Peter Kutas

Dr.

20202023

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH

    Chen, M., Imran, M., Ivanyos, G., Kutas, P., Leroux, A. & Petit, C., 18 Dec 2023, Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III. Guo, J. & Steinfeld, R. (eds.). 1 ed. Singapore: Springer, Vol. 3. p. 99-130 31 p. (Lecture Notes in Computer Science; vol. 14440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Sanso, A., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 160-184 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    38 Downloads (Pure)
  • Improved torsion-point attacks on SIDH variants

    de Quehen, V., Kutas, P., Leonardi, C., Martindale, C., Panny, L., Petit, C. & Stange, K. E., 11 Aug 2021, Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings, Part III. Malkin, T. & Peikert, C. (eds.). Springer, p. 432-470 39 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    105 Downloads (Pure)
  • One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols

    Kutas, P., Merz, S-P., Petit, C. & Weitkaemper, C., 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I. Canteaut, A. & Standaert, F-X. (eds.). Springer, p. 242-271 30 p. (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    226 Downloads (Pure)
  • Séta: supersingular encryption from torsion attacks

    De Feo, L., Delpech de Saint Guilhem, C., Fouotsa, T. B., Kutas, P., Leroux, A., Petit, C., Silva, J. & Wesolowski, B., 1 Dec 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, 2021, Proceedings, Part 4. Tibouchi, M. & Wang, H. (eds.). 1 ed. Springer, p. 249-278 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13093 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    36 Downloads (Pure)
  • Trapdoor DDH groups from pairings and isogenies

    Kutas, P., Petit, C. & Silva, J., 21 Jul 2021, Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Springer, p. 431-450 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    163 Downloads (Pure)
  • 2020

    On adaptive attacks against Jao-Urbanik's isogeny-based protocol

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Weitkaemper, C., 5 Jul 2020, Progress in Cryptology - AFRICACRYPT 2020: 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings. Nitaj, A. & Youssef, A. (eds.). 1 ed. Springer, p. 195-213 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    29 Downloads (Pure)