2008 |
48 | EE | Tsutomu Matsumoto:
Prototyping security test objects for use with advanced biometric authentication systems.
ASIACCS 2008: 2 |
47 | EE | Tsutomu Matsumoto,
Yasuyuki Shimada,
Thimoty Teo,
Shigeyasu Kawaji:
A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style.
CBMS 2008: 173-175 |
46 | EE | Junji Shikata,
Tsutomu Matsumoto:
Unconditionally Secure Steganography Against Active Attacks.
IEEE Transactions on Information Theory 54(6): 2690-2705 (2008) |
2007 |
45 | EE | Yoshiki Sameshima,
Hideaki Saisho,
Tsutomu Matsumoto,
Norihisa Komoda:
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.
WISA 2007: 128-141 |
2006 |
44 | EE | Akira Matsunaga,
Tsutomu Matsumoto:
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.
ASIAN 2006: 1-12 |
43 | EE | Katsunari Yoshioka,
Kotaro Sonoda,
Osamu Takizawa,
Tsutomu Matsumoto:
Information Hiding on Lossless Data Compression.
IIH-MSP 2006: 15-18 |
2005 |
42 | EE | Jun Anzai,
Tsutomu Matsumoto:
How to Construct Secure Cryptographic Location-Based Services.
EUC Workshops 2005: 894-904 |
41 | EE | Osamu Takizawa,
Kyoko Makino,
Tsutomu Matsumoto,
Hiroshi Nakagawa,
Ichiro Murase:
Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions.
KES (3) 2005: 1039-1048 |
40 | EE | Kunihiko Miyazaki,
Mitsuru Iwamura,
Tsutomu Matsumoto,
Ryôichi Sasaki,
Hiroshi Yoshiura,
Satoru Tezuka,
Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions 88-A(1): 239-246 (2005) |
39 | EE | Katsunari Yoshioka,
Junji Shikata,
Tsutomu Matsumoto:
On Collusion Security of Random Codes.
IEICE Transactions 88-A(1): 296-304 (2005) |
38 | EE | Jun Anzai,
Tsutomu Matsumoto:
A Distributed User Revocation Scheme for Ad-Hoc Networks.
IEICE Transactions 88-B(9): 3635-3642 (2005) |
2004 |
37 | EE | Jun Anzai,
Tsutomu Matsumoto:
Interaction Key Generation Schemes.
IEICE Transactions 87-A(1): 152-159 (2004) |
2003 |
36 | | Kei Senda,
Tsutomu Matsumoto,
Yuzo Okano:
A study toward cognitive action with environment recognition by a learning space robot.
ICRA 2003: 797-802 |
35 | EE | Katsunari Yoshioka,
Junji Shikata,
Tsutomu Matsumoto:
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
ISC 2003: 408-421 |
2002 |
34 | EE | Tsutomu Matsumoto:
Gummy and Conductive Silicone Rubber Fingers.
ASIACRYPT 2002: 574-576 |
33 | EE | Tsutomu Matsumoto,
Yuki Ueda,
Shigeyasu Kawaji:
A Software System for Giving Clues of Medical Diagnosis to Clinician.
CBMS 2002: 65-70 |
32 | | Tsutomu Matsumoto,
Hiroyuki Matsumoto,
Koji Yamada,
Satoshi Hoshino:
Impact of Artificial "Gummy" Fingers on Fingerprint Systems.
Datenschutz und Datensicherheit 26(8): (2002) |
2001 |
31 | EE | Tsutomu Matsumoto,
Toshikatsu Mori,
Hirofumi Ohtsuka,
Yasuyuki Shimada,
Shigeyasu Kawaji:
Designing and Implementation of Tele-Health Care Information System based on Health Care Model.
CSCWD 2001: 246-550 |
30 | EE | Masayuki Kanda,
Tsutomu Matsumoto:
Security of Camellia against Truncated Differential Cryptanalysis.
FSE 2001: 286-299 |
2000 |
29 | | Natsume Matsuzaki,
Jun Anzai,
Tsutomu Matsumoto:
Light Weight Broadcast Exclusion Using Secret Sharing.
ACISP 2000: 313-327 |
1999 |
28 | | Jun Anzai,
Natsume Matsuzaki,
Tsutomu Matsumoto:
A Quick Group Key Distribution Scheme with "Entity Revocation".
