Cryptographers' World
 

Tsutomu Matsumoto


Author's Web Page Link

18 papers in database with 837 citations StarStar

Editor of 2 conference proceedings books

H-number: 12

Conference Proceedings

 
1. Kwangjo KimTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings. Springer, 1996. ISBN 3-540-61872-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Hideki ImaiRonald L. RivestTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings. Springer, 1993. ISBN 3-540-57332-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Tsutomu Matsumoto,  Gummy and Conductive Silicone Rubber Fingers, pp. 574 - 576, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

2. Masayuki Kanda,  Tsutomu Matsumoto,  Security of Camellia against Truncated Differential Cryptanalysis, pp. 286 - 299, FSE 2001.

[Electronic Edition][Cited 10 times ]

3. Jun Anzai,  Natsume Matsuzaki,  Tsutomu Matsumoto,  A Quick Group Key Distribution Scheme with "Entity Revocation", pp. 333 - 347, ASIACRYPT 1999.

[Electronic Edition][Cited 79 times Red Star]

4. Masayuki Kanda,  Youichi Takashima,  Tsutomu Matsumoto,  Kazumaro Aoki,  Kazuo Ohta,  A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis, pp. 264 - 279, SAC 1998.

[Electronic Edition][Cited 34 times ]

5. Tsutomu Matsumoto,  Incidence Structures for Key Sharing (Extended Abstract), pp. 342 - 353, ASIACRYPT 1994.

[Electronic Edition][Cited 6 times ]

6. Tsutomu Matsumoto,  Hideki Imai,  Chi-Sung Laih,  Sung-Ming Yen,  On Verifiable Implicit Asking Protocols for RSA Computation, pp. 296 - 307, ASIACRYPT 1992.

[Electronic Edition][Cited 28 times ]

7. Manuel Cerecedo,  Tsutomu Matsumoto,  Hideki Imai,  Non-Interactive Generation of Shared Pseudorandom Sequences, pp. 385 - 396, ASIACRYPT 1992.

[Electronic Edition][Cited 1 times ]

8. Keiichi Iwamura,  Tsutomu Matsumoto,  Hideki Imai,  High-Speed Implementation Methods for RSA Scheme, pp. 221 - 238, EUROCRYPT 1992.

[Electronic Edition][Cited 12 times ]

9. Keiichi Iwamura,  Tsutomu Matsumoto,  Hideki Imai,  Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract), pp. 477 - 481, EUROCRYPT 1992.

[Electronic Edition][Cited 17 times ]

10. Chaosheng Shu,  Tsutomu Matsumoto,  Hideki Imai,  A Multi-Purpose Proof System - for Identity and Membership Proofs, pp. 397 - 411, ASIACRYPT 1991.

[Electronic Edition][No citation]

11. Tsutomu Matsumoto,  Human Identification Through Insecure Channel, pp. 409 - 421, EUROCRYPT 1991.

[Electronic Edition][Cited 53 times Red Star]

12. Kwangjo Kim,  Tsutomu Matsumoto,  Hideki Imai,  A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion, pp. 564 - 574, CRYPTO 1990.

[Electronic Edition][Cited 10 times ]

13. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Structural Properties of One-way Hash Functions, pp. 285 - 302, CRYPTO 1990.

[Electronic Edition][Cited 30 times ]

14. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses, pp. 461 - 480, CRYPTO 1989.

[Electronic Edition][Cited 57 times Red Star]

15. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract), pp. 412 - 422, EUROCRYPT 1989.

[Electronic Edition][Cited 1 times ]

16. Tsutomu Matsumoto,  Koki Kato,  Hideki Imai,  Speeding Up Secret Computations with Insecure Auxiliary Devices, pp. 497 - 506, CRYPTO 1988.

[Electronic Edition][Cited 110 times Red StarRed Star]

17. Tsutomu Matsumoto,  Hideki Imai,  Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, pp. 419 - 453, EUROCRYPT 1988.

[Electronic Edition][Cited 231 times Red StarRed Star]

18. Tsutomu Matsumoto,  Hideki Imai,  On the Key Predistribution System: A Practical Solution to the Key Distribution Problem, pp. 185 - 193, CRYPTO 1987.

[Electronic Edition][Cited 138 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...