|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks Naoya TORII Dai YAMAMOTO Masahiko TAKENAKA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A
No. 1
pp. 118-129
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: PUF, FIB, RS-latch, | | Summary | Full Text:PDF(2.1MB) | |
|
|
|
FOREWORD Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A
No. 1
pp. 1-1
Type of Manuscript:
FOREWORD Category: Keyword:
| | Summary | Full Text:PDF(229.7KB) | |
|
|
|
|
|
|
|
|
|
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection Katsunari YOSHIOKA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A
No. 1
pp. 210-218
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: malware sandbox analysis, multi-pass analysis, | | Summary | Full Text:PDF(1.1MB) | |
|
|
|
|
|
A Distributed User Revocation Scheme for Ad-Hoc Networks Jun ANZAI Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B
No. 9
pp. 3635-3642
Type of Manuscript:
Special Section PAPER (Special Section on Advances in Ad Hoc Mobile Communications and Networking) Category: Keyword: ad-hoc network, user revocation, group key, | | Summary | Full Text:PDF(145.3KB) | |
|
|
|
|
|
|
|
|
|
|
|
Interaction Key Generation Schemes Jun ANZAI Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 152-159
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocol Keyword: interaction key, key generation, group public key, | | Summary | Full Text:PDF(232.3KB) | |
|
|
|
Random-Error Resilience of a Short Collusion-Secure Code Katsunari YOSHIOKA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A
No. 5
pp. 1147-1155
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: fingerprinting, collusion attack, collusion-secure code, | | Summary | Full Text:PDF(346.9KB) | |
|
An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability Masashi UNE Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1
pp. 151-164
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocols etc. Keyword: availability, cost, evaluation method, integrity, time stamp, | | Summary | Full Text:PDF(393.4KB) | |
|
|
|
|
|
A Framework to Evaluate Security and Cost of Time Stamping Schemes Masashi UNE Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A
No. 1
pp. 125-139
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: time stamp, security evaluation, cost evaluation, | | Summary | Full Text:PDF(626.5KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck Koji KUSUDA Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A
No. 1
pp. 35-48
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: block cipher, cryptanalysis, time-memory trade-off, | | Summary | Full Text:PDF(986.1KB) | |
|
|
|
An Electronic Retail Payment System with Distributed Control--A Conceptual Design-- Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A
No. 1
pp. 67-76
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: electronic payment, funds transfer, cash, wallet, card, cryptography, security, | | Summary | Full Text:PDF(788.2KB) | |
|
|
|
|
|
|
|
|
|
|
|
Proving Identity in Three Moves Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A
No. 11
pp. 3602-3606
Type of Manuscript:
PAPER Category: Information Security and Cryptography Keyword:
| | Summary | Full Text:PDF(392.4KB) | |
|
Information Security of Spread Spectrum Systems Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A
No. 3
pp. 488-505
Type of Manuscript:
INVITED PAPER Category: Keyword:
| | Summary | Full Text:PDF(1.5MB) | |
|
On Generating Cryptographically Desirable Substitutions Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1031-1035
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Common-Key Systems Keyword:
| | Summary | Full Text:PDF(403.6KB) | |
|
|
|
Connections among Several Versions of One-Way Hash Functions Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1092-1099
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Authentication Techniques Keyword:
| | Summary | Full Text:PDF(772.7KB) | |
|
Several Theorems on Probabilistic Cryptosystems Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E
No. 7
pp. 819-827
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(788.4KB) | |
|
Residuosity Problem and Its Applications to Cryptography Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E
No. 8
pp. 759-767
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(809.3KB) | |
|
On Seeking Smart Public-Key-Distribution Systems Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E
No. 2
pp. 99-106
Type of Manuscript:
PAPER Category: Information and Communication Theory Keyword:
| | Summary | Full Text:PDF(504.5KB) | |
|
A Cryptographically Useful Theorem on the Connection between Uni and Multivariate Polynomials Tsutomu MATSUMOTO Hideki IMAI Hiroshi HARASHIMA Hiroshi MIYAKAWA | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1985/03/25
Vol. E68-E
No. 3
pp. 139-146
Type of Manuscript:
PAPER Category: Cryptography Keyword:
| | Summary | Full Text:PDF(467.5KB) | |
|
Boolean-Function Representations of a Mapping Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E
No. 6
pp. 337-344
Type of Manuscript:
PAPER Category: Computers Keyword:
| | Summary | Full Text:PDF(592.7KB) | |
|