Tsutomu Matsumoto

Orcid: 0000-0002-7965-4888

According to our database1, Tsutomu Matsumoto authored at least 166 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
High-Throughput Bilinear Pairing Processor for Server-Side FPGA Applications.
IEEE Trans. Very Large Scale Integr. Syst., August, 2024

SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices.
J. Inf. Process., 2024

EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities.
J. Inf. Process., 2024

Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot.
J. Inf. Process., 2024

Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024

Observation of Human-Operated Accesses Using Remote Management Device Honeypot.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

A Trial to Embed RAM Encryption Scheme in Cryptographic Programs.
J. Inf. Process., 2023

An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

Application of Profiled Analysis to ADC-Based Remote Side-Channel Attacks.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Effective Layout Design for Laser Fault Sensor on FPGA.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022

Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure.
J. Inf. Process., 2022

Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022

Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator.
Clust. Comput., 2022

Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Group Testing Aggregate Signatures with Soundness.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Understanding the Fake Removal Information Advertisement Sites.
J. Inf. Process., 2021

Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device.
J. Inf. Process., 2021

To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Key Agreement Over Inter-Process Communication.
IEEE Access, 2021

Evaluation Framework for Performance Limitation of Autonomous Systems Under Sensor Attack.
Proceedings of the Computer Safety, Reliability, and Security, 2021

Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot.
J. Inf. Process., 2020

Dangers of IP Camera - An Observational Study on Peeping.
J. Inf. Process., 2020

RAM Encryption Mechanism without Hardware Support.
J. Inf. Process., 2020

Detecting and Understanding Online Advertising Fraud in the Wild.
IEICE Trans. Inf. Syst., 2020

Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers.
IEICE Trans. Commun., 2020

IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Trans. Commun., 2020

Laser-Induced Controllable Instruction Replacement Fault Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

An ATM Security Measure to Prevent Unauthorized Deposit with a Smart Card.
IEICE Trans. Inf. Syst., 2020

Aggregate Signature with Detecting Functionality from Group Testing.
IACR Cryptol. ePrint Arch., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

How to Code Data Integrity Verification Secure Against Single-Spot-Laser-Induced Instruction Manipulation Attacks.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal.
IEICE Trans. Inf. Syst., 2019

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Secure ATM Device Design by Control Command Verification.
Proceedings of the Applications and Techniques in Information Security, 2019

Low-Latency Pairing Processor Architecture Using Fully-Unrolled Quotient Pipelining Montgomery Multiplier.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
A Demonstration of a HT-Detection Method Based on Impedance Measurements of the Wiring Around ICs.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.
J. Inf. Process., 2018

Toward Collaborative Defense Across Organizations.
J. Inf. Process., 2018

Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
J. Inf. Process., 2016

Experimental Evaluation on the Resistance of Latch PUFs Implemented on ASIC against FIB-Based Invasive Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

ASIC implementation of random number generators using SR latches and its evaluation.
EURASIP J. Inf. Secur., 2016

Optical nano artifact metrics using silicon random nanostructures.
CoRR, 2016

Evaluating Malware Mitigation by Android Market Operators.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

How to design hardware prime field multipliers for bilinear pairing.
Proceedings of the International SoC Design Conference, 2016

Evaluation of Latch-Based PUFs Implemented on 40 nm ASICs.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Laser irradiation on EEPROM sense amplifiers enhances side-channel leakage of read bits.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
J. Inf. Process., 2015

IoTPOT: Analysing the Rise of IoT Compromises.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Dynamic Behavior of RS latches using FIB processing and probe connection.
IACR Cryptol. ePrint Arch., 2014

Nano-artifact metrics based on random collapse of resist.
CoRR, 2014

2013
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Search Engine Based Investigation on Misconfiguration of Zone Transfer.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

A proper security analysis method for CMOS cryptographic circuits.
IEICE Electron. Express, 2012

A Method of Preventing Unauthorized Data Transmission in Controller Area Network.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.
J. Inf. Process., 2011

Empirical Study on Privacy Concerns and the Acceptance of e-Money in Japan.
J. Inf. Process., 2011

How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Self destructive tamper response for software protection.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A Design Methodology for a DPA-Resistant Circuit with RSL Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Vulnerability in Public Malware Sandbox Analysis Systems.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Web-Based Data Leakage Prevention.
Proceedings of the Advances in Information and Computer Security, 2010

Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Proceedings of the Progress in Cryptology, 2010

2009
Information-Flow-Based Access Control for Web Browsers.
IEICE Trans. Inf. Syst., 2009

Unconditionally Secure Group Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Updating Quantum Cryptography Report ver. 1.
CoRR, 2009

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009

Complementary logics vs masked logics: Which countermeasure is a better selection?
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

