Follow
Lorenz Panny
Lorenz Panny
Technische Universität München
Verified email at yx7.cc - Homepage
Title
Cited by
Cited by
Year
CSIDH: an efficient post-quantum commutative group action
W Castryck, T Lange, C Martindale, L Panny, J Renes
Advances in Cryptology – ASIACRYPT 2018, 395-427, 2018
6472018
A direct key recovery attack on SIDH
L Maino, C Martindale, L Panny, G Pope, B Wesolowski
Advances in Cryptology – EUROCRYPT 2023, 448-471, 2023
1262023
Truly modular (co)datatypes for Isabelle/HOL
JC Blanchette, J Hölzl, A Lochbihler, L Panny, A Popescu, D Traytel
Interactive Theorem Proving — ITP 2014, 93-110, 2014
1252014
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
DJ Bernstein, T Lange, C Martindale, L Panny
Advances in Cryptology – EUROCRYPT 2019, 409-441, 2019
912019
Improved torsion-point attacks on SIDH variants
V de Quehen, P Kutas, C Leonardi, C Martindale, L Panny, C Petit, ...
Advances in Cryptology – CRYPTO 2021, 432-470, 2021
72*2021
Rational isogenies from irrational endomorphisms
W Castryck, L Panny, F Vercauteren
Advances in Cryptology – EUROCRYPT 2020, 523-548, 2020
572020
Supersingular Curves You Can Trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Eurocrypt 2023, 2022
482022
SCALLOP: Scaling the CSI‑FiSh
L De Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, ...
Public-Key Cryptography – PKC 2023, 345-375, 2023
47*2023
Faster SeaSign signatures through improved rejection sampling
T Decru, L Panny, F Vercauteren
Post-Quantum Cryptography – PQCrypto 2019, 271-285, 2019
422019
HILA5 Pindakaas: on the CCA security of lattice-based encryption with error correction
DJ Bernstein, L Groot Bruinderink, T Lange, L Panny
Progress in Cryptology – AFRICACRYPT 2018, 203-216, 2018
352018
Quantum Equivalence of the DLP and CDHP for Group Actions
S Galbraith, L Panny, B Smith, F Vercauteren
Mathematical Cryptology 1 (1), 40-44, 2021
282021
Foundational (co)datatypes and (co)recursion for higher-order logic
J Biendarra, JC Blanchette, A Bouzy, M Desharnais, M Fleury, J Hölzl, ...
Frontiers of Combining Systems – FroCoS 2017, 3-21, 2017
202017
Post-Quantum Cryptography: Current state and quantum mitigation
W Beullens, JP D'Anvers, AT Hülsing, T Lange, L Panny, ...
ENISA, 2021
182021
How to not break SIDH
C Martindale, L Panny
CFAIL 2019, 2019
18*2019
SCALLOP-HD: group action from 2-dimensional isogenies
M Chen, A Leroux, L Panny
IACR International Conference on Public-Key Cryptography, 190-216, 2024
162024
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic.
JK Eriksen, L Panny, J Sotáková, M Veroni
IACR Cryptol. ePrint Arch. 2023, 106, 2023
102023
SQIsign: Algorithm specifications and supporting documentation
J Chavez-Saab, M Corte-Real Santos, JK Eriksen, B Hess, D Kohel, ...
10*2023
Cryptography on isogeny graphs
L Panny
Ph.D. thesis, TU Eindhoven, 2021
102021
Disorientation faults in CSIDH
G Banegas, J Krämer, T Lange, M Meyer, L Panny, K Reijnders, ...
Eurocrypt 2023, 2022
92022
CSI‑FiSh really isn't polynomial-time
L Panny
blog post — https://yx7.cc/blah/2023-04-14.html, 2023
6*2023
The system can't perform the operation now. Try again later.
Articles 1–20