kohel, D, Leroux, A, Petit, C & Wesolowski, B 2020, SQISign: Compact Post-Quantum Signatures from Quaternions and Isogenies. in 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). Springer, 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), Virtual Event, 7/12/20.

de Saint Guilhem, CD, Orsini, E, Petit, C & Smart, NP 2020, Semi-commutative masking: A framework for isogeny-based protocols, with an application to fully secure two-round isogeny-based OT. in S Krenn, H Shulman & S Vaudenay (eds), Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12579 LNCS, Springer, pp. 235-258, 19th International Conference on Cryptology and Network Security, CANS 2020, Vienna, Austria, 14/12/20. https://doi.org/10.1007/978-3-030-65411-5_12

Merz, S-P & Petit, C 2019, Factoring Products of Braids via Garside Normal Form. in K Sako & D Lin (eds), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11443 LNCS, Springer, pp. 646-678, 2nd IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2019), Beijing, China, 14/04/19. https://doi.org/10.1007/978-3-030-17259-6_22

View all publications in research portal