What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tsutomu Matsumoto
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service.
Takayuki Sasaki
Tomoya Inazawa
Youhei Yamaguchi
Simon Parkin
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2024
conf/sp
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Takayuki Sasaki
Takaya Noma
Yudai Morii
Toshiya Shimura
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2023
conf/uss
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Yin Minn Pa Pa
Shunsuke Tanizaki
Tetsui Kou
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2023
conf/fc
Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Ryuya Hayashi
Taiki Asano
Junichiro Hayata
Takahiro Matsuda
Shota Yamada
Shuichi Katsumata
Yusuke Sakai
Tadanori Teruya
Jacob C. N. Schuldt
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2022
conf/asiajcis
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices.
Hiroki Yasui
Takahiro Inoue
Takayuki Sasaki
Rui Tanabe
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/sp
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Takayuki Sasaki
Akira Fujita
Carlos Hernandez Gañán
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/acns
Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level.
Zihao Song
Junichi Sakamoto
Shigeo Mitsunari
Naoki Yoshida
Riku Anzai
Tsutomu Matsumoto
2022
conf/icisc
Group Testing Aggregate Signatures with Soundness.
Shingo Sato
Junji Shikata
Tsutomu Matsumoto
2021
conf/acns
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Ryu Ishii
Kyosuke Yamashita
Yusuke Sakai
Takahiro Matsuda
Tadanori Teruya
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2016
conf/ccs
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
Naoya Torii
Dai Yamamoto
Tsutomu Matsumoto
2016
conf/uss
Evaluating Malware Mitigation by Android Market Operators.
Yosuke Kikuchi
Hiroshi Mori
Hiroki Nakano
Katsunari Yoshioka
Tsutomu Matsumoto
Michel van Eeten
2016
conf/asiajcis
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Satomi Saito
Satoru Torii
Katsunari Yoshioka
Tsutomu Matsumoto
2016
conf/acns
Attribute Based Encryption with Direct Efficiency Tradeoff.
Nuttapong Attrapadung
Goichiro Hanaoka
Tsutomu Matsumoto
Tadanori Teruya
Shota Yamada
2016
conf/host
Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits.
Junichi Sakamoto
Daisuke Fujimoto
Tsutomu Matsumoto
2015
conf/icisc
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Jiawei Su
Katsunari Yoshioka
Junji Shikata
Tsutomu Matsumoto
2013
conf/asiajcis
Search Engine Based Investigation on Misconfiguration of Zone Transfer.
Yin Minn Pa Pa
Katsunari Yoshioka
Tsutomu Matsumoto
2011
conf/ccs
Self destructive tamper response for software protection.
Kazuomi Oishi
Tsutomu Matsumoto
2010
conf/iwsec
Web-Based Data Leakage Prevention.
Sachiko Yoshihama
Takuya Mishina
Tsutomu Matsumoto
2010
conf/africacrypt
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Takenobu Seito
Tadashi Aikawa
Junji Shikata
Tsutomu Matsumoto
2008
conf/ccs
Prototyping security test objects for use with advanced biometric authentication systems.
Tsutomu Matsumoto
2007
conf/wisa
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.
Yoshiki Sameshima
Hideaki Saisho
Tsutomu Matsumoto
Norihisa Komoda
2002
conf/asiacrypt
Gummy and Conductive Silicone Rubber Fingers.
Tsutomu Matsumoto
2001
conf/fse
Security of Camellia against Truncated Differential Cryptanalysis.
Masayuki Kanda
Tsutomu Matsumoto
2000
conf/acisp
Light Weight Broadcast Exclusion Using Secret Sharing.
Natsume Matsuzaki
Jun Anzai
Tsutomu Matsumoto
1999
conf/icisc
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Tetsuya Tamura
Kouichi Sakurai
Tsutomu Matsumoto
1999
conf/asiacrypt
A Quick Group Key Distribution Scheme with "Entity Revocation".
Jun Anzai
Natsume Matsuzaki
Tsutomu Matsumoto
1998
conf/sacrypt
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Masayuki Kanda
Youichi Takashima
Tsutomu Matsumoto
Kazumaro Aoki
Kazuo Ohta
1996
conf/ccs
Human-Computer Cryptography: An Attempt.
