Publications
Refereed
- Journal Articles
Tomoki Moriya, Hiroshi Onuki and Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", Finite Fields and Their Applications Vol. 92, Article 102310, 2023. [Link]
Saki Otsuki, Hiroshi Onuki, Tsuyoshi Takagi, "Improvement of the square-root Vélu's formulas for isogeny-based cryptography", JSIAM Letters Vol. 15, pp. 61-64, 2023. [Link]
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, and Tsuyoshi Takagi, "L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space", Discrete Applied Mathematics Vol. 328, pp. 70-88, March 2023. [Link], [ePrint].
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography", Mathematical Cryptology Vol. 2(1), pp. 36-59, 2022. [Link], [ePrint].
Shu Takahashi, Hiroshi Onuki, Tsuyoshi Takagi, "Explicit construction of the square-root Vélu's formula on Edwards curves", JSIAM Letters Vol. 14, pp. 108-110, 2022. [Link]
Hiroshi Onuki, "On oriented supersingular elliptic curves", Finite Fields and Their Applications Vol. 69, Article 101777, 2021. [Link], [arXiv]
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "A Constant-time Algorithm of CSIDH keeping Two Points", IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol.E103-A No.10 pp. 1174-1182, 2020. [Link]
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets". JSIAM Letters Vol. 8, pp. 9–12, 2016. [Link]
- Conference Proceedings
Tomoki Moriya, Hiroshi Onuki, Maozhi Xu, and Guoqing Zhou, "Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation", PQCrypto 2024, LNCS 14772, pp. 3-19, 2024. [Springer].
Hiroshi Onuki, "On the key generation in SQISign", Banach Center Publication Vol. 126 Number-Theoretic Methods in Cryptology, pp. 89-104, 2023. [Link] [ePrint].
Hiroshi Onuki, Tomoki Moriya, "Radical Isogenies on Montgomery Curves", PKC 2022. LNCS 13177, pp. 473-497, 2022. [Springer], [ePrint].
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "SiGamal: A supersingular isogeny-based PKE and its application to a PRF", ASIACRYPT 2020. LNCS 12492, pp. 551-580, 2020. [Springer], [ePrint].
Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE", ISITA 2020, pp. 358-362, 2020 [IEEE], [ePrint].
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, and Marc Stöttinger, "Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks", FDTC 2020, Vol 1, pp. 57-65, 2020. [Link] [ePrint]
Hiroshi Onuki and Tsuyoshi Takagi, "On collisions related to an ideal class of order 3 in CSIDH", IWSEC 2020, LNCS 12231, pp. 131-148, 2020. [Springer], [ePrint].
Tomoki Moriya, Hiroshi Onuki and Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", CT-RSA 2020, LNCS 12006, pp. 512–537, 2020. [Springer], [ePrint].
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, and Tsuyoshi Takagi, "(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points", IWSEC 2019, LNCS 11689, pp. 23–33, 2019. [Springer], [ePrint (full ver.)].
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation", IWSEC 2016, LNCS 9836, pp 319-334, 2016. [Springer]
- Others
Hiroshi Onuki, "OSIDH and SiGamal : cryptosystems from supersingular elliptic curves", RIMS Kokyuroku Bessatsu B90 (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties), pp. 117-129, 2022.
Others
- Preprints
Hiroshi Onuki and Kohei Nakagawa, "Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign", IACR ePrint 2024/778.
Kohei Nakagawa and Hiroshi Onuki, "SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies", IACR ePrint 2024/771.
Ryo Ohashi, Hiroshi Onuki, Momonari Kudo, Ryo Yoshizumi, and Koji Nuida, "Computing Richelot isogeny graph of superspecial abelian threefolds", arXiv:2401.10500 [math.AG].
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates", IACR ePrint 2023/1511.
Kohei Nakagawa and Hiroshi Onuki, "QFESTA: Efficient Algorithms and Parameters for FESTA using Quaternion Algebras", IACR ePrint 2023/1468. To appear Crypto 2024.
Tomoki Moriya and Hiroshi Onuki, "The wrong use of FESTA trapdoor functions leads to an adaptive attack", IACR ePrint 2023/1092.
Hiroshi Onuki, "Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three", arXiv:2211.15137 [math.NT].
- Proceedings
Masaomi Shibata, Hiroshi Onuki, and Tsuyoshi Takagi, "Time-Memory Trade-off in Exhaustive Search for a Path in a Supersingular Isogeny Graph over Fp", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, and Koji Nuida, "Construction of Castryck-Decru attack for B-SIDH and its implementation", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Ryo Ohashi and Hiroshi Onuki, "Construction of a hash function using superspecial abelian 3-folds", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Kohei Nakagawa and Hiroshi Onuki, "SQIsign2D: A New Signature Scheme Using 2-dimensional Isogenies", Symposium on Cryptography and Information Security (SCIS 2024), January 2024.
Hiroshi Onuki, "Modular polynomials for enhanced elliptic curves", Symposium on Cryptography and Information Security (SCIS 2023), January 2023.
Kazumaro Aoki, Saki Otsuki, Hiroshi Onuki, and Tsuyoshi Takagi, "Can NFS Implementation Find Twin Smooth Primes?", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Saki Otsuki, Kazumaro Aoki, Hiroshi Onuki, and Tsuyoshi Takagi, "Computational Estimation of B-SIDH by Experiments and Condition of Good Prime Number", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "The minimal cost of operations on 3-isogeny computation via x-coordinates of Montgomery curves", Symposium on Cryptography and Information Security (SCIS 2022), January 2022.
Koichiro Akiyama, Yasuhiko Ikematsu, Hiroshi Onuki, Koji Nuida, and Tsuyoshi Takagi, "近似イデアルGCD問題に基づく不定方程式暗号", Symposium on Cryptography and Information Security (SCIS 2021), January 2021.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "Edwards曲線における高速な高次の同種写像計算方式", Symposium on Cryptography and Information Security (SCIS 2021), January 2021.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "同種写像による点の像の判定困難性に基づく公開鍵暗号方式", 日本応用数理学会2020年度年会 予稿集, pp. 72-73, 2020.
Hiroshi Onuki, Yusuke Aikawa, and Tsuyoshi Takagi, "次数固定同種写像問題と関連した問題群の計算帰着について", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi, "同種写像暗号CSIDHのEdwards曲線のw座標による構成について", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, and Tsuyoshi Takagi, "同種写像暗号CSIDHにおける最適な秘密鍵空間の考察", Symposium on Cryptography and Information Security (SCIS 2020), January 2020.
Hiroshi Onuki and Tsuyoshi Takagi, "On Collisions Related to an Ideal Class of Order 3 in CSIDH", コンピュータセキュリティシンポジウム2019論文集, pp. 408-414, 2019. [Link]
Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, and Tsuyoshi Takagi, "同種写像暗号CSIDHの計算量評価と高速化パラメータ", Symposium on Cryptography and Information Security (SCIS 2019), January 2019.
Hiroshi Onuki, "Q(sqrt{−23})に虚数乗法を持つ楕円曲線を用いた特別な整数に対する素数証明アルゴリズム", 日本応用数理学会2018年度年会 予稿集, pp. 449-450, 2018.
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama, "Optimal ate pairing のelliptic net による並列計算", Symposium on Cryptography and Information Security (SCIS 2016), January 2016.