Shin'ichiro Matsuo
Shin'ichiro Matsuo
Research Professor of Computer Science, Georgetown University
Dirección de correo verificada de - Página principal
Citado por
Citado por
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII.
K Kobayashi, J Ikegami, KS Shin'ichiro Matsuo, K Sakiyama, K Ohta
IACR Cryptol. ePrint Arch. 2010, 10, 2010
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate
S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ...
2nd SHA-3 Candidate Conference, Santa Barbara, August, 23-24, 2010
How to evaluate the security of real-life cryptographic protocols?
S Matsuo, K Miyazaki, A Otsuka, D Basin
International Conference on Financial Cryptography and Data Security, 182-194, 2010
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
T Hayashi, N Shinohara, L Wang, S Matsuo, M Shirase, T Takagi
International Workshop on Public Key Cryptography, 351-367, 2010
Prototyping platform for performance evaluation of SHA-3 candidates
K Kobayashi, J Ikegami, M Knežević, EX Guo, S Matsuo, S Huang, ...
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
Toward practical searchable symmetric encryption
W Ogata, K Koiwa, A Kanaoka, S Matsuo
International Workshop on Security, 151-167, 2013
PUF-based RFID authentication secure and private under memory leakage
D Moriyama, S Matsuo, M Yung
IACR Cryptol. ePrint Arch 3, 61-83, 2013
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication
Y HanataniI, M Ohkubo, S Matsuo, K Sakiyama, K Ohta
International Conference on Financial Cryptography and Data Security, 70-87, 2011
Relations among notions of privacy for RFID authentication protocols
D Moriyama, S Matsuo, M Ohkubo
IEICE transactions on fundamentals of electronics, communications and …, 2014
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded …, 2013
Long-term public blockchain: Resilience against compromise of underlying cryptography
M Sato, S Matsuo
2017 26th International Conference on Computer Communication and Networks …, 2017
How formal analysis and verification add security to blockchain-based systems
SI Matsuo
2017 Formal Methods in Computer Aided Design (FMCAD), 1-4, 2017
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
Tuberculosis in patients undergoing hemodialysis
T Harada, H Sakata, R Yasumori, M Tadokoro, N Kohara, S Matsuo, ...
Kekkaku:[Tuberculosis] 64 (10), 641-648, 1989
Electronic ticket scheme for its
S Matsuo, W Ogata
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2003
Secure protocol to construct electronic trading
S Matsuo, H Morita
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2001
Divisible voting scheme
N Ishida, S Matsuo, W Ogata
International Conference on Information Security, 137-150, 2003
Relation among the security models for RFID authentication protocol
D Moriyama, S Matsuo, M Ohkubo
ECRYPT Workshop on Lightweight Cryptography, 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20