Tsutomu Matsumoto

According to our database1, Tsutomu Matsumoto authored at least 105 papers between 1985 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Transactions, 2020

Laser-Induced Controllable Instruction Replacement Fault Attack.
IEICE Transactions, 2020

An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal.
IEICE Transactions, 2019

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs.
IEEE Trans. on Circuits and Systems, 2018

IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.
JIP, 2018

Toward Collaborative Defense Across Organizations.
JIP, 2018

Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
JIP, 2016

Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks.
IEICE Transactions, 2016

ASIC implementation of random number generators using SR latches and its evaluation.
EURASIP J. Information Security, 2016

Optical nano artifact metrics using silicon random nanostructures.
CoRR, 2016

Evaluating Malware Mitigation by Android Market Operators.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

How to design hardware prime field multipliers for bilinear pairing.
Proceedings of the International SoC Design Conference, 2016

Evaluation of Latch-Based PUFs Implemented on 40 nm ASICs.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
JIP, 2015

IoTPOT: Analysing the Rise of IoT Compromises.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Dynamic Behavior of RS latches using FIB processing and probe connection.
IACR Cryptology ePrint Archive, 2014

Nano-artifact metrics based on random collapse of resist.
CoRR, 2014

IEICE Transactions, 2013

Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Transactions, 2013

Search Engine Based Investigation on Misconfiguration of Zone Transfer.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
JIP, 2012

A proper security analysis method for CMOS cryptographic circuits.
IEICE Electronic Express, 2012

A Method of Preventing Unauthorized Data Transmission in Controller Area Network.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.
JIP, 2011

Empirical Study on Privacy Concerns and the Acceptance of e-Money in Japan.
JIP, 2011

How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers.
IEICE Transactions, 2011

How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation.
IEICE Transactions, 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Transactions, 2011

Self destructive tamper response for software protection.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection.
IEICE Transactions, 2010

A Design Methodology for a DPA-Resistant Circuit with RSL Techniques.
IEICE Transactions, 2010

Vulnerability in Public Malware Sandbox Analysis Systems.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Web-Based Data Leakage Prevention.
Proceedings of the Advances in Information and Computer Security, 2010

Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Proceedings of the Progress in Cryptology, 2010

Information-Flow-Based Access Control for Web Browsers.
IEICE Transactions, 2009

Unconditionally Secure Group Signatures.
IEICE Transactions, 2009

Updating Quantum Cryptography Report ver. 1.
CoRR, 2009

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009

Unconditionally Secure Steganography Against Active Attacks.
IEEE Trans. Information Theory, 2008

Information Hiding on Lossless Data Compression.
JDIM, 2008

Individuality evaluation for paper based artifact-metrics using transmitted light image.
Proceedings of the Security, 2008

Fingerprinting Traffic Log.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Prototyping security test objects for use with advanced biometric authentication systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Unconditionally Secure Blind Signatures.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.
Proceedings of the Advances in Computer Science, 2006

On Collusion Security of Random Codes.
IEICE Transactions, 2005

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions, 2005

A Distributed User Revocation Scheme for Ad-Hoc Networks.
IEICE Transactions, 2005

Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Authenticated encryption and steganography in unconditional security setting.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

How to Construct Secure Cryptographic Location-Based Services.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Multiparty DSA Signature Generation without Simultaneous User Operations.
IEICE Transactions, 2004

Interaction Key Generation Schemes.
IEICE Transactions, 2004

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003

A study toward cognitive action with environment recognition by a learning space robot.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003

Impact of Artificial "Gummy" Fingers on Fingerprint Systems.
Datenschutz und Datensicherheit, 2002

Scheme of standard MIDI files steganography and its evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

A Software System for Giving Clues of Medical Diagnosis to Clinician.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002

Gummy and Conductive Silicone Rubber Fingers.
Proceedings of the Advances in Cryptology, 2002

Security of Camellia against Truncated Differential Cryptanalysis.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Designing and Implementation of Tele-Health Care Information System based on Health Care Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

Truss assembly by space robot and task error recovery via reinforcement learning.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000

Light Weight Broadcast Exclusion Using Secret Sharing.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999

A Quick Group Key Distribution Scheme with "Entity Revocation".
Proceedings of the Advances in Cryptology, 1999

Human-Computer Cryptography: An Attempt.
Journal of Computer Security, 1998

Getting Users' Attributed Without Violating Anonymity.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998

A support system to formulate care plans for senior citizens & dataInput methods for a Web database.
Proceedings of WebNet 98, 1998

A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998

A Support System To Make Care Plan of Elders.
Proceedings of the MEDINFO '98, 1998

Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware.
Proceedings of WebNet 96, 1996

A Web site for counseling on students' future courses.
Proceedings of WebNet 96, 1996

Incidence Structures for Key Sharing (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

High-Speed Implementation Methods for RSA Scheme.
Proceedings of the Advances in Cryptology, 1992

On Verifiable Implicit Asking Protocols for RSA Computation.
Proceedings of the Advances in Cryptology, 1992

Non-Interactive Generation of Shared Pseudorandom Sequences.
Proceedings of the Advances in Cryptology, 1992

Construction and evaluation of the identity transformers for cryptographic key distribution.
Systems and Computers in Japan, 1991

Human Identification Through Insecure Channel.
Proceedings of the Advances in Cryptology, 1991

A Multi-Purpose Proof System - for Identity and Membership Proofs.
Proceedings of the Advances in Cryptology, 1991

Structural Properties of One-way Hash Functions.
Proceedings of the Advances in Cryptology, 1990

A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1990

Duality between Two Cryptographic Primitives.
Proceedings of the Applied Algebra, 1990

Autonomous navigation system for mobile robots using a route map.
Advanced Robotics, 1989

Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989

A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Systems and Computers in Japan, 1988

Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Proceedings of the Advances in Cryptology, 1988

Speeding Up Secret Computations with Insecure Auxiliary Devices.
Proceedings of the Advances in Cryptology, 1988

On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Proceedings of the Advances in Cryptology, 1987

Coding Theory and its Applications in Japan.
Proceedings of the Applied Algebra, 1987

Algebraic Methods for Constructing Asymmetric Cryptosystems.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985