Tsutomu Matsumoto
1994
conf/asiacrypt
Incidence Structures for Key Sharing (Extended Abstract).
Tsutomu Matsumoto
1992
conf/eurocrypt
High-Speed Implementation Methods for RSA Scheme.
Keiichi Iwamura
Tsutomu Matsumoto
Hideki Imai
1992
conf/eurocrypt
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Keiichi Iwamura
Tsutomu Matsumoto
Hideki Imai
1992
conf/asiacrypt
Non-Interactive Generation of Shared Pseudorandom Sequences.
Manuel Cerecedo
Tsutomu Matsumoto
Hideki Imai
1992
conf/asiacrypt
On Verifiable Implicit Asking Protocols for RSA Computation.
Tsutomu Matsumoto
Hideki Imai
Chi-Sung Laih
Sung-Ming Yen
1991
conf/eurocrypt
Human Identification Through Insecure Channel.
Tsutomu Matsumoto
Hideki Imai
1991
conf/asiacrypt
A Multi-Purpose Proof System - for Identity and Membership Proofs.
Chaosheng Shu
Tsutomu Matsumoto
Hideki Imai
1990
conf/crypto
Structural Properties of One-way Hash Functions.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1990
conf/crypto
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Kwangjo Kim
Tsutomu Matsumoto
Hideki Imai
1989
conf/crypto
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1989
conf/eurocrypt
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1988
conf/crypto
Speeding Up Secret Computations with Insecure Auxiliary Devices.
Tsutomu Matsumoto
Koki Kato
Hideki Imai
1988
conf/eurocrypt
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Tsutomu Matsumoto
Hideki Imai
1987
conf/crypto
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Tsutomu Matsumoto
Hideki Imai
Coauthors
Akira Fujita
(1)
Carlos Hernandez Gañán
(1)
Chaosheng Shu
(1)
Chi-Sung Laih
(1)
Dai Yamamoto
(1)
Daisuke Fujimoto
(1)
Goichiro Hanaoka
(3)
Hideaki Saisho
(1)
Hideki Imai
(13)
Hiroki Nakano
(1)
Hiroki Yasui
(1)
Hiroshi Mori
(1)
Jacob C. N. Schuldt
(1)
Jiawei Su
(1)
Jun Anzai
(2)
Junichi Sakamoto
(2)
Junichiro Hayata
(1)
Junji Shikata
(3)
Kanta Matsuura
(2)
Katsunari Yoshioka
(9)
Kazumaro Aoki
(1)
Kazuo Ohta
(1)
Kazuomi Oishi
(1)
Keiichi Iwamura
(2)
Koki Kato
(1)
Kouichi Sakurai
(1)
Kwangjo Kim
(1)
Kyosuke Yamashita
(1)
Manuel Cerecedo
(1)
Masayuki Kanda
(2)
Michel van Eeten
(5)
Naoki Yoshida
(1)
Naoya Torii
(1)
Natsume Matsuzaki
(2)
Norihisa Komoda
(1)
Nuttapong Attrapadung
(2)
Riku Anzai
(1)
Rui Tanabe
(1)
Ryu Ishii
(1)
Ryuya Hayashi
(1)
Sachiko Yoshihama
(1)
Satomi Saito
(1)
Satoru Torii
(1)
Shigeo Mitsunari
(1)
Shingo Sato
(1)
Shota Yamada
(2)
Shuichi Katsumata
(1)
Shunsuke Tanizaki
(1)
Simon Parkin
(1)
Sung-Ming Yen
(1)
Tadanori Teruya
(3)
Tadashi Aikawa
(1)
Taiki Asano
(1)
Takahiro Inoue
(1)
Takahiro Matsuda
(2)
Takaya Noma
(1)
Takayuki Sasaki
(4)
Takenobu Seito
(1)
Takuya Mishina
(1)
Tetsui Kou
(1)
Tetsuya Tamura
(1)
Tomoya Inazawa
(1)
Toshiya Shimura
(1)
Tsutomu Matsumoto
(42)
Yin Minn Pa Pa
(2)
Yoshiki Sameshima
(1)
Yosuke Kikuchi
(1)
Youhei Yamaguchi
(1)
Youichi Takashima
(1)
Yudai Morii
(1)
Yuliang Zheng
(3)
Yusuke Sakai
(2)
Zihao Song
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to