(Short Paper) a faster constant-time algorithm of CSIDH keeping two points H Onuki, Y Aikawa, T Yamazaki, T Takagi Advances in Information and Computer Security: 14th International Workshop …, 2019 | 52 | 2019 |

SiGamal: a supersingular isogeny-based PKE and its application to a PRF T Moriya, H Onuki, T Takagi Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 48 | 2020 |

On oriented supersingular elliptic curves H Onuki Finite Fields and Their Applications 69, 101777, 2021 | 47 | 2021 |

How to construct CSIDH on Edwards curves T Moriya, H Onuki, T Takagi Finite Fields and Their Applications 92, 102310, 2023 | 23 | 2023 |

QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras K Nakagawa, H Onuki Annual International Cryptology Conference, 75-106, 2024 | 21 | 2024 |

Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020 | 18 | 2020 |

On collisions related to an ideal class of order 3 in CSIDH H Onuki, T Takagi International Workshop on Security, 131-148, 2020 | 17 | 2020 |

l1-norm ball for CSIDH: optimal strategy for choosing the secret key space K Nakagawa, H Onuki, A Takayasu, T Takagi Discrete Applied Mathematics 328, 70-88, 2023 | 14 | 2023 |

Radical isogenies on Montgomery curves H Onuki, T Moriya IACR International Conference on Public-Key Cryptography, 473-497, 2022 | 14 | 2022 |

A constant-time algorithm of CSIDH keeping two points H Onuki, Y Aikawa, T Yamazaki, T Takagi IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2020 | 14 | 2020 |

SQIsign2D-East: a new signature scheme using 2-dimensional isogenies K Nakagawa, H Onuki Cryptology ePrint Archive, 2024 | 13 | 2024 |

The existence of cycles in the supersingular isogeny graphs used in SIKE H Onuki, Y Aikawa, T Takagi 2020 International Symposium on Information Theory and Its Applications …, 2020 | 12 | 2020 |

The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography T Moriya, H Onuki, Y Aikawa, T Takagi Cryptology ePrint Archive, 2022 | 8 | 2022 |

Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign H Onuki, K Nakagawa Cryptology ePrint Archive, 2024 | 6 | 2024 |

The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets H Onuki, T Teruya, N Kanayama, S Uchiyama JSIAM Letters 8, 9-12, 2016 | 6 | 2016 |

The wrong use of FESTA trapdoor functions leads to an adaptive attack T Moriya, H Onuki Cryptology ePrint Archive, 2023 | 4 | 2023 |

Faster explicit formulae for computing pairings via elliptic nets and their parallel computation H Onuki, T Teruya, N Kanayama, S Uchiyama Advances in Information and Computer Security: 11th International Workshop …, 2016 | 4 | 2016 |

Primality proving using elliptic curves with complex multiplication by imaginary quadratic fields of class number three H Onuki Finite Fields and Their Applications 99, 102490, 2024 | 1 | 2024 |

Computing Richelot isogeny graph of superspecial abelian threefolds R Ohashi, H Onuki, M Kudo, R Yoshizumi, K Nuida arXiv preprint arXiv:2401.10500, 2024 | 1 | 2024 |

Explicit construction of the square-root Vélu's formula on Edwards curves S Takahashi, H Onuki, T Takagi JSIAM Letters 14, 108-110, 2022 | 1 | 2022 |