(Short Paper) a faster constant-time algorithm of CSIDH keeping two points H Onuki, Y Aikawa, T Yamazaki, T Takagi
Advances in Information and Computer Security: 14th International Workshop …, 2019
47 2019 SiGamal: a supersingular isogeny-based PKE and its application to a PRF T Moriya, H Onuki, T Takagi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
42 2020 On oriented supersingular elliptic curves H Onuki
Finite Fields and Their Applications 69, 101777, 2021
39 2021 How to construct CSIDH on Edwards curves T Moriya, H Onuki, T Takagi
Finite Fields and Their Applications 92, 102310, 2023
23 2023 Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger
2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020
15 2020 L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space K Nakagawa, H Onuki, A Takayasu, T Takagi
Discrete Applied Mathematics 328, 70-88, 2023
14 2023 A constant-time algorithm of CSIDH keeping two points H Onuki, Y Aikawa, T Yamazaki, T Takagi
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2020
14 2020 On collisions related to an ideal class of order 3 in CSIDH H Onuki, T Takagi
International Workshop on Security, 131-148, 2020
14 2020 Radical isogenies on Montgomery curves H Onuki, T Moriya
IACR International Conference on Public-Key Cryptography, 473-497, 2022
12 2022 The existence of cycles in the supersingular isogeny graphs used in SIKE H Onuki, Y Aikawa, T Takagi
2020 International Symposium on Information Theory and Its Applications …, 2020
12 2020 QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras K Nakagawa, H Onuki
Cryptology ePrint Archive, 2023
9 2023 The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography T Moriya, H Onuki, Y Aikawa, T Takagi
Cryptology ePrint Archive, 2022
7 2022 The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets H Onuki, T Teruya, N Kanayama, S Uchiyama
JSIAM Letters 8, 9-12, 2016
5 2016 The wrong use of FESTA trapdoor functions leads to an adaptive attack T Moriya, H Onuki
Cryptology ePrint Archive, 2023
4 2023 Faster explicit formulae for computing pairings via elliptic nets and their parallel computation H Onuki, T Teruya, N Kanayama, S Uchiyama
Advances in Information and Computer Security: 11th International Workshop …, 2016
3 2016 Computing Richelot isogeny graph of superspecial abelian threefolds R Ohashi, H Onuki, M Kudo, R Yoshizumi, K Nuida
arXiv preprint arXiv:2401.10500, 2024
1 2024 Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three H Onuki
arXiv preprint arXiv:2211.15137, 2022
1 2022 Explicit construction of the square-root Vélu's formula on Edwards curves S Takahashi, H Onuki, T Takagi
JSIAM Letters 14, 108-110, 2022
1 2022 Lower bound of costs of formulas to compute image curves of -isogenies in the framework of generalized Montgomery coordinates T Moriya, H Onuki, Y Aikawa, T Takagi
Cryptology ePrint Archive, 2023
2023 Improvement of the square-root Vélu's formulas for isogeny-based cryptography S Otsuki, H Onuki, T Takagi
JSIAM Letters 15, 61-64, 2023
2023