M-SIDH and MD-SIDH: countering SIDH attacks by masking information TB Fouotsa, T Moriya, C Petit Annual International Conference on the Theory and Applications of …, 2023 | 68 | 2023 |
SiGamal: a supersingular isogeny-based PKE and its application to a PRF T Moriya, H Onuki, T Takagi Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 52 | 2020 |
Masked-degree SIDH T Moriya Cryptology ePrint Archive, 2022 | 26 | 2022 |
How to construct CSIDH on Edwards curves T Moriya, H Onuki, T Takagi Finite Fields and Their Applications 92, 102310, 2023 | 25 | 2023 |
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram T Moriya Cryptology ePrint Archive, 2023 | 17 | 2023 |
Radical isogenies on Montgomery curves H Onuki, T Moriya IACR International Conference on Public-Key Cryptography, 473-497, 2022 | 16 | 2022 |
Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems T Moriya, K Takashima, T Takagi Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 9 | 2020 |
The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography T Moriya, H Onuki, Y Aikawa, T Takagi Cryptology ePrint Archive, 2022 | 8 | 2022 |
Some explicit arithmetics on curves of genus three and their applications T Moriya, M Kudo arXiv preprint arXiv:2209.02926, 2022 | 6 | 2022 |
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram T Moriya Cryptology ePrint Archive, 2024 | 5 | 2024 |
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram (2023) T Moriya | 5 | |
The wrong use of FESTA trapdoor functions leads to an adaptive attack T Moriya, H Onuki Cryptology ePrint Archive, 2023 | 4 | 2023 |
Explicit construction of a plane sextic model for genus-five Howe curves, I T Moriya, M Kudo Journal of Computational Algebra 11, 100018, 2024 | 1 | 2024 |
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3 S Kunzweiler, L Maino, T Moriya, C Petit, G Pope, D Robert, M Stopar, ... | | 2024 |
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation T Moriya, H Onuki, M Xu, G Zhou International Conference on Post-Quantum Cryptography, 3-19, 2024 | | 2024 |
Adaptive attack for a possible PKE scheme using FESTA trapdoor functions in the wrong way. T Moriya IACR Cryptol. ePrint Arch. 2023, 1092, 2023 | | 2023 |
Lower bound of costs of formulas to compute image curves of -isogenies in the framework of generalized Montgomery coordinates T Moriya, H Onuki, Y Aikawa, T Takagi Cryptology ePrint Archive, 2023 | | 2023 |
SiGamal: A supersingular isogeny-based PKE T Moriya, H Onuki, T Takagi | | 2020 |
Adaptive attack for FESTA T Moriya | | |
M-SIDH and MD-SIDH TB Fouotsa, T Moriya, C Petit | | |