Research Output 1982 2016

  • 823 Citations
  • 10 h-Index
  • 68 Article
  • 46 Conference contribution
Filter
Article
2016
1 Citations

ASIC implementation of random number generators using SR latches and its evaluation

Torii, N., Kokubo, H., Yamamoto, D., Itoh, K., Takenaka, M. & Matsumoto, T. 2016 Dec 1 In : Eurasip Journal on Information Security. 2016, 1, 10

Research output: Contribution to journalArticle

Application specific integrated circuits
Entropy
Statistical tests
Field programmable gate arrays (FPGA)
Electric power utilization
1 Citations

Eigenanalysis of morphological diversity in silicon random nanostructures formed via resist collapse

Naruse, M., Hoga, M., Ohyagi, Y., Nishio, S., Tate, N., Yoshida, N. & Matsumoto, T. 2016 Nov 15 In : Physica A: Statistical Mechanics and its Applications. 462, p. 883-888 6 p.

Research output: Contribution to journalArticle

Nanostructures
Silicon
Security of data
Focused ion beams
Experiments
Application specific integrated circuits
Dynamic analysis
1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Optical nano artifact metrics using silicon random nanostructures

Matsumoto, T., Yoshida, N., Nishio, S., Hoga, M., Ohyagi, Y., Tate, N. & Naruse, M. 2016 Aug 31 In : Scientific Reports. 6, 32438

Research output: Contribution to journalArticle

silicon
artifact
clone
experimental apparatus
biometry
9 Citations

Roadmap on optical security

Matsumoto, T. & 27 others Javidi, B., Carnicer, A., Yamaguchi, M., Nomura, T., Pérez-Cabré, E., Millán, M. S., Nishchal, N. K., Torroba, R., Barrera, J. F., He, W., Peng, X., Stern, A., Rivenson, Y., Alfalou, A., Brosseau, C., Guo, C., Sheridan, J. T., Situ, G., Naruse, M., Juvells, I., Tajahuerce, E., Lancis, J., Chen, W., Chen, X., Pinkse, P. W. H., Mosk, A. P. & Markman, A. 2016 Aug 1 In : Journal of Optics. 18, 8, 083001

Research output: Contribution to journalArticle

Cryptography
Security of data
Authentication
Photons
Imaging techniques
2015

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Non-scanning optical near-field microscopy for nanophotonic security

Tate, N., Naruse, M., Matsumoto, T., Hoga, M., Ohyagi, Y., Nishio, S., Nomura, W. & Ohtsu, M. 2015 In : International Journal of Metalcasting. 9, 1, p. 1383-1387 5 p.

Research output: Contribution to journalArticle

Nanophotonics
Optical microscopy
Nanorods
Microscopic examination
Demonstrations
2014
6 Citations

Nano-artifact metrics based on random collapse of resist

Matsumoto, T., Hoga, M., Ohyagi, Y., Ishikawa, M., Naruse, M., Hanaki, K., Suzuki, R., Sekiguchi, D., Tate, N. & Ohtsu, M. 2014 Aug 21 In : Scientific Reports. 4, 6142

Research output: Contribution to journalArticle

artifact
clone
pillar
silicon
electron
5 Citations

Unidirectional light propagation through two-layer nanostructures based on optical near-field interactions

Naruse, M., Hori, H., Ishii, S., Drezet, A., Huant, S., Hoga, M., Ohyagi, Y., Matsumoto, T., Tate, N. & Ohtsu, M. 2014 Jan 1 In : Journal of the Optical Society of America B: Optical Physics. 31, 10, p. 2404-2413 10 p.

Research output: Contribution to journalArticle

Nanostructures
Light propagation
Light transmission
Conversion efficiency
Optical properties
2013
Malware
Pattern matching
Modems
Viruses
Application programming interfaces (API)
2 Citations

Optical near-field-mediated polarization asymmetry induced by two-layer nanostructures

Naruse, M., Tate, N., Ohyagi, Y., Hoga, M., Matsumoto, T., Hori, H., Drezet, A., Huant, S. & Ohtsu, M. 2013 Sep 23 In : Optics Express. 21, 19, p. 21857-21870 14 p.

