Follow
Lorenz Panny
Lorenz Panny
Technische Universität München
Verified email at yx7.cc - Homepage
Title
Cited by
Cited by
Year
CSIDH: an efficient post-quantum commutative group action
W Castryck, T Lange, C Martindale, L Panny, J Renes
Advances in Cryptology – ASIACRYPT 2018, 395-427, 2018
5812018
Truly modular (co)datatypes for Isabelle/HOL
JC Blanchette, J Hölzl, A Lochbihler, L Panny, A Popescu, D Traytel
Interactive Theorem Proving — ITP 2014, 93-110, 2014
1232014
A direct key recovery attack on SIDH
L Maino, C Martindale, L Panny, G Pope, B Wesolowski
Advances in Cryptology – EUROCRYPT 2023, 448-471, 2023
912023
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
DJ Bernstein, T Lange, C Martindale, L Panny
Advances in Cryptology – EUROCRYPT 2019, 409-441, 2019
862019
Improved torsion-point attacks on SIDH variants
V de Quehen, P Kutas, C Leonardi, C Martindale, L Panny, C Petit, ...
Advances in Cryptology – CRYPTO 2021, 432-470, 2021
63*2021
Rational isogenies from irrational endomorphisms
W Castryck, L Panny, F Vercauteren
Advances in Cryptology – EUROCRYPT 2020, 523-548, 2020
512020
Faster SeaSign signatures through improved rejection sampling
T Decru, L Panny, F Vercauteren
Post-Quantum Cryptography – PQCrypto 2019, 271-285, 2019
422019
SCALLOP: Scaling the CSI‑FiSh
L De Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, ...
Public-Key Cryptography – PKC 2023, 345-375, 2023
41*2023
Supersingular Curves You Can Trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Eurocrypt 2023, 2022
352022
HILA5 Pindakaas: on the CCA security of lattice-based encryption with error correction
DJ Bernstein, L Groot Bruinderink, T Lange, L Panny
Progress in Cryptology – AFRICACRYPT 2018, 203-216, 2018
322018
Quantum Equivalence of the DLP and CDHP for Group Actions
S Galbraith, L Panny, B Smith, F Vercauteren
Mathematical Cryptology 1 (1), 40-44, 2021
272021
Foundational (co)datatypes and (co)recursion for higher-order logic
J Biendarra, JC Blanchette, A Bouzy, M Desharnais, M Fleury, J Hölzl, ...
Frontiers of Combining Systems – FroCoS 2017, 3-21, 2017
212017
How to not break SIDH
C Martindale, L Panny
CFAIL 2019, 2019
18*2019
Post-Quantum Cryptography: Current state and quantum mitigation
W Beullens, JP D'Anvers, AT Hülsing, T Lange, L Panny, ...
ENISA, 2021
172021
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic
JK Eriksen, L Panny, J Sotáková, M Veroni
Cryptology ePrint Archive, 2023
92023
Cryptography on isogeny graphs
L Panny
Ph.D. thesis, TU Eindhoven, 2021
72021
Disorientation faults in CSIDH
G Banegas, J Krämer, T Lange, M Meyer, L Panny, K Reijnders, ...
Eurocrypt 2023, 2022
62022
CSI‑FiSh really isn't polynomial-time
L Panny
blog post — https://yx7.cc/blah/2023-04-14.html, 2023
5*2023
SQIsign: Algorithm specifications and supporting documentation
J Chavez-Saab, M Corte-Real Santos, JK Eriksen, B Hess, D Kohel, ...
4*2023
Forging tropical signatures
L Panny
Cryptology ePrint Archive, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20