[go: up one dir, main page]

Follow
Péter Kutas
Péter Kutas
Eötvös Loránd University and University of Birmingham
Verified email at bham.ac.uk - Homepage
Title
Cited by
Cited by
Year
SCALLOP: scaling the CSI-FiSh
LD Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, B Wesolowski
IACR international conference on public-key cryptography, 345-375, 2023
1072023
Improved torsion-point attacks on SIDH variants
V de Quehen, P Kutas, C Leonardi, C Martindale, L Panny, C Petit, ...
Annual international cryptology conference, 432-470, 2021
90*2021
Séta: Supersingular encryption from torsion attacks
L De Feo, C Delpech de Saint Guilhem, TB Fouotsa, P Kutas, A Leroux, ...
International conference on the theory and application of cryptology and …, 2021
84*2021
Cryptanalysis of an oblivious PRF from supersingular isogenies
A Basso, P Kutas, SP Merz, C Petit, A Sanso
International Conference on the Theory and Application of Cryptology and …, 2021
472021
On the isogeny problem with torsion point information
TB Fouotsa, P Kutas, SP Merz
Cryptology ePrint Archive, 2021
33*2021
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols
P Kutas, SP Merz, C Petit, C Weitkämper
Annual International Conference on the Theory and Applications of …, 2021
222021
Finding orientations of supersingular elliptic curves and quaternion orders
S Arpin, J Clements, P Dartois, JK Eriksen, P Kutas, B Wesolowski
Designs, Codes and Cryptography 92 (11), 3447-3493, 2024
192024
Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
M Chen, M Imran, G Ivanyos, P Kutas, A Leroux, C Petit
International Conference on the Theory and Application of Cryptology and …, 2023
152023
On adaptive attacks against Jao-Urbanik’s isogeny-based protocol
A Basso, P Kutas, SP Merz, C Petit, C Weitkämper
International Conference on Cryptology in Africa, 195-213, 2020
142020
Computing Explicit Isomorphisms with Full Matrix Algebras over
G Ivanyos, P Kutas, L Rónyai
Foundations of Computational Mathematics 18 (2), 381-397, 2018
132018
Faster SCALLOP from non-prime conductor suborders in medium sized quadratic fields
B Allombert, JF Biasse, JK Eriksen, P Kutas, C Leonardi, A Page, ...
IACR International Conference on Public-Key Cryptography, 333-363, 2025
112025
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
B Benčina, P Kutas, SP Merz, C Petit, M Stopar, C Weitkämper
Annual International Cryptology Conference, 183-217, 2024
112024
Algebraic conditions for additive functions over the reals and over finite fields
P Kutas
Aequationes mathematicae 92 (3), 563-575, 2018
112018
Sqiasignhd: Sqisignhd adaptor signature
F Renan, P Kutas
arXiv preprint arXiv:2404.09026, 2024
92024
Primitive idempotents in central simple algebras over Fq (t) with an application to coding theory
J Gómez-Torrecillas, P Kutas, FJ Lobillo, G Navarro
Finite Fields and Their Applications 77, 101935, 2022
92022
A regularity condition for quadratic functions involving the unit circle
Z Boros, W Fechner, P Kutas
Publicationes Mathematicae-Debrecen 89 (3), 297-306, 2016
92016
Simple Power Analysis Attack on SQIsign
A Mukherjee, M Czuprynko, D Jacquemin, P Kutas, SS Roy
International Conference on Cryptology in Africa, 245-269, 2025
8*2025
Explicit isomorphisms of quaternion algebras over quadratic global fields
T Csahók, P Kutas, M Montessinos, G Zábrádi
Research in Number Theory 8 (4), 77, 2022
82022
Explicit equivalence of quadratic forms over Fq (t)
G Ivanyos, P Kutas, L Rónyai
Finite Fields and Their Applications 55, 33-63, 2019
82019
Exploring SIDH-based signature parameters
A Basso, M Chen, TB Fouotsa, P Kutas, A Laval, L Marco, GT Saah
International Conference on Applied Cryptography and Network Security, 432-456, 2024
62024
The system can't perform the operation now. Try again later.
Articles 1–20