Research output: Contribution to journalArticle

Nanostructures
Polarization
Nanophotonics
Conversion efficiency
Optical fibers
Security of data
Cryptography
2012
1 Citations

A proper security analysis method for CMOS cryptographic circuits

Takahashi, Y. & Matsumoto, T. 2012 Mar 25 In : IEICE Electronics Express. 9, 6, p. 458-463 6 p.

Research output: Contribution to journalArticle

Electric power utilization
Experiments

Malware sandbox analysis with efficient observation of Herder's behavior

Kasama, T., Yoshioka, K., Matsumoto, T., Yamagata, M., Eto, M., Inoue, D. & Nakao, K. 2012 Dec 21 In : Journal of Information Processing. 20, 4, p. 835-845 11 p.

Research output: Contribution to journalArticle

Malware
Servers
Internet
Observability
Hazardous materials spills
2011
2 Citations

An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation

Kim, H. C., Orii, T., Yoshioka, K., Inoue, D., Song, J., Eto, M., Shikata, J., Matsumoto, T. & Nakao, K. 2011 Sep 1 In : IEICE Transactions on Information and Systems. E94-D, 9, p. 1778-1791 14 p.

Research output: Contribution to journalArticle

Malware
Purging
Experiments
1 Citations

Empirical study on privacy concerns and the acceptance of e-money in Japan

Komatsu, A. & Matsumoto, T. 2011 In : Journal of Information Processing. 19, p. 307-316 10 p.

Research output: Contribution to journalArticle

Economics
Regression analysis
Application specific integrated circuits
Side channel attack
7 Citations
Field programmable gate arrays (FPGA)
Scalability
Delay circuits
3 Citations

Your sandbox is blinded: Impact of decoy injection to public malware analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2011 In : Journal of Information Processing. 19, p. 153-168 16 p.

Research output: Contribution to journalArticle

Malware
Internet
Websites
Screening
Testing
2010
2 Citations

A design methodology for a DPA-resistant circuit with RSL techniques

Suzuki, D., Saeki, M., Shimizu, K., Satoh, A. & Matsumoto, T. 2010 Dec 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 12, p. 2497-2508 12 p.

Research output: Contribution to journalArticle

Logic gates
Hardware
Side channel attack
Switching circuits
Logic circuits
4 Citations
Malware
Internet
HTTP
Servers
Testing
2009
3 Citations

Information-flow-based access control for web browsers

Yoshihama, S., Tateishi, T., Tabuchi, N. & Matsumoto, T. 2009 Dec 1 In : IEICE Transactions on Information and Systems. E92-D, 5, p. 836-850 15 p.

Research output: Contribution to journalArticle

Access control
Web browsers
World Wide Web
1 Citations

Unconditionally secure group signatures

Seito, T., Hara, Y., Shikata, J. & Matsumoto, T. 2009 Aug 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 8, p. 2067-2085 19 p.

Research output: Contribution to journalArticle

Cryptography
Managers
2008
1 Citations

Information hiding on lossless data compression

Yoshioka, K., Sonoda, K., Takizawa, O. & Matsumoto, T. 2008 Dec 1 In : Journal of Digital Information Management. 6, 2, p. 151-156 6 p.

Research output: Contribution to journalArticle

Data compression
7 Citations

Unconditionally secure steganography against active attacks

Shikata, J. & Matsumoto, T. 2008 Jun 1 In : IEEE Transactions on Information Theory. 54, 6, p. 2690-2705 16 p.

Research output: Contribution to journalArticle

Steganography
Cryptography
2007

Special section on cryptography and information security

Matsumoto, T. & 32 others Morii, M., Moriai, S., Hanaoka, G., Akishita, T., Izu, T., Iwata, T., Okada, K., Kaneko, T., Kikuchi, H., Kim, K., Kiyomoto, S., Kunthiro, N., Koga, H., Kobara, K., Sakai, R., Sakurai, K., Sako, K., Satoh, T., Shiozaki, A., Shizuya, H., Takagi, T., Tada, M., Tanaka, K., Doi, H., Nakanishi, T., Hirose, S., Fujisaki, E., Furuya, S., Matsui, M., Matsuzaki, N., Miyaji, A. & Yoshida, M. 2007 Jan 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E90-A, 1

Research output: Contribution to journalArticle

Security of data
Cryptography
2006

Analysis of document authentication technique using soft magnetic fibers

Aoki, A., Ikeda, T., Yamada, T., Takemura, Y. & Matsumoto, T. 2006 May 11 In : IEEJ Transactions on Fundamentals and Materials. 126, 5, p. 269-275 7 p.

