Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates M Knezevic, K Kobayashi, J Ikegami, S Matsuo, A Satoh, Ü Kocabas, ... IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (5), 827-840, 2011 | 76 | 2011 |
Long-term public blockchain: Resilience against compromise of underlying cryptography M Sato, S Matsuo 2017 26th International Conference on Computer Communication and Networks …, 2017 | 48 | 2017 |
Evaluation of hardware performance for the SHA-3 candidates using SASEBO-GII K Kobayashi, J Ikegami, S Matsuo, K Sakiyama, K Ohta Cryptology ePrint Archive, 2010 | 47 | 2010 |
How can we conduct fair and consistent hardware evaluation for SHA-3 candidate S Matsuo, M Knezevic, P Schaumont, I Verbauwhede, A Satoh, ... 2nd SHA-3 Candidate Conference, 1-15, 2010 | 42 | 2010 |
Enabling secure multitenancy in cloud computing: Challenges and approaches T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo 2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012 | 41 | 2012 |
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC S Matsuo, K Miyazaki, A Otsuka, D Basin Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010 | 38 | 2010 |
Solving a 676-Bit Discrete Logarithm Problem in GF(36n ) T Hayashi, N Shinohara, L Wang, S Matsuo, M Shirase, T Takagi Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 35 | 2010 |
Toward practical searchable symmetric encryption W Ogata, K Koiwa, A Kanaoka, S Matsuo Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 31 | 2013 |
PUF-based RFID authentication secure and private under memory leakage D Moriyama, S Matsuo, M Yung Cryptology ePrint Archive, 2013 | 31 | 2013 |
Clinical guides for immunoglobulin A (IgA) nephropathy in Japan, third version S Matsuo Jpn J Nephrol 53, 123, 2011 | 27 | 2011 |
Prototyping platform for performance evaluation of SHA-3 candidates K Kobayashi, J Ikegami, M Knežević, EX Guo, S Matsuo, S Huang, ... 2010 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2010 | 26 | 2010 |
How formal analysis and verification add security to blockchain-based systems SI Matsuo 2017 Formal Methods in Computer Aided Design (FMCAD), 1-4, 2017 | 25 | 2017 |
Fairness in ERC token markets: A case study of CryptoKitties K Sako, S Matsuo, S Meier Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021 | 24 | 2021 |
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication Y HanataniI, M Ohkubo, S Matsuo, K Sakiyama, K Ohta Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR …, 2012 | 20 | 2012 |
Risk visualization and alerting system: Architecture and proof-of-concept implementation T Takahashi, K Emura, A Kanaoka, S Matsuo, T Minowa Proceedings of the first international workshop on Security in embedded …, 2013 | 19 | 2013 |
Tailored security: Building nonrepudiable security service-level agreements T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ... IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013 | 18 | 2013 |
Relations among notions of privacy for RFID authentication protocols D Moriyama, S Matsuo, M Ohkubo IEICE transactions on fundamentals of electronics, communications and …, 2014 | 17 | 2014 |
Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem Y Takanashi, S Matsuo, E Burger, C Sullivan, J Miller, H Sato Stan. J. Blockchain L. & Pol'y 3, 1, 2020 | 11 | 2020 |
Electronic ticket scheme for its S Matsuo, W Ogata IEICE transactions on fundamentals of electronics, communications and …, 2003 | 11 | 2003 |
Divisible voting scheme N Ishida, S Matsuo, W Ogata Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003 | 11 | 2003 |