Follow
Shin'ichiro Matsuo
Shin'ichiro Matsuo
Research Professor of Computer Science, Georgetown University
Verified email at georgetown.edu - Homepage
Title
Cited by
Cited by
Year
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, ‹ Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
702011
Evaluation of hardware performance for the SHA-3 candidates using SASEBO-GII
K Kobayashi, J Ikegami, S Matsuo, K Sakiyama, K Ohta
Cryptology ePrint Archive, 2010
482010
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate
S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ...
2nd SHA-3 Candidate Conference, 1-15, 2010
422010
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
392012
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
S Matsuo, K Miyazaki, A Otsuka, D Basin
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR†…, 2010
382010
Long-term public blockchain: Resilience against compromise of underlying cryptography
M Sato, S Matsuo
2017 26th International Conference on Computer Communication and Networks†…, 2017
372017
Solving a 676-Bit Discrete Logarithm Problem in GF(36n )
T Hayashi, N Shinohara, L Wang, S Matsuo, M Shirase, T Takagi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice†…, 2010
342010
PUF-based RFID authentication secure and private under memory leakage
D Moriyama, S Matsuo, M Yung
Cryptology ePrint Archive, 2013
302013
Toward practical searchable symmetric encryption
W Ogata, K Koiwa, A Kanaoka, S Matsuo
Advances in Information and Computer Security: 8th International Workshop on†…, 2013
292013
Prototyping platform for performance evaluation of SHA-3 candidates
K Kobayashi, J Ikegami, M Knežević, EX Guo, S Matsuo, S Huang, ...
2010 IEEE International Symposium on Hardware-Oriented Security and Trust†…, 2010
252010
How formal analysis and verification add security to blockchain-based systems
SI Matsuo
2017 Formal Methods in Computer Aided Design (FMCAD), 1-4, 2017
202017
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication
Y HanataniI, M Ohkubo, S Matsuo, K Sakiyama, K Ohta
Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR†…, 2012
202012
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded†…, 2013
182013
Relations among notions of privacy for RFID authentication protocols
D Moriyama, S Matsuo, M Ohkubo
IEICE transactions on fundamentals of electronics, communications and†…, 2014
172014
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
172013
Fairness in ERC token markets: A case study of CryptoKitties
K Sako, S Matsuo, S Meier
Financial Cryptography and Data Security. FC 2021 International Workshops†…, 2021
142021
Electronic ticket scheme for its
S Matsuo, W Ogata
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and†…, 2003
112003
Tuberculosis in patients undergoing hemodialysis
T Harada, H Sakata, R Yasumori, M Tadokoro, N Kohara, S Matsuo, ...
Kekkaku:[Tuberculosis] 64 (10), 641-648, 1989
111989
Divisible voting scheme
N Ishida, S Matsuo, W Ogata
Information Security: 6th International Conference, ISC 2003, Bristol, UK†…, 2003
92003
THE EFFECT OF NIFEDIPINE AND NICARDIPINE ON GLUCOSE-TOLERANCE, INSULIN AND C-PEPTIDE
H Sando, H Katagiri, M Okada, R Shoda, Y Arai, S Matsuo, T Kobayashi
Diabetes 32, A66-A66, 1983
91983
The system can't perform the operation now. Try again later.
Articles 1–20