Follow
Tomoki Moriya
Title
Cited by
Cited by
Year
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
TB Fouotsa, T Moriya, C Petit
Annual International Conference on the Theory and Applications of …, 2023
682023
SiGamal: a supersingular isogeny-based PKE and its application to a PRF
T Moriya, H Onuki, T Takagi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
522020
Masked-degree SIDH
T Moriya
Cryptology ePrint Archive, 2022
262022
How to construct CSIDH on Edwards curves
T Moriya, H Onuki, T Takagi
Finite Fields and Their Applications 92, 102310, 2023
252023
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram
T Moriya
Cryptology ePrint Archive, 2023
172023
Radical isogenies on Montgomery curves
H Onuki, T Moriya
IACR International Conference on Public-Key Cryptography, 473-497, 2022
162022
Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems
T Moriya, K Takashima, T Takagi
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
92020
The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography
T Moriya, H Onuki, Y Aikawa, T Takagi
Cryptology ePrint Archive, 2022
82022
Some explicit arithmetics on curves of genus three and their applications
T Moriya, M Kudo
arXiv preprint arXiv:2209.02926, 2022
62022
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
T Moriya
Cryptology ePrint Archive, 2024
52024
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram (2023)
T Moriya
5
The wrong use of FESTA trapdoor functions leads to an adaptive attack
T Moriya, H Onuki
Cryptology ePrint Archive, 2023
42023
Explicit construction of a plane sextic model for genus-five Howe curves, I
T Moriya, M Kudo
Journal of Computational Algebra 11, 100018, 2024
12024
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3
S Kunzweiler, L Maino, T Moriya, C Petit, G Pope, D Robert, M Stopar, ...
2024
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation
T Moriya, H Onuki, M Xu, G Zhou
International Conference on Post-Quantum Cryptography, 3-19, 2024
2024
Adaptive attack for a possible PKE scheme using FESTA trapdoor functions in the wrong way.
T Moriya
IACR Cryptol. ePrint Arch. 2023, 1092, 2023
2023
Lower bound of costs of formulas to compute image curves of -isogenies in the framework of generalized Montgomery coordinates
T Moriya, H Onuki, Y Aikawa, T Takagi
Cryptology ePrint Archive, 2023
2023
SiGamal: A supersingular isogeny-based PKE
T Moriya, H Onuki, T Takagi
2020
Adaptive attack for FESTA
T Moriya
M-SIDH and MD-SIDH
TB Fouotsa, T Moriya, C Petit
The system can't perform the operation now. Try again later.
Articles 1–20