documents

Research papers and talks.

articles

  1. Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic
    Jonathan Komada Eriksen, Lorenz Panny, Jana Sotáková, and Mattia Veroni. 2023.
    eprint
  2. SCALLOP: scaling the CSI‑FiSh
    Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, and Benjamin Wesolowski. PKC 2023. 2023.
    eprint
  3. Supersingular Curves You Can Trust
    Andrea Basso, Giulio Codogni, Deirdre Connolly, Luca De Feo, Tako Boris Fouotsa, Guido Maria Lido, Travis Morrison, Lorenz Panny, Sikhar Patranabis, and Benjamin Wesolowski. 2022.
    eprint
  4. Disorientation faults in CSIDH
    Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders, Jana Sotáková, and Monika Trimoska. 2022.
    eprint
  5. Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms
    Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, and Bo-Yin Yang. IWSEC 2022, Springer LNCS #13504. 2022.
    eprint slides
  6. Entropoids: Groups in Disguise
    Lorenz Panny. MathCrypt 2021 (poster presentation). 2021.
    eprint slides
  7. Improved torsion-point attacks on SIDH variants
    Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, and Katherine E. Stange. CRYPTO 2021, Springer LNCS #12828. 2020.
    eprint
  8. Guess what?! On the impossibility of unconditionally secure public-key encryption
    Lorenz Panny. Mathematical Cryptology 0(1), 2020, pp. 1–7. 2019.
    eprint
  9. Rational isogenies from irrational endomorphisms
    Wouter Castryck, Lorenz Panny, and Frederik Vercauteren. EUROCRYPT 2020, Springer LNCS #12106. 2019.
    eprint slides
  10. Isogeny-based hashing despite known endomorphisms
    Lorenz Panny. 2019.
    eprint
  11. How to not break SIDH
    Chloe Martindale and Lorenz Panny. CFAIL 2019. 2019.
    eprint slides
  12. Quantum Equivalence of the DLP and CDHP for Group Actions
    Steven Galbraith, Lorenz Panny, Benjamin Smith, and Frederik Vercauteren. Mathematical Cryptology 1(1), 2021, pp. 40–44. 2018.
    eprint
  13. Faster SeaSign signatures through improved rejection sampling
    Thomas Decru, Lorenz Panny, and Frederik Vercauteren. PQCrypto 2019, Springer LNCS #11505. 2018.
    eprint
  14. Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
    Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny. EUROCRYPT 2019, Springer LNCS #11477. 2018.
    eprint website
  15. CSIDH: An Efficient Post-Quantum Commutative Group Action
    Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. ASIACRYPT 2018, Springer LNCS #11274. 2018.
    eprint website code slides
  16. HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction
    Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, and Lorenz Panny. AFRICACRYPT 2018, Springer LNCS #10831. 2017.
    eprint code slides
  17. Foundational (co)datatypes and (co)recursion for higher-order logic
    Julian Biendarra, Jasmin Christian Blanchette, Aymeric Bouzy, Martin Desharnais, Mathias Fleury, Johannes Hölzl, Ondřej Kunčar, Andreas Lochbihler, Fabian Meier, Lorenz Panny, Andrei Popescu, Christian Sternagel, René Thiemann, and Dmitriy Traytel. FroCoS 2017, Springer LNCS #10483. 2017.
    pdf
  18. Autocorrelation-Based Detection of Infinite Loops at Runtime
    Andreas Ibing, Julian Kirsch, and Lorenz Panny. DASC 2016, IEEE. 2016.
    pdf
  19. Truly modular (co)datatypes for Isabelle/HOL
    Jasmin Christian Blanchette, Johannes Hölzl, Andreas Lochbihler, Lorenz Panny, Andrei Popescu, and Dmitriy Traytel. ITP 2014, Springer LNCS #8558. 2014.
    pdf
  20. Primitively (co)recursive definitions for Isabelle/HOL
    Lorenz Panny, Jasmin Christian Blanchette, and Dmitriy Traytel. Isabelle Workshop 2014.
    pdf slides

blurbs

slides

theses