Lorenz Panny

According to our database1, Lorenz Panny authored at least 27 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Evaluation of Modular Polynomials from Supersingular Elliptic Curves.
IACR Cryptol. ePrint Arch., 2025

On breaking McEliece keys using brute force.
IACR Cryptol. ePrint Arch., 2025

KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies.
IACR Commun. Cryptol., 2025

2024
SCALLOP-HD: Group Action from 2-Dimensional Isogenies.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Isogeny Problems with Level Structure.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Forging Tropical Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic.
IACR Cryptol. ePrint Arch., 2023

SCALLOP: Scaling the CSI-FiSh.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

A Direct Key Recovery Attack on SIDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Supersingular Curves You Can Trust.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Disorientation Faults in CSIDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms.
Proceedings of the Advances in Information and Computer Security, 2022

2021
Entropoid-based cryptography is group exponentiation in disguise.
IACR Cryptol. ePrint Arch., 2021

Improved Torsion-Point Attacks on SIDH Variants.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Weak instances of SIDH variants under improved torsion-point attacks.
IACR Cryptol. ePrint Arch., 2020

Rational Isogenies from Irrational Endomorphisms.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Guess what?! On the impossibility of unconditionally secure public-key encryption.
IACR Cryptol. ePrint Arch., 2019

Isogeny-based hashing despite known endomorphisms.
IACR Cryptol. ePrint Arch., 2019

How to not break SIDH.
IACR Cryptol. ePrint Arch., 2019

Faster SeaSign Signatures Through Improved Rejection Sampling.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Quantum Equivalence of the DLP and CDHP for Group Actions.
IACR Cryptol. ePrint Arch., 2018

CSIDH: An Efficient Post-Quantum Commutative Group Action.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Foundational (Co)datatypes and (Co)recursion for Higher-Order Logic.
Proceedings of the Frontiers of Combining Systems - 11th International Symposium, 2017

2016
Autocorrelation-Based Detection of Infinite Loops at Runtime.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2014
Truly Modular (Co)datatypes for Isabelle/HOL.
Proceedings of the Interactive Theorem Proving - 5th International Conference, 2014


  Loading...