default search action
Péter Kutas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski:
Finding orientations of supersingular elliptic curves and quaternion orders. Des. Codes Cryptogr. 92(11): 3447-3493 (2024) - [c13]Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-Based Signature Parameters. ACNS (1) 2024: 432-456 - [c12]Benjamin Bencina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper:
Improved Algorithms for Finding Fixed-Degree Isogenies Between Supersingular Elliptic Curves. CRYPTO (5) 2024: 183-217 - [i26]Farzin Renan, Péter Kutas:
SQIAsignHD: SQIsignHD Adaptor Signature. CoRR abs/2404.09026 (2024) - [i25]István András Seres, Péter Burcsi, Péter Kutas:
How (not) to hash into class groups of imaginary quadratic fields? IACR Cryptol. ePrint Arch. 2024: 34 (2024) - [i24]Farzin Renan, Péter Kutas:
SQIAsignHD: SQIsignHD Adaptor Signature. IACR Cryptol. ePrint Arch. 2024: 561 (2024) - [i23]Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, Aurel Page, Renate Scheidler, Márton Tot Bagi:
PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP. IACR Cryptol. ePrint Arch. 2024: 1744 (2024) - 2023
- [j6]Sándor Z. Kiss, Péter Kutas:
An identification system based on the explicit isomorphism problem. Appl. Algebra Eng. Commun. Comput. 34(6): 913-930 (2023) - [j5]Péter Kutas, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. IET Inf. Secur. 17(2): 161-170 (2023) - [c11]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH. ASIACRYPT (3) 2023: 99-130 - [c10]Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski:
SCALLOP: Scaling the CSI-FiSh. Public Key Cryptography (1) 2023: 345-375 - [i22]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. CoRR abs/2305.19897 (2023) - [i21]Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski:
SCALLOP: scaling the CSI-FiSh. IACR Cryptol. ePrint Arch. 2023: 58 (2023) - [i20]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. IACR Cryptol. ePrint Arch. 2023: 779 (2023) - [i19]David Jacquemin, Anisha Mukherjee, Sujoy Sinha Roy, Péter Kutas:
Towards a constant-time implementation of isogeny-based signature, SQISign. IACR Cryptol. ePrint Arch. 2023: 807 (2023) - [i18]Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski:
Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders. IACR Cryptol. ePrint Arch. 2023: 1268 (2023) - [i17]Benjamin Bencina, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Miha Stopar, Charlotte Weitkämper:
Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves. IACR Cryptol. ePrint Arch. 2023: 1618 (2023) - [i16]Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-based Signature Parameters. IACR Cryptol. ePrint Arch. 2023: 1906 (2023) - 2022
- [j4]José Gómez-Torrecillas, Péter Kutas, Francisco Javier Lobillo, Gabriel Navarro:
Primitive idempotents in central simple algebras over Fq(t) with an application to coding theory. Finite Fields Their Appl. 77: 101935 (2022) - [c9]Péter Kutas, Mickaël Montessinos, Gergely Zábrádi, Tímea Csahók:
Finding Nontrivial Zeros of Quadratic Forms over Rational Function Fields of Characteristic 2. ISSAC 2022: 235-244 - [c8]Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti:
On the Isogeny Problem with Torsion Point Information. Public Key Cryptography (1) 2022: 142-161 - [i15]Péter Kutas, Christophe Petit:
Torsion point attacks on "SIDH-like" cryptosystems. IACR Cryptol. ePrint Arch. 2022: 654 (2022) - 2021
- [c7]Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso:
Cryptanalysis of an Oblivious PRF from Supersingular Isogenies. ASIACRYPT (1) 2021: 160-184 - [c6]Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski:
Séta: Supersingular Encryption from Torsion Attacks. ASIACRYPT (4) 2021: 249-278 - [c5]Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Improved Torsion-Point Attacks on SIDH Variants. CRYPTO (3) 2021: 432-470 - [c4]Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols. EUROCRYPT (1) 2021: 242-271 - [i14]Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz:
On the Isogeny Problem with Torsion Point Information. IACR Cryptol. ePrint Arch. 2021: 153 (2021) - [i13]Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols. IACR Cryptol. ePrint Arch. 2021: 282 (2021) - [i12]Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso:
Cryptanalysis of an oblivious PRF from supersingular isogenies. IACR Cryptol. ePrint Arch. 2021: 706 (2021) - 2020
- [c3]Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol. AFRICACRYPT 2020: 195-213 - [c2]Péter Kutas, Christophe Petit, Javier Silva:
Trapdoor DDH Groups from Pairings and Isogenies. SAC 2020: 431-450 - [i11]Péter Kutas, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Weak instances of SIDH variants under improved torsion-point attacks. CoRR abs/2005.14681 (2020) - [i10]José Gómez-Torrecillas, Péter Kutas, Francisco Javier Lobillo, Gabriel Navarro:
Primitive idempotents in central simple algebras over Fq(t) with an application to coding theory. CoRR abs/2006.12116 (2020) - [i9]Tímea Csahók, Péter Kutas, Gergely Zábrádi:
Algorithmic applications of the corestriction of central simple algebras. CoRR abs/2007.06981 (2020) - [i8]Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol. IACR Cryptol. ePrint Arch. 2020: 244 (2020) - [i7]Péter Kutas, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Weak instances of SIDH variants under improved torsion-point attacks. IACR Cryptol. ePrint Arch. 2020: 633 (2020)
2010 – 2019
- 2019
- [j3]Gábor Ivanyos, Péter Kutas, Lajos Rónyai:
Explicit equivalence of quadratic forms over Fq(t). Finite Fields Their Appl. 55: 33-63 (2019) - [j2]Péter Kutas:
Splitting quaternion algebras over quadratic number fields. J. Symb. Comput. 94: 173-182 (2019) - [i6]Péter Kutas, Christophe Petit, Javier Silva:
Trapdoor DDH groups from pairings and isogenies. IACR Cryptol. ePrint Arch. 2019: 1290 (2019) - [i5]Cyprien Delpech de Saint Guilhem, Péter Kutas, Christophe Petit, Javier Silva:
SÉTA: Supersingular Encryption from Torsion Attacks. IACR Cryptol. ePrint Arch. 2019: 1291 (2019) - 2018
- [j1]Gábor Ivanyos, Péter Kutas, Lajos Rónyai:
Computing Explicit Isomorphisms with Full Matrix Algebras over Fq(x). Found. Comput. Math. 18(2): 381-397 (2018) - [i4]Sándor Z. Kiss, Péter Kutas:
An identification system based on the explicit isomorphism problem. CoRR abs/1812.09130 (2018) - 2016
- [i3]Péter Kutas:
Splitting quaternion algebras over quadratic number fields. CoRR abs/1606.01053 (2016) - [i2]Gábor Ivanyos, Péter Kutas, Lajos Rónyai:
Explicit equivalence of quadratic forms over $\mathbb{F}_q(t)$. CoRR abs/1610.08671 (2016) - 2015
- [c1]Péter Kutas:
Some Results Concerning the Explicit Isomorphism Problem over Number Fields. MACIS 2015: 143-148 - [i1]Gábor Ivanyos, Péter Kutas, Lajos Rónyai:
Computing explicit isomorphisms with full matrix algebras over $\mathbb{F}_q(x)$. CoRR abs/1508.07755 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint