I am pursuing a PhD thesis at INRIA CARAMBA; my advisors are Emmanuel Thomé and Pierre-Jean Spaenlehauer. My work is at the interface of post-quantum isogeny-based cryptography and computer algebra, with a strong focus on Drinfeld modules.

Numbers and functions evolved into monolithic and magnificent structures, that were polished by countless brilliant mathematicians. How can one manipulate and appropriate those structures? Using explicit computations, for example. Through examples, one can get a firm grasp on objects. This is the root of intuition, that grows into conjectures, and theorems.

Computer algebra is one of the best tools used by mathematicians to build examples. Algorithms work in concert with the more fundamental branches in mathematics, and they embody some experimental sides of our science. Gauß, Euler, Legendre, all had fantastic computing abilities, mastering both the abstract and algorithmic aspects of mathematics.

Besides this, number theory turned out to be essential in public-key cryptography. Cryptography is now at the heart of privacy, on which I believe human rights heavily depend. By being at the intersection of computer sciences, mathematics and human rights, cryptography also embodies humanistic values. I am more than hopeful that my personal interest in mathematics will serve the purpose of contributing to cryptography and its use.

My goal is to write reliable and efficient algorithms, that will serve in cryptography or in mathematical research, and my area of expertise is that of Drinfeld modules. Drinfeld modules were introduced in 1974 to create an explicit class field theory for function fields, in which rank two Drinfeld modules — and their theory of complex multiplication — play the role of elliptic curves. The motivation for Drinfeld modules in cryptography comes from the fact that algorithms tend to be faster in function fields than in number fields.

Our first result was to derive a “Drinfeld-analogue” of the following action: the class group of a quadratic imaginary number field K/ℚ acts simply transitively on the set of isomorphism classes of ordinary elliptic curves whose complex multiplication is given by K/ℚ. In our case, this action is realized in terms of isogenies of Drinfeld modules, and we can efficiently compute it. Surprisingly, the algorithm takes six lines; we implemented it, ran it, and gave an explicit computation. See the preprint. We are now focusing on new cryptography applications of Drinfeld modules and new algorithms.

Finally, programming is very important for me; I am also the main author of the first (upcoming) SageMath-integrated library for Drinfeld modules; see the Software section.