Research output: Contribution to journalArticle

Fibers
Authentication
Magnetoresistance
Sensors
Metric system
2005

A distributed user revocation scheme for ad-hoc networks

Anzai, J. & Matsumoto, T. 2005 Sep 1 In : IEICE Transactions on Communications. E88-B, 9, p. 3635-3642 8 p.

Research output: Contribution to journalArticle

Ad hoc networks
Peer to peer networks
Communication
54 Citations

Digitally signed document sanitizing scheme with disclosure condition control

Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S. & Imai, H. 2005 Jan 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 239-246 8 p.

Research output: Contribution to journalArticle

Electronic document identification systems
2 Citations

Information hiding on digital documents by adjustment of new-line positions

Takizawa, O., Matsumoto, T., Nakagawa, H., Murase, I. & Makino, K. 2005 Mar 1 In : Journal of the National Institute of Information and Communications Technology. 52, 1-2, p. 153-170 18 p., 3-8

Research output: Contribution to journalArticle

Redundancy
3 Citations
Experiments

Special section on cryptography and information security

Matsumoto, T. & 31 others Izu, T., Iwata, T., Moriai, S., Asano, T., Kaneko, T., Kim, K., Kunihiro, N., Kuwakado, H., Koga, H., Kobara, K., Sakai, R., Sakurai, K., Satoh, T., Shiozaki, A., Shimizu, H., Tada, M., Takagi, T., Tanaka, K., Tanaka, T., Tsunoo, Y., Doi, H., Fujisaki, E., Furuya, S., Matsui, M., Matsuzaki, N., Mambo, M., Miyaji, A., Murayama, Y., Yoshida, M., Watanabe, H. & Hayashi, A. 2005 Jan 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1

Research output: Contribution to journalArticle

Security of data
Cryptography
2004
4 Citations
1 Citations

Interaction Key Generation Schemes

Anzai, J. & Matsumoto, T. 2004 Jan 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 152-159 8 p.

Research output: Contribution to journalArticle

Communication

Multiparty DSA signature generation without simultaneous user operations

Sameshima, Y., Saisho, H., Oyanagi, K. & Matsumoto, T. 2004 Aug 1 In : IEICE Transactions on Information and Systems. E87-D, 8, p. 2095-2105 11 p.

Research output: Contribution to journalArticle

Electronic document identification systems
Smart cards
7 Citations

Unconditionally secure authenticated encryption

Shikata, J., Hanaoka, G., Zheng, Y., Matsumoto, T. & Imai, H. 2004 May 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 5, p. 1119-1131 13 p.

Research output: Contribution to journalArticle

Cryptography
Chemical analysis
Information theory
2003
3 Citations

A flexible tree-based key management framework

Matsuzaki, N., Nakano, T. & Matsumoto, T. 2003 Jan 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E86-A, 1, p. 129-135 7 p.

Research output: Contribution to journalArticle

Bulletin boards
Forestry
Stamping
Availability
Costs
6 Citations

Detection-Resistant Steganography for Standard MIDI Files

Inoue, D., Suzuki, M. & Matsumoto, T. 2003 Aug 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E86-A, 8, p. 2099-2106 8 p.

Research output: Contribution to journalArticle

Steganography
Communication
4 Citations
Random errors
Cathode ray tubes
Computer simulation
4 Citations
2002
4 Citations
Stamping
Costs
Electronic commerce
Specifications
Communication
Internet
2 Citations
Communication
Crime
2001
2 Citations

A flexible method for masked sharing of group keys

Anza, J., Matsuzakj, N. & Matsumoto, T. 2001 Jan In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E84-A, 1, p. 239-246 8 p.

Research output: Contribution to journalArticle

Cryptography
Telecommunication
Managers
Internet
Communication
2000
22 Citations

E2 - A new 128-bit block cipher

Kanda, M., Moriai, S., Aoki, K., Ueda, H., Takashima, Y., Ohta, K. & Matsumoto, T. 2000 Dec 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E83-A, 1, p. 48-59 12 p.

Research output: Contribution to journalArticle

Cryptography
Specifications
1999
15 Citations
Cryptography