Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi, and Hiroshi Onuki, "Faster CGL hash function via reduced backtracking checks", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2025CIP0002, 2025. [Link].
Ryo Ohashi, Hiroshi Onuki, Momonari Kudo, Ryo Yoshizumi, and Koji Nuida, "Listing superspecial curves of genus three using Richelot isogeny graphs", Res, number theory 11, 76, 2025. [Link] [arXiv].
Kaito Sato, Hiroshi Onuki and Tsuyoshi Takagi, "Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography", JSIAM Letters Vol 16, pp. 65-68, 2024. [Link]
Hiroshi Onuki, "Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three", Finite Fields and Their Applications Vol. 99, Article 102490, 2024. [Link].
Tomoki Moriya, Hiroshi Onuki and Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", Finite Fields and Their Applications Vol. 92, Article 102310, 2023. [Link]
Saki Otsuki, Hiroshi Onuki, Tsuyoshi Takagi, "Improvement of the square-root Vélu's formulas for isogeny-based cryptography", JSIAM Letters Vol. 15, pp. 61-64, 2023. [Link]
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, and Tsuyoshi Takagi, "L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space", Discrete Applied Mathematics Vol. 328, pp. 70-88, March 2023. [Link], [ePrint].
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography", Mathematical Cryptology Vol. 2(1), pp. 36-59, 2022. [Link], [ePrint].
Shu Takahashi, Hiroshi Onuki, Tsuyoshi Takagi, "Explicit construction of the square-root Vélu's formula on Edwards curves", JSIAM Letters Vol. 14, pp. 108-110, 2022. [Link]
Hiroshi Onuki, "On oriented supersingular elliptic curves", Finite Fields and Their Applications Vol. 69, Article 101777, 2021. [Link], [arXiv]
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "A Constant-time Algorithm of CSIDH keeping Two Points", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol.E103-A No.10 pp. 1174-1182, 2020. [Link]
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets". JSIAM Letters Vol. 8, pp. 9–12, 2016. [Link]
Ryo Ohashi and Hiroshi Onuki, "An efficient collision attack on Castryck-Decru-Smith's hash function", PQCrypto 2025, LNCS 15578, pp. 89-118, 2025. [Springer], [ePrint].
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida, "Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$", PQCrypto 2025, LNCS 15578, pp. 3-37, 2025. [Springer], [ePrint].
Hiroshi Onuki, Kohei Nakagawa, "Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign", ASIACRYPT 2024, LNCS 15486, pp. 243-271, 2024. [Springer], [ePrint].
Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, and Frederik Vercauteren, "SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies" ASIACRYPT 2024, LNCS 15486, pp. 272-303, 2024. [Springer].
Kohei Nakagawa and Hiroshi Onuki, "QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras", Crypto 2024, LNCS 14924, pp. 75-106, 2024. [Springer], [ePrint].
Tomoki Moriya, Hiroshi Onuki, Maozhi Xu, and Guoqing Zhou, "Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation", PQCrypto 2024, LNCS 14772, pp. 3-19, 2024. [Springer].
Hiroshi Onuki, "On the key generation in SQISign", Banach Center Publication Vol. 126 Number-Theoretic Methods in Cryptology, pp. 89-104, 2023. [Link] [ePrint].
Hiroshi Onuki, Tomoki Moriya, "Radical Isogenies on Montgomery Curves", PKC 2022. LNCS 13177, pp. 473-497, 2022. [Springer], [ePrint].
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "SiGamal: A supersingular isogeny-based PKE and its application to a PRF", ASIACRYPT 2020. LNCS 12492, pp. 551-580, 2020. [Springer], [ePrint].
Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE", ISITA 2020, pp. 358-362, 2020 [IEEE], [ePrint].
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, and Marc Stöttinger, "Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks", FDTC 2020, Vol 1, pp. 57-65, 2020. [Link] [ePrint]
Hiroshi Onuki and Tsuyoshi Takagi, "On collisions related to an ideal class of order 3 in CSIDH", IWSEC 2020, LNCS 12231, pp. 131-148, 2020. [Springer], [ePrint].
Tomoki Moriya, Hiroshi Onuki and Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", CT-RSA 2020, LNCS 12006, pp. 512–537, 2020. [Springer], [ePrint].
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, and Tsuyoshi Takagi, "(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points", IWSEC 2019, LNCS 11689, pp. 23–33, 2019. [Springer], [ePrint (full ver.)].
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation", IWSEC 2016, LNCS 9836, pp 319-334, 2016. [Springer]
Hiroshi Onuki, "A Survey of Attacks on Supersingular Isogeny with Torsion Problem and Its Variants", Mathematical Foundations for Post-Quantum Cryptography. Mathematics for Industry, vol 40, 2025. [Link].
Hiroshi Onuki, "OSIDH and SiGamal : cryptosystems from supersingular elliptic curves", RIMS Kokyuroku Bessatsu B90 (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties), pp. 117-129, 2022.
Kohei Nakagawa and Hiroshi Onuki, "Attacks on PRISM-id via Torsion over Small Extension Fields", IACR ePrint 2025/1602.
