Tsutomu MATSUMOTO


Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks
Naoya TORII Dai YAMAMOTO Masahiko TAKENAKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 118-129
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
PUFFIBRS-latch
 Summary | Full Text:PDF(2.1MB)

Catching the Behavioral Differences between Multiple Executions for Malware Detection
Takahiro KASAMA Katsunari YOSHIOKA Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 225-232
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: System Security
Keyword: 
malware detectiondynamic analysisBehavioral Differences
 Summary | Full Text:PDF(1.6MB)

FOREWORD
Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(229.7KB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9  pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
Daisuke SUZUKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 211-222
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
hardware architecturemodular exponentiationMontgomery multiplicationFPGADSP
 Summary | Full Text:PDF(1.1MB)

How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers
Daisuke SUZUKI Minoru SAEKI Koichi SHIMIZU Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 200-210
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
hardware architecturedifferential power analysiscorrelation power analysistemplate attack
 Summary | Full Text:PDF(1.6MB)

A Design Methodology for a DPA-Resistant Circuit with RSL Techniques
Daisuke SUZUKI Minoru SAEKI Koichi SHIMIZU Akashi SATOH Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/12/01
Vol. E93-A  No. 12  pp. 2497-2508
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Logic Synthesis, Test and Verification
Keyword: 
side-channel attacksdifferential power analysishardware countermeasurerandom switching logicCMOS logic circuit
 Summary | Full Text:PDF(2.2MB)

Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 210-218
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
malware sandbox analysismulti-pass analysis
 Summary | Full Text:PDF(1.1MB)

Unconditionally Secure Group Signatures
Takenobu SEITO Yuki HARA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 2067-2085
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
group signatureinformation-theoretic securityunconditional security
 Summary | Full Text:PDF(337.6KB)

Information-Flow-Based Access Control for Web Browsers
Sachiko YOSHIHAMA Takaaki TATEISHI Naoshi TABUCHI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 836-850
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication and Authorization Techniques
Keyword: 
Web securitybrowser securityaccess controlinformation-flow control
 Summary | Full Text:PDF(1.3MB)

A Distributed User Revocation Scheme for Ad-Hoc Networks
Jun ANZAI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B  No. 9  pp. 3635-3642
Type of Manuscript:  Special Section PAPER (Special Section on Advances in Ad Hoc Mobile Communications and Networking)
Category: 
Keyword: 
ad-hoc networkuser revocationgroup key
 Summary | Full Text:PDF(145.3KB)

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control
Kunihiko MIYAZAKI Mitsuru IWAMURA Tsutomu MATSUMOTO Ryoichi SASAKI Hiroshi YOSHIURA Satoru TEZUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 239-246
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
digital signaturedisclosure of official informationprivacy issue
 Summary | Full Text:PDF(365.7KB)

On Collusion Security of Random Codes
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 296-304
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
fingerprintingwatermarkingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(427KB)

Multiparty DSA Signature Generation without Simultaneous User Operations
Yoshiki SAMESHIMA Hideaki SAISHO Kazuko OYANAGI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8  pp. 2095-2105
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
threshold multisignatureDigital Signature Algorithmmultiparty protocolcryptographyinformation security
 Summary | Full Text:PDF(302.1KB)

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF(293.6KB)

Collusion Secure Codes: Systematic Security Definitions and Their Relations
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1162-1171
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(408KB)

Interaction Key Generation Schemes
Jun ANZAI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 152-159
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
interaction keykey generationgroup public key
 Summary | Full Text:PDF(232.3KB)

Detection-Resistant Steganography for Standard MIDI Files
Daisuke INOUE Masataka SUZUKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8  pp. 2099-2106
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
information hidingsteganographysteganalysisstandard MIDI files
 Summary | Full Text:PDF(949.8KB)

Random-Error Resilience of a Short Collusion-Secure Code
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1147-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingcollusion attackcollusion-secure code
 Summary | Full Text:PDF(346.9KB)

An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability
Masashi UNE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 151-164
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
availabilitycostevaluation methodintegritytime stamp
 Summary | Full Text:PDF(393.4KB)

A Flexible Tree-Based Key Management Framework
Natsume MATSUZAKI Toshihisa NAKANO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 129-135
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
key managementframeworktree-basedmultiple content distribution systems
 Summary | Full Text:PDF(227.8KB)

Rivulet: An Anonymous Communication Method Based on Group Communication
Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 94-101
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
anonymous communicationgroup communicationanonymitymulticasting
 Summary | Full Text:PDF(513.2KB)

On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis
Masayuki KANDA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 25-37
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
security evaluationdifferential cryptanalysislinear cryptanalysistruncated differential cryptanalysis
 Summary | Full Text:PDF(335.7KB)

