Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shin'ichiro Matsuo is active.

Publication


Featured researches published by Shin'ichiro Matsuo.


IEEE Transactions on Very Large Scale Integration Systems | 2012

Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates

Miroslav Knezevic; Kazuyuki Kobayashi; Jun Ikegami; Shin'ichiro Matsuo; Akashi Satoh; Ünal Kocabaş; Junfeng Fan; Toshihiro Katashita; Takeshi Sugawara; Ingrid Verbauwhede; Naofumi Homma; Takafumi Aoki

The first contribution of our paper is that we propose a platform, a design strategy, and evaluation criteria for a fair and consistent hardware evaluation of the second-round SHA-3 candidates. Using a SASEBO-GII field-programmable gate array (FPGA) board as a common platform, combined with well defined hardware and software interfaces, we compare all 256-bit version candidates with respect to area, throughput, latency, power, and energy consumption. Our approach defines a standard testing harness for SHA-3 candidates, including the interface specification for the SHA-3 module on our testing platform. The second contribution is that we provide both FPGA and 90-nm CMOS application-specific integrated circuit (ASIC) synthesis results and thereby are able to compare the results. Our third contribution is that we release the source code of all the candidates and by using a common, fixed, publicly available platform, our claimed results become reproducible and open for a public verification.


hardware oriented security and trust | 2010

Prototyping platform for performance evaluation of SHA-3 candidates

Kazuyuki Kobayashi; Jun Ikegami; Miroslav Knezevic; Eric Xu Guo; Shin'ichiro Matsuo; Sinan Huang; Leyla Nazhandali; Ünal Kocabaş; Junfeng Fan; Akashi Satoh; Ingrid Verbauwhede

The objective of the SHA-3 NIST competition is to select, from multiple competing candidates, a standard algorithm for cryptographic hashing. The selected winner must have adequate cryptographic properties and good implementation characteristics over a wide range of target platforms, including both software and hardware. Performance evaluation in hardware is particularly challenging because of the large design space, wide range of target technologies, and multitude of optimization criteria. We describe the efforts of three research groups to evaluate SHA-3 candidates using a common prototyping platform. Using a SASEBO-GII FPGA board as a starting point, we evaluate the performance of the 14 remaining SHA-3 candidates with respect to area, throughput, and power consumption. Our approach defines a standard testing harness for SHA-3 candidates, including the interface specifications for the SHA-3 module on the SASEBO testing board.


IEEE Vehicular Technology Magazine | 2013

Tailored Security: Building Nonrepudiable Security Service-Level Agreements

Takeshi Takahashi; Joona Kannisto; Jarmo Harju; Seppo Heikkinen; Bilhanan Silverajan; Marko Helenius; Shin'ichiro Matsuo

The security features of current digital services are mostly defined and dictated by the service provider (SP). A user can always decline to use a service whose terms do not fulfill the expected criteria, but in many cases, even a simple negotiation might result in a more satisfying outcome. This article aims at building nonrepudiable security service-level agreements (SSLAs) between a user and an SP. The proposed mechanism provides a means to describe security requirements and capabilities in different dimensions, from overall targets and risks to technical specifications, and it also helps in translating between the dimensions. A negotiation protocol and a decision algorithm are then used to let the parties agree on the security features used in the service. This article demonstrates the feasibility and usability of the mechanism by describing its usage scenario and proof-of-concept implementation and analyzes its nonrepudiability and security aspects.


International Journal of Communication Systems | 2015

A non-repudiable negotiation protocol for security service level agreements

Joona Kannisto; Takeshi Takahashi; Jarmo Harju; Seppo Heikkinen; Marko Helenius; Shin'ichiro Matsuo; Bilhanan Silverajan

Security service level agreements SSLAs provide a systematic way for end users at home or in the office to guarantee sufficient security level when doing business or exchanging sensitive personal or organizational data with an online service. In this paper, we propose an SSLA negotiation protocol that implements non-repudiation with cryptographic identities and digital signatures and includes features that make it resistant to denial of service attacks. The basic version of the protocol does not rely on the use of a trusted third party, and it can be used for all kinds of simple negotiations. For the negotiation about SSLAs, the protocol provides an option to use an external knowledge base that may help the user in the selection of suitable security measures. We have implemented a prototype of the system, which uses JSON Web Signature for the message exchange and made some performance tests with it. The results show that the computational effort required by the cryptographic operations of the negotiation protocol remains at a reasonable level. Copyright


international symposium on computers and communications | 2013

Accountable security mechanism based on security service level agreement

Takeshi Takahashi; Joona Kannisto; Jarmo Harju; Seppo Heikkinen; Marko Helenius; Shin'ichiro Matsuo; Bilhanan Silverajan

This paper proposes a mechanism that realizes accountable security using a security service level agreement (SSLA), which defines the security level of a service agreed to between a user and service provider. The mechanism consists of three major components: security expression, translation, and negotiation techniques. The security expression technique provides a means to describe security requirements and capabilities of a user and service provider, as well as the SSLA between them, in different levels of detail. The translation technique provides a means to translate such information among different levels of detail, and the negotiation technique provides a means to negotiate and agree upon the SSLA between the user and service provider. Both the user and service provider need to be accountable and non-repudiable against the agreed to SSLA in order to empower it. The mechanism uses cryptographic identities and digital signatures for this purpose. This paper demonstrates the feasibility and usability of the mechanism by describing its usage scenario and implementing its prototype, and analyzes this mechanism.


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2012

Solving a 676-Bit Discrete Logarithm Problem in GF(3 6 n )

Takuya Hayashi; Naoyuki Shinohara; Lihua Wang; Shin'ichiro Matsuo; Masaaki Shirase; Tsuyoshi Takagi


international workshop on security | 2013

Risk visualization and alerting system: architecture and proof-of-concept implementation

Takeshi Takahashi; Keita Emura; Akira Kanaoka; Shin'ichiro Matsuo; Tadashi Minowa


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2003

Electronic ticket scheme for ITS

Shin'ichiro Matsuo; Wakaha Ogata


IACR Cryptology ePrint Archive | 2013

PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.

Daisuke Moriyama; Shin'ichiro Matsuo; Moti Yung


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2001

Secure Protocol to Construct Electronic Trading

Shin'ichiro Matsuo; Hikaru Morita

Collaboration


Dive into the Shin'ichiro Matsuo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wakaha Ogata

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jarmo Harju

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Joona Kannisto

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Bilhanan Silverajan

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Marko Helenius

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Seppo Heikkinen

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Natsuki Ishida

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Akashi Satoh

University of Electro-Communications

View shared research outputs
Researchain Logo
Decentralizing Knowledge