Kohei Nakagawa and Hiroshi Onuki, "SQIsign2DPusht: Faster Signature Scheme Using 2-Dimensional Isogenies", IACR ePrint 2025/897.
Kohei Nakagawa and Hiroshi Onuki, "SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies", IACR ePrint 2024/771.
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates", IACR ePrint 2023/1511.
Tomoki Moriya and Hiroshi Onuki, "The wrong use of FESTA trapdoor functions leads to an adaptive attack", IACR ePrint 2023/1092.
Kohei Nakagwa and Hiroshi Onuki, "Attacks on PRISM-id via Torsion over Small Extension Fields", Computer Security Symposium 2025 (CSS 2025), October 2025.
Ryo Ohashi and Hiroshi Onuki, "A collision attack on the LTZ hash function based on a conjecture on supersingular non-superspecial isogeny graphs of dimension 2", Computer Security Symposium 2025 (CSS 2025), October 2025.
Kohei Nakagawa and Hiroshi Onuki, "Faster and Safer Signature Scheme Using 2-Dimensional Isogenies", Symposium on Cryptography and Information Security (SCIS 2025), January 2025.
Ryo Ohashi and Hiroshi Onuki, "An efficient collision attack on CDS hash function", Symposium on Cryptography and Information Security (SCIS 2025), January 2025.
Masaomi Shibata, Hiroshi Onuki, and Tsuyoshi Takagi, "A 3-Radical Isogenies Formula for Elliptic Curves Isogenous to Their Galois Conjugate", Symposium on Cryptography and Information Security (SCIS 2025), January 2025.
Kohei Nakagawa and Hiroshi Onuki, "SQisign2DPush: Faster and Safer Signature Scheme Using 2-Dimensional Isogenies", Computer Security Symposium 2024 (CSS 2024), October 2024.
Masaomi Shibata, Hiroshi Onuki, and Tsuyoshi Takagi, "Time-Memory Trade-off in Exhaustive Search for a Path in a Supersingular Isogeny Graph over Fp", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida, "Construction of Castryck-Decru attack for B-SIDH and its implementation", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Ryo Ohashi and Hiroshi Onuki, "Construction of a hash function using superspecial abelian 3-folds", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Kohei Nakagawa and Hiroshi Onuki, "SQIsign2D: A New Signature Scheme Using 2-dimensional Isogenies", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Hiroshi Onuki, "Modular polynomials for enhanced elliptic curves", Symposium on Cryptography and Information Security (SCIS 2023), January 2023.
Kazumaro Aoki, Saki Otsuki, Hiroshi Onuki, and Tsuyoshi Takagi, "Can NFS Implementation Find Twin Smooth Primes?", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Saki Otsuki, Kazumaro Aoki, Hiroshi Onuki, and Tsuyoshi Takagi, "Computational Estimation of B-SIDH by Experiments and Condition of Good Prime Number", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The minimal cost of operations on 3-isogeny computation via x-coordinates of Montgomery curves", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Koichiro Akiyama, Yasuhiko Ikematsu, Hiroshi Onuki, Koji Nuida, and Tsuyoshi Takagi, "近似イデアルGCD問題に基づく不定方程式暗号", Symposium on Cryptography and Information Security (SCIS 2021), January 2021.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "Edwards曲線における高速な高次の同種写像計算方式", Symposium on Cryptography and Information Security (SCIS 2021), January 2021.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "同種写像による点の像の判定困難性に基づく公開鍵暗号方式", 日本応用数理学会2020年度年会 予稿集, pp. 72-73, 2020.
Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "次数固定同種写像問題と関連した問題群の計算帰着について", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "同種写像暗号CSIDHのEdwards曲線のw座標による構成について", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, and Tsuyoshi Takagi, "同種写像暗号CSIDHにおける最適な秘密鍵空間の考察", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Hiroshi Onuki and Tsuyoshi Takagi, "On Collisions Related to an Ideal Class of Order 3 in CSIDH", コンピュータセキュリティシンポジウム2019論文集, pp. 408-414, 2019. [Link]
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, and Tsuyoshi Takagi, "同種写像暗号CSIDHの計算量評価と高速化パラメータ", Symposium on Cryptography and Information Security (SCIS 2019), January 2019.
Hiroshi Onuki, "Q(sqrt{−23})に虚数乗法を持つ楕円曲線を用いた特別な整数に対する素数証明アルゴリズム", 日本応用数理学会2018年度年会 予稿集, pp. 449-450, 2018.
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "Optimal ate pairing のelliptic net による並列計算", Symposium on Cryptography and Information Security (SCIS 2016), January 2016.
"四元数と同種写像暗号", 数学セミナー2025年2月号, pp. 36-41, 2025.
"The Isogeny Club - Brainstorm Days 参加報告", 応用数理 Vol. 34, No. 4, pp. 65-66, 2024.
"同種写像暗号入門", 電子情報通信学会会誌 Vol. 106, No. 11, pp. 1004-1009, 2023.