Shin'ichiro Matsuo
Shin'ichiro Matsuo
Research Professor of Computer Science, Georgetown University
Verified email at - Homepage
Cited by
Cited by
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, ‹ Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
Evaluation of hardware performance for the SHA-3 candidates using SASEBO-GII
K Kobayashi, J Ikegami, S Matsuo, K Sakiyama, K Ohta
Cryptology ePrint Archive, 2010
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate
S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ...
2nd SHA-3 Candidate Conference, 1-15, 2010
Long-term public blockchain: Resilience against compromise of underlying cryptography
M Sato, S Matsuo
2017 26th International Conference on Computer Communication and Networks†…, 2017
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
S Matsuo, K Miyazaki, A Otsuka, D Basin
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR†…, 2010
Solving a 676-Bit Discrete Logarithm Problem in GF(36n )
T Hayashi, N Shinohara, L Wang, S Matsuo, M Shirase, T Takagi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice†…, 2010
PUF-based RFID authentication secure and private under memory leakage
D Moriyama, S Matsuo, M Yung
Cryptology ePrint Archive, 2013
Toward practical searchable symmetric encryption
W Ogata, K Koiwa, A Kanaoka, S Matsuo
Advances in Information and Computer Security: 8th International Workshop on†…, 2013
Prototyping platform for performance evaluation of SHA-3 candidates
K Kobayashi, J Ikegami, M Knežević, EX Guo, S Matsuo, S Huang, ...
2010 IEEE International Symposium on Hardware-Oriented Security and Trust†…, 2010
Clinical guides for immunoglobulin A (IgA) nephropathy in Japan, third version
S Matsuo
Jpn J Nephrol 53, 123, 2011
How formal analysis and verification add security to blockchain-based systems
SI Matsuo
2017 Formal Methods in Computer Aided Design (FMCAD), 1-4, 2017
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication
Y HanataniI, M Ohkubo, S Matsuo, K Sakiyama, K Ohta
Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR†…, 2012
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded†…, 2013
Fairness in ERC token markets: A case study of CryptoKitties
K Sako, S Matsuo, S Meier
Financial Cryptography and Data Security. FC 2021 International Workshops†…, 2021
Relations among notions of privacy for RFID authentication protocols
D Moriyama, S Matsuo, M Ohkubo
IEICE transactions on fundamentals of electronics, communications and†…, 2014
Electronic ticket scheme for its
S Matsuo, W Ogata
IEICE transactions on fundamentals of electronics, communications and†…, 2003
Tuberculosis in patients undergoing hemodialysis
T Harada, H Sakata, R Yasumori, M Tadokoro, N Kohara, S Matsuo, ...
Kekkaku:[Tuberculosis] 64 (10), 641-648, 1989
Divisible voting scheme
N Ishida, S Matsuo, W Ogata
Information Security: 6th International Conference, ISC 2003, Bristol, UK†…, 2003
The system can't perform the operation now. Try again later.
Articles 1–20