|
|
|
Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks Naoya TORII Dai YAMAMOTO Masahiko TAKENAKA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A
No. 1
pp. 118-129
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: PUF, FIB, RS-latch, | | Summary | Full Text:PDF | |
|
FOREWORD Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A
No. 1
pp. 1-1
Type of Manuscript:
FOREWORD Category: Keyword:
| | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection Katsunari YOSHIOKA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A
No. 1
pp. 210-218
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: malware sandbox analysis, multi-pass analysis, | | Summary | Full Text:PDF | |
|
|
|
|
|
A Distributed User Revocation Scheme for Ad-Hoc Networks Jun ANZAI Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B
No. 9
pp. 3635-3642
Type of Manuscript:
Special Section PAPER (Special Section on Advances in Ad Hoc Mobile Communications and Networking) Category: Keyword: ad-hoc network, user revocation, group key, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
Interaction Key Generation Schemes Jun ANZAI Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 152-159
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocol Keyword: interaction key, key generation, group public key, | | Summary | Full Text:PDF | |
|
|
|
|
|
An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability Masashi UNE Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1
pp. 151-164
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocols etc. Keyword: availability, cost, evaluation method, integrity, time stamp, | | Summary | Full Text:PDF | |
|
|
|
A Framework to Evaluate Security and Cost of Time Stamping Schemes Masashi UNE Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A
No. 1
pp. 125-139
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: time stamp, security evaluation, cost evaluation, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck Koji KUSUDA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A
No. 1
pp. 35-48
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: block cipher, cryptanalysis, time-memory trade-off, | | Summary | Full Text:PDF | |
|
|
|
An Electronic Retail Payment System with Distributed Control--A Conceptual Design-- Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A
No. 1
pp. 67-76
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: electronic payment, funds transfer, cash, wallet, card, cryptography, security, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
Proving Identity in Three Moves Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A
No. 11
pp. 3602-3606
Type of Manuscript:
PAPER Category: Information Security and Cryptography Keyword:
| | Summary | Full Text:PDF | |
|
Information Security of Spread Spectrum Systems Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A
No. 3
pp. 488-505
Type of Manuscript:
INVITED PAPER Category: Keyword:
| | Summary | Full Text:PDF | |
|
On Generating Cryptographically Desirable Substitutions Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1031-1035
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Common-Key Systems Keyword:
| | Summary | Full Text:PDF | |
|
|
|
Connections among Several Versions of One-Way Hash Functions Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1092-1099
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Authentication Techniques Keyword:
| | Summary | Full Text:PDF | |
|
Several Theorems on Probabilistic Cryptosystems Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E
No. 7
pp. 819-827
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF | |
|
Residuosity Problem and Its Applications to Cryptography Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E
No. 8
pp. 759-767
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF | |
|
On Seeking Smart Public-Key-Distribution Systems Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E
No. 2
pp. 99-106
Type of Manuscript:
PAPER Category: Information and Communication Theory Keyword:
| | Summary | Full Text:PDF | |
|
|
|
Boolean-Function Representations of a Mapping Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E
No. 6
pp. 337-344
Type of Manuscript:
PAPER Category: Computers Keyword:
| | Summary | Full Text:PDF | |
|