2008
Unconditionally Secure Steganography Against Active Attacks.
IEEE Trans. Inf. Theory, 2008

Information Hiding on Lossless Data Compression.
J. Digit. Inf. Manag., 2008

Individuality evaluation for paper based artifact-metrics using transmitted light image.
Proceedings of the Security, 2008

Fingerprinting Traffic Log.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Prototyping security test objects for use with advanced biometric authentication systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

A Design of Information System Improving Dietary Habit Based on Individual Clinical Data and Life Style.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Unconditionally Secure Blind Signatures.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.
Proceedings of the Advances in Computer Science, 2006

2005
On Collusion Security of Random Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Distributed User Revocation Scheme for Ad-Hoc Networks.
IEICE Trans. Commun., 2005

Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Authenticated encryption and steganography in unconditional security setting.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

How to Construct Secure Cryptographic Location-Based Services.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Multiparty DSA Signature Generation without Simultaneous User Operations.
IEICE Trans. Inf. Syst., 2004

Interaction Key Generation Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
Random-Error Resilience of a Short Collusion-Secure Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

An Evaluation Method of Time Stamping Schemes from Viewpoints of Integrity, Cost and Availability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Flexible Tree-Based Key Management Framework.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Detection-Resistant Steganography for Standard MIDI Files.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003

A study toward cognitive action with environment recognition by a learning space robot.
Proceedings of the 2003 IEEE International Conference on Robotics and Automation, 2003

Medical decision support system using clinical laboratory data, remarks and symptoms.
Proceedings of the American Control Conference, 2003

2002
A Framework to Evaluate Security and Cost of Time Stamping Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Scheme of Secret Communication Using Internet Control Message Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Rivulet: An Anonymous Communication Method Based on Group Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Impact of Artificial "Gummy" Fingers on Fingerprint Systems.
Datenschutz und Datensicherheit, 2002

Scheme of standard MIDI files steganography and its evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

A Software System for Giving Clues of Medical Diagnosis to Clinician.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002

Gummy and Conductive Silicone Rubber Fingers.
Proceedings of the Advances in Cryptology, 2002

2001
Developing a Human Behavior Model at Home and Its Application.
Proceedings of the MEDINFO 2001, 2001

Security of Camellia against Truncated Differential Cryptanalysis.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Designing and Implementation of Tele-Health Care Information System based on Health Care Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

2000
Truss assembly by space robot and task error recovery via reinforcement learning.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000

Light Weight Broadcast Exclusion Using Secret Sharing.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999

A Quick Group Key Distribution Scheme with "Entity Revocation".
Proceedings of the Advances in Cryptology, 1999

1998
Human-Computer Cryptography: An Attempt.
J. Comput. Secur., 1998

Getting Users' Attributed Without Violating Anonymity.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998

A support system to formulate care plans for senior citizens & dataInput methods for a Web database.
Proceedings of WebNet 98, 1998

A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998

A Support System To Make Care Plan of Elders.
Proceedings of the MEDINFO '98, 1998

1996
Evaluation of multimedia authoring tool TSUMIKI through developing AIDS courseware.
Proceedings of WebNet 96, 1996

A Web site for counseling on students' future courses.
Proceedings of WebNet 96, 1996

1994
Incidence Structures for Key Sharing (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

High-Speed Implementation Methods for RSA Scheme.
Proceedings of the Advances in Cryptology, 1992

On Verifiable Implicit Asking Protocols for RSA Computation.
Proceedings of the Advances in Cryptology, 1992

Non-Interactive Generation of Shared Pseudorandom Sequences.
Proceedings of the Advances in Cryptology, 1992

1991
Construction and evaluation of the identity transformers for cryptographic key distribution.
Syst. Comput. Jpn., 1991

Human Identification Through Insecure Channel.
Proceedings of the Advances in Cryptology, 1991

A Multi-Purpose Proof System - for Identity and Membership Proofs.
Proceedings of the Advances in Cryptology, 1991

1990
Structural Properties of One-way Hash Functions.
Proceedings of the Advances in Cryptology, 1990

A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1990

Duality between Two Cryptographic Primitives.
Proceedings of the Applied Algebra, 1990

1989
Autonomous navigation system for mobile robots using a route map.
Adv. Robotics, 1989

Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989

1988
A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Syst. Comput. Jpn., 1988

Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Proceedings of the Advances in Cryptology, 1988

Speeding Up Secret Computations with Insecure Auxiliary Devices.
Proceedings of the Advances in Cryptology, 1988

1987
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Proceedings of the Advances in Cryptology, 1987

Coding Theory and its Applications in Japan.
Proceedings of the Applied Algebra, 1987

1985
Algebraic Methods for Constructing Asymmetric Cryptosystems.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985


  Loading...