Hiroshi Onuki
Orcid: 0000-0002-0202-8918
According to our database1,
Hiroshi Onuki
authored at least 26 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient theta-based algorithms for computing (ℓ, ℓ)-isogenies on Kummer surfaces for arbitrary odd ℓ.
IACR Cryptol. ePrint Arch., 2024
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three.
Finite Fields Their Appl., 2024
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
2023
Discret. Appl. Math., March, 2023
JSIAM Lett., 2023
IACR Cryptol. ePrint Arch., 2023
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates.
IACR Cryptol. ePrint Arch., 2023
2022
JSIAM Lett., 2022
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography.
IACR Cryptol. ePrint Arch., 2022
2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
L<sub>1</sub>-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Information and Computer Security, 2019
2016
The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets.
JSIAM Lett., 2016
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation.
Proceedings of the Advances in Information and Computer Security, 2016