2008 | ||
---|---|---|
48 | EE | Tsutomu Matsumoto: Prototyping security test objects for use with advanced biometric authentication systems. ASIACCS 2008: 2 |
47 | EE | Tsutomu Matsumoto, Yasuyuki Shimada, Thimoty Teo, Shigeyasu Kawaji: A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style. CBMS 2008: 173-175 |
46 | EE | Junji Shikata, Tsutomu Matsumoto: Unconditionally Secure Steganography Against Active Attacks. IEEE Transactions on Information Theory 54(6): 2690-2705 (2008) |
2007 | ||
45 | EE | Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda: Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. WISA 2007: 128-141 |
2006 | ||
44 | EE | Akira Matsunaga, Tsutomu Matsumoto: Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. ASIAN 2006: 1-12 |
43 | EE | Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto: Information Hiding on Lossless Data Compression. IIH-MSP 2006: 15-18 |
2005 | ||
42 | EE | Jun Anzai, Tsutomu Matsumoto: How to Construct Secure Cryptographic Location-Based Services. EUC Workshops 2005: 894-904 |
41 | EE | Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa, Ichiro Murase: Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. KES (3) 2005: 1039-1048 |
40 | EE | Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai: Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Transactions 88-A(1): 239-246 (2005) |
39 | EE | Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto: On Collusion Security of Random Codes. IEICE Transactions 88-A(1): 296-304 (2005) |
38 | EE | Jun Anzai, Tsutomu Matsumoto: A Distributed User Revocation Scheme for Ad-Hoc Networks. IEICE Transactions 88-B(9): 3635-3642 (2005) |
2004 | ||
37 | EE | Jun Anzai, Tsutomu Matsumoto: Interaction Key Generation Schemes. IEICE Transactions 87-A(1): 152-159 (2004) |
2003 | ||
36 | Kei Senda, Tsutomu Matsumoto, Yuzo Okano: A study toward cognitive action with environment recognition by a learning space robot. ICRA 2003: 797-802 | |
35 | EE | Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto: Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. ISC 2003: 408-421 |
2002 | ||
34 | EE | Tsutomu Matsumoto: Gummy and Conductive Silicone Rubber Fingers. ASIACRYPT 2002: 574-576 |
33 | EE | Tsutomu Matsumoto, Yuki Ueda, Shigeyasu Kawaji: A Software System for Giving Clues of Medical Diagnosis to Clinician. CBMS 2002: 65-70 |
32 | Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino: Impact of Artificial "Gummy" Fingers on Fingerprint Systems. Datenschutz und Datensicherheit 26(8): (2002) | |
2001 | ||
31 | EE | Tsutomu Matsumoto, Toshikatsu Mori, Hirofumi Ohtsuka, Yasuyuki Shimada, Shigeyasu Kawaji: Designing and Implementation of Tele-Health Care Information System based on Health Care Model. CSCWD 2001: 246-550 |
30 | EE | Masayuki Kanda, Tsutomu Matsumoto: Security of Camellia against Truncated Differential Cryptanalysis. FSE 2001: 286-299 |
2000 | ||
29 | Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto: Light Weight Broadcast Exclusion Using Secret Sharing. ACISP 2000: 313-327 | |
1999 | ||
28 | Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto: A Quick Group Key Distribution Scheme with "Entity Revocation". ASIACRYPT 1999: 333-347 | |
27 | Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto: A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. ICISC 1999: 221-235 | |
1998 | ||
26 | EE | Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta: A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. Selected Areas in Cryptography 1998: 264-279 |
25 | Tsutomu Matsumoto: Getting Users' Attributed Without Violating Anonymity. WWCA 1998: 439-443 | |
24 | Tsutomu Matsumoto, Toshikazu Kagami, Kouichi Tomita, Brenda Mallinson: A support system to formulate care plans for senior citizens & dataInput methods for a Web database. WebNet 1998 | |
23 | Tsutomu Matsumoto: Human-Computer Cryptography: An Attempt. Journal of Computer Security 6(3): 129-150 (1998) | |
1996 | ||
22 | Kwangjo Kim, Tsutomu Matsumoto: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings Springer 1996 | |
21 | EE | Tsutomu Matsumoto: Human-Computer Cryptography: An Attempt. ACM Conference on Computer and Communications Security 1996: 68-75 |
20 | Tsutomu Matsumoto, Tomonori Wasaki, Mitomo Okayama, Katsunori Horikawa, Toshiriro Hayashi, Mike Nga: A Web site for counseling on students' future courses. WebNet 1996 | |
19 | Kiyoteru Motoda, Wakako Tokumaru, Hideo Kiyohara, Tsutomu Matsumoto: Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware. WebNet 1996 | |
1994 | ||
18 | Tsutomu Matsumoto: Incidence Structures for Key Sharing (Extended Abstract). ASIACRYPT 1994: 342-353 | |
1993 | ||
17 | Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings Springer 1993 | |
1992 | ||
16 | Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen: On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 | |
15 | Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai: Non-Interactive Generation of Shared Pseudorandom Sequences. AUSCRYPT 1992: 385-396 | |
14 | EE | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai: High-Speed Implementation Methods for RSA Scheme. EUROCRYPT 1992: 221-238 |
13 | EE | Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai: Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). EUROCRYPT 1992: 477-481 |
1991 | ||
12 | Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai: A Multi-Purpose Proof System - for Identity and Membership Proofs. ASIACRYPT 1991: 397-411 | |
11 | EE | Tsutomu Matsumoto: Human Identification Through Insecure Channel. EUROCRYPT 1991: 409-421 |
1990 | ||
10 | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Duality between Two Cryptographic Primitives. AAECC 1990: 379-390 | |
9 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Structural Properties of One-way Hash Functions. CRYPTO 1990: 285-302 |
8 | EE | Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai: A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. CRYPTO 1990: 564-574 |
1989 | ||
7 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. CRYPTO 1989: 461-480 |
6 | EE | Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai: Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). EUROCRYPT 1989: 412-422 |
1988 | ||
5 | EE | Tsutomu Matsumoto, Koki Kato, Hideki Imai: Speeding Up Secret Computations with Insecure Auxiliary Devices. CRYPTO 1988: 497-506 |
4 | EE | Tsutomu Matsumoto, Hideki Imai: Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. EUROCRYPT 1988: 419-453 |
1987 | ||
3 | Hideki Imai, Tsutomu Matsumoto: Coding Theory and its Applications in Japan. AAECC 1987: 301-305 | |
2 | EE | Tsutomu Matsumoto, Hideki Imai: On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. CRYPTO 1987: 185-193 |
1985 | ||
1 | Hideki Imai, Tsutomu Matsumoto: Algebraic Methods for Constructing Asymmetric Cryptosystems. AAECC 1985: 108-119 |