Peter Kutas
@kutasp
Followers
382
Following
679
Media
1
Statuses
483
I wrote a bit about X’s new encrypted DMs and the Juicebox protocol.
blog.cryptographyengineering.com
Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about T…
3
29
94
If you've been following the quantum thing, you've heard that *lattice-based crypto* is going to protect us against quantum attack. But what are they? And why are the keys so big? Why do we think they're secure? @cjpatton_ wrote a great blog featuring special guest @cryptojedi
An intro to lattice crypto and the published NIST standards for non-cryptographers who find themselves involved in the PQ transition. Thanks to @cryptojedi for the assist :) https://t.co/XzqGZeRCH4
1
4
25
[New] PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies (Pierrick Dartois and Jonathan Komada Eriksen and Tako Boris Fouotsa and Arthur Herldan Le Merdy and Riccardo Invernizzi and Damien Robert and Ryan Rueger and Frederik ...
eprint.iacr.org
In this paper, we present the first practical algorithm to compute an effective group action of the class group of any imaginary quadratic order $\mathcal{O}$ on a set of supersingular elliptic...
0
4
5
16th International Conference on Cryptology AFRICACRYPT 2025 July 21-23, 2025 – Rabat, Morocco 🇲🇦 Extended submission deadline in 1 week: https://t.co/WRpwR9ibP9 Submit your best results ! See you in Rabat 🇲🇦 in July 2025.
0
2
6
We are organizing the 2025 edition of the Central European Crypology conference (CECC 2025) in Budapest, looking forward to you submissions (you only need to submit an extended abstract). Every info on the webpage:
cecc2025.inf.elte.hu
Central European Conference on Cryptology 2025
1
2
8
[New] PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies (Andrea Basso and Giacomo Borin and Wouter Castryck and Maria Corte-Real Santos and Riccardo Invernizzi and Antonin Leroux and Luciano Maino and Frederik Ve...
eprint.iacr.org
The problem of computing an isogeny of large prime degree from a supersingular elliptic curve of unknown endomorphism ring is assumed to be hard both for classical as well as quantum computers. In...
0
4
2
Introducing new crypto assumptions is always tricky. Join us to learn about the rough order assumption from @asanso! Three Little Stories on 3-Torsion: A Journey Through Algebraic Insights in the 3-Torsion of Class Groups ⏰Dec 10th 10:15AM (CET) 🔗 https://t.co/GuOWR2j9x4
0
4
8
A cool new lattice visualization tool from my colleague Kate Stange: https://t.co/JJeAQyaH4B. She also has a bunch of other cool crypto/math demos on the same site.
0
2
12
New preprint up! "PatternBoost: Constructions in Mathematics with a Little Help from AI," with F. Charton, A.Z. Wagner, and G. Williamson:
arxiv.org
We introduce PatternBoost, a flexible method for finding interesting constructions in mathematics. Our algorithm alternates between two phases. In the first ``local'' phase, a classical search...
5
29
152
[Revised] Verifiable random function from the Deuring correspondence and higher dimensional isogenies (Antonin Leroux)
eprint.iacr.org
In this paper, we introduce $\mathsf{DeuringVUF}$, a new Verifiable Unpredictable Function (VUF) protocol based on isogenies between supersingular curves. The most interesting application of this VUF...
0
1
3
Gioella Lorenzon and Riccardo Invernizzi wrote a blog post on Benjamin Wesolowski’s introductory talk “Foundations of isogeny-based cryptography”, presented at the Math PQC conference in Budapest. Photo credit: @BenjWeso
https://t.co/aHNexroqmY
0
3
13
[New] Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$ (Ryo Yoshizumi and Hiroshi Onuki and Ryo Ohashi and Momonari Kudo and Koji Nuida)
eprint.iacr.org
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. Recently, many isogeny-based cryptosystems using isogenies between Kummer surfaces were proposed. Most of those...
0
2
6
Dear academics and non-academics, I’d love to give a modest talk called "Three Little Stories on 3-Torsion"! 🎉 I'll cover insights from https://t.co/xWsDcrMMHL,
https://t.co/UbDHXp6pNW, and a new little cute result. Interested in some fun cryptography and math? Let’s chat! 😄
eprint.iacr.org
This paper introduces an algorithm to efficiently break the Decisional Diffie-Hellman (DDH) assumption in totally non-maximal imaginary quadratic orders, specifically when $\Delta_1 = 3$, and $f$ is...
1
3
18
[New] Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies (Giacomo Borin and Yi-Fu Lai and Antonin Leroux)
eprint.iacr.org
We construct two efficient post-quantum ring signatures with anonymity against full key exposure from isogenies, addressing limitations of existing isogeny-based ring signatures. First, we present an...
0
8
12
Solving TSP is easy. Solving TSP in polynomial time is hard and this paper does not claim that (there is a mention about a polynomial speed-up but that is not that important )
0
3
3
the point is that you don't need to wait for a QC before PQcrypto becomes relevant. If someone stores all the communications today (easy!) and gets access to a QC in 20-30 years, they will be able to decrypt everything then. This is an issue for data that need to remain secret.
1
3
22
"Pretend that you're Hercule Poirot: Examine all clues, and deduce the truth by order and method." error message by Overleaf ...
0
0
7