A Framework to Evaluate Security and Cost of Time Stamping Schemes
Masashi UNE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 125-139
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
time stampsecurity evaluationcost evaluation
 Summary | Full Text:PDF(626.5KB)

A Scheme of Secret Communication Using Internet Control Message Protocol
Masataka SUZUKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 181-189
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
InternetICMPIP spoofingsecret communicationsteganographyanonymity
 Summary | Full Text:PDF(621.9KB)

A Flexible Method for Masked Sharing of Group Keys
Jun ANZAI Natsume MATSUZAKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 239-246
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
broadcast encryptionuser exclusion problem
 Summary | Full Text:PDF(271.9KB)

E2--A New 128-Bit Block Cipher
Masayuki KANDA Shiho MORIAI Kazumaro AOKI Hiroki UEDA Youichi TAKASHIMA Kazuo OHTA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 48-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryption algorithmblock cipherE2AESdesign strategy
 Summary | Full Text:PDF(1.3MB)

Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis
Yasuyoshi KANEKO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 130-133
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
generalized feistel ciphersdifferential cryptanalysislinear cryptanalysisoutline measures of strengthdesign of block ciphers
 Summary | Full Text:PDF(201.1KB)

Achieving Higher Success Probability in Time-Memory Trade-Off Cryptanalysis without Increasing Memory Size
Il-Jun KIM Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 123-129
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
time-memory trade-offspace complexitysuccess probabilitytime complexity
 Summary | Full Text:PDF(935.8KB)

Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck
Koji KUSUDA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 35-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptanalysistime-memory trade-off
 Summary | Full Text:PDF(986.1KB)

Evaluating Security of a Simple Interactive Human Identification Scheme
Ryo MIZUTANI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/05/25
Vol. E78-A  No. 5  pp. 577-578
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Fall Conference)
Category: 
Keyword: 
authenticationhuman cryptographyhuman interfaceidentificationinformation securitypasswords
 Summary | Full Text:PDF(142.5KB)

An Electronic Retail Payment System with Distributed Control--A Conceptual Design--
Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 67-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic paymentfunds transfercashwalletcardcryptographysecurity
 Summary | Full Text:PDF(788.2KB)

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11  pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF(261.4KB)

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4  pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF(793.3KB)

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4  pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF(1.2MB)

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF(655.1KB)

A Multi-Purpose Proof System and Its Analysis
Chaosheng SHU Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/06/25
Vol. E75-A  No. 6  pp. 735-743
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
identity proofmembership proofzero-knowledge proof
 Summary | Full Text:PDF(785KB)

Proving Identity in Three Moves
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A  No. 11  pp. 3602-3606
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
 Summary | Full Text:PDF(392.4KB)

Information Security of Spread Spectrum Systems
Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A  No. 3  pp. 488-505
Type of Manuscript:  INVITED PAPER
Category: 
Keyword: 
 Summary | Full Text:PDF(1.5MB)

Connections among Several Versions of One-Way Hash Functions
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1092-1099
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Authentication Techniques
Keyword: 
 Summary | Full Text:PDF(772.7KB)

A Prototype KPS and Its Application--IC Card Based Key Sharing and Cryptographic Communication--
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI Minoru SASAKI Hiroharu YOSHIKAWA Shin-ichiro WATANABE 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1111-1119
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Applications
Keyword: 
 Summary | Full Text:PDF(769.1KB)

On Generating Cryptographically Desirable Substitutions
Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1031-1035
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Common-Key Systems
Keyword: 
 Summary | Full Text:PDF(403.6KB)

Several Theorems on Probabilistic Cryptosystems
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E  No. 7  pp. 819-827
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF(788.4KB)

Residuosity Problem and Its Applications to Cryptography
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E  No. 8  pp. 759-767
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF(809.3KB)

On Seeking Smart Public-Key-Distribution Systems
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E  No. 2  pp. 99-106
Type of Manuscript:  PAPER
Category: Information and Communication Theory
Keyword: 
 Summary | Full Text:PDF(504.5KB)

A Cryptographically Useful Theorem on the Connection between Uni and Multivariate Polynomials
Tsutomu MATSUMOTO Hideki IMAI Hiroshi HARASHIMA Hiroshi MIYAKAWA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1985/03/25
Vol. E68-E  No. 3  pp. 139-146
Type of Manuscript:  PAPER
Category: Cryptography
Keyword: 
 Summary | Full Text:PDF(467.5KB)

Boolean-Function Representations of a Mapping
Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E  No. 6  pp. 337-344
Type of Manuscript:  PAPER
Category: Computers
Keyword: 
 Summary | Full Text:PDF(592.7KB)