Péter Kutas

Orcid: 0000-0002-2043-9542

According to our database1, Péter Kutas authored at least 40 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Gentle Introduction to Blind signatures: From RSA to Lattice-based Cryptography.
CoRR, September, 2025

Constant time lattice reduction in dimension 4 with application to SQIsign.
IACR Cryptol. ePrint Arch., 2025

Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs.
IACR Cryptol. ePrint Arch., 2025

KLPT²: Algebraic Pathfinding in Dimension Two and Applications.
IACR Cryptol. ePrint Arch., 2025

Faster SCALLOP from Non-prime Conductor Suborders in Medium Sized Quadratic Fields.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

How (Not) to Hash into Class Groups of Imaginary Quadratic Fields?
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

KLPT<sup>2</sup>: Algebraic Pathfinding in Dimension Two and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

poqeth: Efficient, post-quantum signature verification on Ethereum.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

Simple Power Analysis Attack on SQIsign.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025

Constant-Time Integer Arithmetic for SQIsign.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025

2024
SQIAsignHD: SQIsignHD Adaptor Signature.
IACR Cryptol. ePrint Arch., 2024

PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP.
IACR Cryptol. ePrint Arch., 2024

Improved Algorithms for Finding Fixed-Degree Isogenies Between Supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Exploring SIDH-Based Signature Parameters.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
An identification system based on the explicit isomorphism problem.
Appl. Algebra Eng. Commun. Comput., November, 2023

Towards a constant-time implementation of isogeny-based signature, SQISign.
IACR Cryptol. ePrint Arch., 2023

Finding Orientations of Supersingular Elliptic Curves and Quaternion Orders.
IACR Cryptol. ePrint Arch., 2023

SCALLOP: Scaling the CSI-FiSh.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Torsion point attacks on "SIDH-like" cryptosystems.
IACR Cryptol. ePrint Arch., 2022

Primitive idempotents in central simple algebras over Fq(t) with an application to coding theory.
Finite Fields Their Appl., 2022

On the Isogeny Problem with Torsion Point Information.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Finding Nontrivial Zeros of Quadratic Forms over Rational Function Fields of Characteristic 2.
Proceedings of the ISSAC '22: International Symposium on Symbolic and Algebraic Computation, Villeneuve-d'Ascq, France, July 4, 2022

2021
On the Isogeny Problem with Torsion Point Information.
IACR Cryptol. ePrint Arch., 2021

One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Improved Torsion-Point Attacks on SIDH Variants.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Séta: Supersingular Encryption from Torsion Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Cryptanalysis of an Oblivious PRF from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Weak instances of SIDH variants under improved torsion-point attacks.
IACR Cryptol. ePrint Arch., 2020

Algorithmic applications of the corestriction of central simple algebras.
CoRR, 2020

Primitive idempotents in central simple algebras over F<sub>q</sub>(t) with an application to coding theory.
CoRR, 2020

Trapdoor DDH Groups from Pairings and Isogenies.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Splitting quaternion algebras over quadratic number fields.
J. Symb. Comput., 2019

SÉTA: Supersingular Encryption from Torsion Attacks.
IACR Cryptol. ePrint Arch., 2019

Explicit equivalence of quadratic forms over Fq(t).
Finite Fields Their Appl., 2019

2018
Computing Explicit Isomorphisms with Full Matrix Algebras over F<sub>q</sub>(x).
Found. Comput. Math., 2018

2016
Explicit equivalence of quadratic forms over $\mathbb{F}_q(t)$.
CoRR, 2016

2015
Computing explicit isomorphisms with full matrix algebras over $\mathbb{F}_q(x)$.
CoRR, 2015

Some Results Concerning the Explicit Isomorphism Problem over Number Fields.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2015


  Loading...