The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tsutomu Matsumoto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hideki Imai, Tsutomu Matsumoto
    Algebraic Methods for Constructing Asymmetric Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AAECC, 1985, pp:108-119 [Conf]
  2. Hideki Imai, Tsutomu Matsumoto
    Coding Theory and its Applications in Japan. [Citation Graph (0, 0)][DBLP]
    AAECC, 1987, pp:301-305 [Conf]
  3. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:379-390 [Conf]
  4. Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto
    Light Weight Broadcast Exclusion Using Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:313-327 [Conf]
  5. Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto
    A Quick Group Key Distribution Scheme with "Entity Revocation". [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:333-347 [Conf]
  6. Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai
    Non-Interactive Generation of Shared Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:385-396 [Conf]
  7. Tsutomu Matsumoto
    Gummy and Conductive Silicone Rubber Fingers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:574-576 [Conf]
  8. Tsutomu Matsumoto
    Incidence Structures for Key Sharing (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:342-353 [Conf]
  9. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:296-307 [Conf]
  10. Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai
    A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:397-411 [Conf]
  11. Tsutomu Matsumoto, Yuki Ueda, Shigeyasu Kawaji
    A Software System for Giving Clues of Medical Diagnosis to Clinician. [Citation Graph (0, 0)][DBLP]
    CBMS, 2002, pp:65-70 [Conf]
  12. Tsutomu Matsumoto
    Human-Computer Cryptography: An Attempt. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:68-75 [Conf]
  13. Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai
    A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:564-574 [Conf]
  14. Tsutomu Matsumoto, Hideki Imai
    On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:185-193 [Conf]
  15. Tsutomu Matsumoto, Koki Kato, Hideki Imai
    Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:497-506 [Conf]
  16. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:461-480 [Conf]
  17. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:285-302 [Conf]
  18. Jun Anzai, Tsutomu Matsumoto
    How to Construct Secure Cryptographic Location-Based Services. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:894-904 [Conf]
  19. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:221-238 [Conf]
  20. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:477-481 [Conf]
  21. Tsutomu Matsumoto
    Human Identification Through Insecure Channel. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:409-421 [Conf]
  22. Tsutomu Matsumoto, Hideki Imai
    Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:419-453 [Conf]
  23. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:412-422 [Conf]
  24. Masayuki Kanda, Tsutomu Matsumoto
    Security of Camellia against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:286-299 [Conf]
  25. Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto
    A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:221-235 [Conf]
  26. Kei Senda, Tsutomu Matsumoto, Yuzo Okano
    A study toward cognitive action with environment recognition by a learning space robot. [Citation Graph (0, 0)][DBLP]
    ICRA, 2003, pp:797-802 [Conf]
  27. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
    Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:408-421 [Conf]
  28. Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa, Ichiro Murase
    Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1039-1048 [Conf]
  29. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
    A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
  30. Tsutomu Matsumoto, Toshikazu Kagami, Kouichi Tomita, Brenda Mallinson
    A support system to formulate care plans for senior citizens & dataInput methods for a Web database. [Citation Graph (0, 0)][DBLP]
    WebNet, 1998, pp:- [Conf]
  31. Tsutomu Matsumoto, Tomonori Wasaki, Mitomo Okayama, Katsunori Horikawa, Toshiriro Hayashi, Mike Nga
    A Web site for counseling on students' future courses. [Citation Graph (0, 0)][DBLP]
    WebNet, 1996, pp:- [Conf]
  32. Kiyoteru Motoda, Wakako Tokumaru, Hideo Kiyohara, Tsutomu Matsumoto
    Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware. [Citation Graph (0, 0)][DBLP]
    WebNet, 1996, pp:- [Conf]
  33. Tsutomu Matsumoto
    Getting Users' Attributed Without Violating Anonymity. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:439-443 [Conf]
  34. Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto
    Information Hiding on Lossless Data Compression. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:15-18 [Conf]
  35. Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino
    Impact of Artificial "Gummy" Fingers on Fingerprint Systems. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
  36. Jun Anzai, Tsutomu Matsumoto
    Interaction Key Generation Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:152-159 [Journal]
  37. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
    Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
  38. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
    On Collusion Security of Random Codes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:296-304 [Journal]
  39. Tsutomu Matsumoto
    Human-Computer Cryptography: An Attempt. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:129-150 [Journal]

  40. Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. [Citation Graph (, )][DBLP]


  41. A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style. [Citation Graph (, )][DBLP]


  42. Prototyping security test objects for use with advanced biometric authentication systems. [Citation Graph (, )][DBLP]


  43. Designing and Implementation of Tele-Health Care Information System based on Health Care Model. [Citation Graph (, )][DBLP]


  44. Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System. [Citation Graph (, )][DBLP]


  45. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. [Citation Graph (, )][DBLP]


  46. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. [Citation Graph (, )][DBLP]


  47. Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002