|
Search the dblp DataBase
Tsutomu Matsumoto:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hideki Imai, Tsutomu Matsumoto
Algebraic Methods for Constructing Asymmetric Cryptosystems. [Citation Graph (0, 0)][DBLP] AAECC, 1985, pp:108-119 [Conf]
- Hideki Imai, Tsutomu Matsumoto
Coding Theory and its Applications in Japan. [Citation Graph (0, 0)][DBLP] AAECC, 1987, pp:301-305 [Conf]
- Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP] AAECC, 1990, pp:379-390 [Conf]
- Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto
Light Weight Broadcast Exclusion Using Secret Sharing. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:313-327 [Conf]
- Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto
A Quick Group Key Distribution Scheme with "Entity Revocation". [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:333-347 [Conf]
- Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai
Non-Interactive Generation of Shared Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:385-396 [Conf]
- Tsutomu Matsumoto
Gummy and Conductive Silicone Rubber Fingers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:574-576 [Conf]
- Tsutomu Matsumoto
Incidence Structures for Key Sharing (Extended Abstract). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:342-353 [Conf]
- Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:296-307 [Conf]
- Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai
A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1991, pp:397-411 [Conf]
- Tsutomu Matsumoto, Yuki Ueda, Shigeyasu Kawaji
A Software System for Giving Clues of Medical Diagnosis to Clinician. [Citation Graph (0, 0)][DBLP] CBMS, 2002, pp:65-70 [Conf]
- Tsutomu Matsumoto
Human-Computer Cryptography: An Attempt. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:68-75 [Conf]
- Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:564-574 [Conf]
- Tsutomu Matsumoto, Hideki Imai
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP] CRYPTO, 1987, pp:185-193 [Conf]
- Tsutomu Matsumoto, Koki Kato, Hideki Imai
Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP] CRYPTO, 1988, pp:497-506 [Conf]
- Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP] CRYPTO, 1989, pp:461-480 [Conf]
- Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:285-302 [Conf]
- Jun Anzai, Tsutomu Matsumoto
How to Construct Secure Cryptographic Location-Based Services. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:894-904 [Conf]
- Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:221-238 [Conf]
- Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:477-481 [Conf]
- Tsutomu Matsumoto
Human Identification Through Insecure Channel. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:409-421 [Conf]
- Tsutomu Matsumoto, Hideki Imai
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:419-453 [Conf]
- Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:412-422 [Conf]
- Masayuki Kanda, Tsutomu Matsumoto
Security of Camellia against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:286-299 [Conf]
- Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:221-235 [Conf]
- Kei Senda, Tsutomu Matsumoto, Yuzo Okano
A study toward cognitive action with environment recognition by a learning space robot. [Citation Graph (0, 0)][DBLP] ICRA, 2003, pp:797-802 [Conf]
- Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:408-421 [Conf]
- Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa, Ichiro Murase
Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. [Citation Graph (0, 0)][DBLP] KES (3), 2005, pp:1039-1048 [Conf]
- Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
- Tsutomu Matsumoto, Toshikazu Kagami, Kouichi Tomita, Brenda Mallinson
A support system to formulate care plans for senior citizens & dataInput methods for a Web database. [Citation Graph (0, 0)][DBLP] WebNet, 1998, pp:- [Conf]
- Tsutomu Matsumoto, Tomonori Wasaki, Mitomo Okayama, Katsunori Horikawa, Toshiriro Hayashi, Mike Nga
A Web site for counseling on students' future courses. [Citation Graph (0, 0)][DBLP] WebNet, 1996, pp:- [Conf]
- Kiyoteru Motoda, Wakako Tokumaru, Hideo Kiyohara, Tsutomu Matsumoto
Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware. [Citation Graph (0, 0)][DBLP] WebNet, 1996, pp:- [Conf]
- Tsutomu Matsumoto
Getting Users' Attributed Without Violating Anonymity. [Citation Graph (0, 0)][DBLP] WWCA, 1998, pp:439-443 [Conf]
- Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Tsutomu Matsumoto
Information Hiding on Lossless Data Compression. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:15-18 [Conf]
- Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino
Impact of Artificial "Gummy" Fingers on Fingerprint Systems. [Citation Graph (0, 0)][DBLP] Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
- Jun Anzai, Tsutomu Matsumoto
Interaction Key Generation Schemes. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:152-159 [Journal]
- Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
- Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
On Collusion Security of Random Codes. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:296-304 [Journal]
- Tsutomu Matsumoto
Human-Computer Cryptography: An Attempt. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1998, v:6, n:3, pp:129-150 [Journal]
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. [Citation Graph (, )][DBLP]
A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style. [Citation Graph (, )][DBLP]
Prototyping security test objects for use with advanced biometric authentication systems. [Citation Graph (, )][DBLP]
Designing and Implementation of Tele-Health Care Information System based on Health Care Model. [Citation Graph (, )][DBLP]
Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System. [Citation Graph (, )][DBLP]
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. [Citation Graph (, )][DBLP]
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. [Citation Graph (, )][DBLP]
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.306secs
|