Volgen
Hiroshi Onuki
Hiroshi Onuki
Geverifieerd e-mailadres voor mist.i.u-tokyo.ac.jp
Titel
Geciteerd door
Geciteerd door
Jaar
(Short paper) a faster constant-time algorithm of CSIDH keeping two points
H Onuki, Y Aikawa, T Yamazaki, T Takagi
Advances in Information and Computer Security: 14th International Workshop …, 2019
582019
On oriented supersingular elliptic curves
H Onuki
Finite Fields and Their Applications 69, 101777, 2021
572021
SiGamal: a supersingular isogeny-based PKE and its application to a PRF
T Moriya, H Onuki, T Takagi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
512020
QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras
K Nakagawa, H Onuki
Annual International Cryptology Conference, 75-106, 2024
272024
How to construct CSIDH on Edwards curves
T Moriya, H Onuki, T Takagi
Finite Fields and Their Applications 92, 102310, 2023
262023
SQIsign2D-East: A new signature scheme using 2-dimensional isogenies
K Nakagawa, H Onuki, W Castryck, M Chen, R Invernizzi, G Lorenzon, ...
International Conference on the Theory and Application of Cryptology and …, 2024
232024
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks
F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger
2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020
212020
L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space
K Nakagawa, H Onuki, A Takayasu, T Takagi
Discrete Applied Mathematics 328, 70-88, 2023
172023
Radical isogenies on Montgomery curves
H Onuki, T Moriya
IACR International Conference on Public-Key Cryptography, 473-497, 2022
172022
On collisions related to an ideal class of order 3 in CSIDH
H Onuki, T Takagi
International Workshop on Security, 131-148, 2020
172020
A constant-time algorithm of CSIDH keeping two points
H Onuki, Y Aikawa, T Yamazaki, T Takagi
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2020
152020
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
H Onuki, K Nakagawa
International Conference on the Theory and Application of Cryptology and …, 2024
132024
The existence of cycles in the supersingular isogeny graphs used in SIKE
H Onuki, Y Aikawa, T Takagi
2020 International Symposium on Information Theory and Its Applications …, 2020
122020
The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography
T Moriya, H Onuki, Y Aikawa, T Takagi
Cryptology ePrint Archive, 2022
82022
The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets
H Onuki, T Teruya, N Kanayama, S Uchiyama
JSIAM Letters 8, 9-12, 2016
52016
The wrong use of FESTA trapdoor functions leads to an adaptive attack
T Moriya, H Onuki
Cryptology ePrint Archive, 2023
42023
Faster explicit formulae for computing pairings via elliptic nets and their parallel computation
H Onuki, T Teruya, N Kanayama, S Uchiyama
Advances in Information and Computer Security: 11th International Workshop …, 2016
42016
Computing Richelot isogeny graph of superspecial abelian threefolds
R Ohashi, H Onuki, M Kudo, R Yoshizumi, K Nuida
arXiv e-prints, arXiv: 2401.10500, 2024
22024
Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three
H Onuki
Finite Fields and Their Applications 99, 102490, 2024
12024
Efficient theta-based algorithms for computing -isogenies on Kummer surfaces for arbitrary odd
R Yoshizumi, H Onuki, R Ohashi, M Kudo, K Nuida
Cryptology ePrint Archive, 2024
12024
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20