ASIACRYPT 1999: 333-347 |
27 | | Tetsuya Tamura,
Kouichi Sakurai,
Tsutomu Matsumoto:
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
ICISC 1999: 221-235 |
1998 |
26 | EE | Masayuki Kanda,
Youichi Takashima,
Tsutomu Matsumoto,
Kazumaro Aoki,
Kazuo Ohta:
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Selected Areas in Cryptography 1998: 264-279 |
25 | | Tsutomu Matsumoto:
Getting Users' Attributed Without Violating Anonymity.
WWCA 1998: 439-443 |
24 | | Tsutomu Matsumoto,
Toshikazu Kagami,
Kouichi Tomita,
Brenda Mallinson:
A support system to formulate care plans for senior citizens & dataInput methods for a Web database.
WebNet 1998 |
23 | | Tsutomu Matsumoto:
Human-Computer Cryptography: An Attempt.
Journal of Computer Security 6(3): 129-150 (1998) |
1996 |
22 | | Kwangjo Kim,
Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings
Springer 1996 |
21 | EE | Tsutomu Matsumoto:
Human-Computer Cryptography: An Attempt.
ACM Conference on Computer and Communications Security 1996: 68-75 |
20 | | Tsutomu Matsumoto,
Tomonori Wasaki,
Mitomo Okayama,
Katsunori Horikawa,
Toshiriro Hayashi,
Mike Nga:
A Web site for counseling on students' future courses.
WebNet 1996 |
19 | | Kiyoteru Motoda,
Wakako Tokumaru,
Hideo Kiyohara,
Tsutomu Matsumoto:
Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware.
WebNet 1996 |
1994 |
18 | | Tsutomu Matsumoto:
Incidence Structures for Key Sharing (Extended Abstract).
ASIACRYPT 1994: 342-353 |
1993 |
17 | | Hideki Imai,
Ronald L. Rivest,
Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings
Springer 1993 |
1992 |
16 | | Tsutomu Matsumoto,
Hideki Imai,
Chi-Sung Laih,
Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation.
AUSCRYPT 1992: 296-307 |
15 | | Manuel Cerecedo,
Tsutomu Matsumoto,
Hideki Imai:
Non-Interactive Generation of Shared Pseudorandom Sequences.
AUSCRYPT 1992: 385-396 |
14 | EE | Keiichi Iwamura,
Tsutomu Matsumoto,
Hideki Imai:
High-Speed Implementation Methods for RSA Scheme.
EUROCRYPT 1992: 221-238 |
13 | EE | Keiichi Iwamura,
Tsutomu Matsumoto,
Hideki Imai:
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
EUROCRYPT 1992: 477-481 |
1991 |
12 | | Chaosheng Shu,
Tsutomu Matsumoto,
Hideki Imai:
A Multi-Purpose Proof System - for Identity and Membership Proofs.
ASIACRYPT 1991: 397-411 |
11 | EE | Tsutomu Matsumoto:
Human Identification Through Insecure Channel.
EUROCRYPT 1991: 409-421 |
1990 |
10 | | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Duality between Two Cryptographic Primitives.
AAECC 1990: 379-390 |
9 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Structural Properties of One-way Hash Functions.
CRYPTO 1990: 285-302 |
8 | EE | Kwangjo Kim,
Tsutomu Matsumoto,
Hideki Imai:
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
CRYPTO 1990: 564-574 |
1989 |
7 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
CRYPTO 1989: 461-480 |
6 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
EUROCRYPT 1989: 412-422 |
1988 |
5 | EE | Tsutomu Matsumoto,
Koki Kato,
Hideki Imai:
Speeding Up Secret Computations with Insecure Auxiliary Devices.
CRYPTO 1988: 497-506 |
4 | EE | Tsutomu Matsumoto,
Hideki Imai:
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
EUROCRYPT 1988: 419-453 |
1987 |
3 | | Hideki Imai,
Tsutomu Matsumoto:
Coding Theory and its Applications in Japan.
AAECC 1987: 301-305 |
2 | EE | Tsutomu Matsumoto,
Hideki Imai:
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
CRYPTO 1987: 185-193 |
1985 |
1 | | Hideki Imai,
Tsutomu Matsumoto:
Algebraic Methods for Constructing Asymmetric Cryptosystems.
AAECC 1985: 108-119 |