Follow
Shin'ichiro Matsuo
Shin'ichiro Matsuo
Research Professor of Computer Science, Georgetown University
Verified email at georgetown.edu - Homepage
Title
Cited by
Cited by
Year
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011
762011
Long-term public blockchain: Resilience against compromise of underlying cryptography
M Sato, S Matsuo
2017 26th International Conference on Computer Communication and Networks …, 2017
482017
Evaluation of hardware performance for the SHA-3 candidates using SASEBO-GII
K Kobayashi, J Ikegami, S Matsuo, K Sakiyama, K Ohta
Cryptology ePrint Archive, 2010
472010
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate
S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ...
2nd SHA-3 Candidate Conference, 1-15, 2010
422010
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
412012
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
S Matsuo, K Miyazaki, A Otsuka, D Basin
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010
382010
Solving a 676-Bit Discrete Logarithm Problem in GF(36n )
T Hayashi, N Shinohara, L Wang, S Matsuo, M Shirase, T Takagi
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
352010
Toward practical searchable symmetric encryption
W Ogata, K Koiwa, A Kanaoka, S Matsuo
Advances in Information and Computer Security: 8th International Workshop on …, 2013
312013
PUF-based RFID authentication secure and private under memory leakage
D Moriyama, S Matsuo, M Yung
Cryptology ePrint Archive, 2013
312013
Clinical guides for immunoglobulin A (IgA) nephropathy in Japan, third version
S Matsuo
Jpn J Nephrol 53, 123, 2011
272011
Prototyping platform for performance evaluation of SHA-3 candidates
K Kobayashi, J Ikegami, M Knežević, EX Guo, S Matsuo, S Huang, ...
2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010
262010
How formal analysis and verification add security to blockchain-based systems
SI Matsuo
2017 Formal Methods in Computer Aided Design (FMCAD), 1-4, 2017
252017
Fairness in ERC token markets: A case study of CryptoKitties
K Sako, S Matsuo, S Meier
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
242021
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication
Y HanataniI, M Ohkubo, S Matsuo, K Sakiyama, K Ohta
Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012
202012
Risk visualization and alerting system: Architecture and proof-of-concept implementation
T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa
Proceedings of the first international workshop on Security in embedded …, 2013
192013
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
182013
Relations among notions of privacy for RFID authentication protocols
D Moriyama, S Matsuo, M Ohkubo
IEICE transactions on fundamentals of electronics, communications and …, 2014
172014
Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem
Y Takanashi, S Matsuo, E Burger, C Sullivan, J Miller, H Sato
Stan. J. Blockchain L. & Pol'y 3, 1, 2020
112020
Electronic ticket scheme for its
S Matsuo, W Ogata
IEICE transactions on fundamentals of electronics, communications and …, 2003
112003
Divisible voting scheme
N Ishida, S Matsuo, W Ogata
Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003
112003
The system can't perform the operation now. Try again later.
Articles 1–20