|
松本隆太郎 研究業績一覧 (167件)
- 2024
- 2023
- 2022
- 2021
- 2020
- 全件表示
論文
-
Masahiro Hayashi,
Ryutaroh Matsumoto.
Secure Multiplex Coding With Depedndent and Non-Uniform multiple Messages,
2016IEEE,
IEEE Transactions on Information Theory,
Vol. 62,
No. 5,
pp. 2355-2409,
2016.
-
Ryutaroh Matsumoto.
Optimal multiple assignment scheme for strongly secure ramp secret sharing shemes with general access structures,
IEICE Communications Express,
Vol. 4,
No. 11,
pp. 317-320,
Nov. 2015.
-
栗原淳,
松本隆太郎,
植松友彦.
線型符号の相対パラメータによって表される秘密分散法の安全性,
IEICE Fundamentals Review,
電子情報通信学会,
Vol. 19,
No. 1,
pp. 14-23,
July 2015.
-
Jun Kurihara,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Relative Generalized Rank Weight of Linear codes and Its Applications to network coding,
IEEE Transactions On information theory,
Vol. 61,
No. 7,
pp. 3912-3936,
July 2015.
-
佐々木洋明,
松本隆太郎,
植松友彦.
B92量子鍵配送プロトコルの有限長での鍵ルート,
信学技報,
pp. 13-18,
Jan. 2015.
-
Olav Geil,
Stefano Martin,
Ryutaroh Matsumoto,
Diego Ruano,
Luo Yuan.
Relative Generalaized hamming Weights of One-Point Algebraic Geometric Codes,
IEEE Transactions On Information Theory,
Vol. 60,
No. 10,
pp. 5938-5949,
Oct. 2014.
-
Kenta Sakakibara,
Ryutaroh Matsumoto.
Exact computation of tail probability of hypergeometiric distribution and its application to Quantum key Distribution,
ICICE2014 Commumication Express,
Vol. 3,
No. 2,
pp. 68-73,
Feb. 2014.
-
shun watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Optimal axis compensation in quantum key distribution protocols over unital channels,
Theoretical Computer Science,
Vol. 560,
pp. 91-106,
2014.
-
Ryutaroh Matsumoto.
Gilbert-Varshamov-type Bound for relative Dimension Length Profile,
IEICE Communications Express,
IEICE,
vol. 2,
no. 8,
pp. 343-346,
Aug. 2013.
-
Ryutaroh Matsumoto,
Diego Ruano,
Olav Geil.
Generalaization of hte Lee-O`sullivan list decoding for one-point AG codes,
Journal of Symbolic Comlutation,
Vol. 55,
pp. 1-9,
2013.
-
Olav Geil,
Ryutaroh Matsumoto,
Diego Ruano.
Feng-Rao decoding of primary codes,
Finite Fields and Application,
Vol. 23,
pp. 35-52,
2013.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Parametric Forms of the Achievable Rate Region for Source Coding with a Helper,
IEICE Trans. Fundamentals,
Vol. E95-A,
No. 12,
pp. 2493-2497,
Dec. 2012.
-
Jun Kurihara,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight,
IEICE Trans. Fundamentals,
電子情報通信学会,
Vol. E95-A,
No. 11,
pp. 2067-2075,
Nov. 2012.
-
松本 隆太郎.
ネットワーク符号化― 基礎と発展 ―,
Fundamentals Review,
vol. 5,
No. 2,
pp. 162-166,
Oct. 2011.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices,
IEICE Trans. Fundamentals,
Vol. E93-A,
No. 11,
pp. 1878-1888,
Nov. 2010.
-
Yousuke Sano,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Secure Key rate of the BB84 protocol using finite sample bits,
Journal of PHYSICS A:Mathematical AND THEORETICAL.,
Vol. 43,
No. 49,
pp. 495302,
Nov. 2010.
-
Eitaro Shioji,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Vulnerability of MRD-Code-based Universal Secure Network Coding against stronger Eavesdroppers,
IEICE TRANS.FUNDAMENTALS,
Vol. E93-A,
No. 11,
pp. 2026-2033,
Nov. 2010.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code,
IEICE TRANS.FUNDAMENTALS.,
Vol. E93-A,
No. 9,
pp. 1650-1659,
Sept. 2010.
-
Goseling Jasper,
Ryutaroh Matsumoto,
Tomohiko Uyematsu,
Jos H. Weber.
Lower Bounds on the Maximum Energy Benefit of Network Coding For Wireless Multiple Unicast,
EURASIP Journal on Wireless Communications and Networking,
Vol. 2010,
ID 605421,
Sept. 2010.
-
Ryutaroh Matsumoto,
Shun watanabe.
Narrow basis angle doubles secret key in the BB84 protocol,
Journal of Physics A: Mathematical and Theoretical,
Vol. 43,
No. 14,
p. 145302,
Apr. 2010.
-
林雁かお,
城野将樹,
植松友彦,
松本隆太郎.
最多一致に基づく符号化法のユニバーサル性の証明,
電子情報通信学会論文誌,
社団法人電子情報通信学会,
Vol. J92-A,
No. 11,
pp. 935-941,
Nov. 2009.
-
Ryutaroh Matsumoto.
Radical Computation for Small Characteristics,
Grobner Bases, Coding, and Cryptography,
Springer-Verlag,
pp. 427-430,
Sept. 2009.
-
Terumasa Tateno,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Decodability of Network Coding with Time-Varying Delay and No Buffering,
IEICE TRANS.FUNDAMENTALS.,
Vol. E92-A,
No. 8,
pp. 2141-2145,
Aug. 2009.
-
Olav Geil,
Ryutaroh Matsumoto.
Bounding the mumber of fq-ratinal places in algebraic function fields using Weierstrass semigroups,
Journal of Pure and Applied Algebra,
Vol. 213,
pp. 1152-1156,
June 2009.
-
Masashi Naitou,
Shun watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Secret Key Agreement by Soft-Decision of Signals in Gaussian Maurer's Model,
IEICE Trans.Fundamentals.,
The Institute of Elections, Information and Communication Engineers,
Vol. E92-A,
No. 2,
pp. 525-534,
Feb. 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Tomography increases key rates of quantum-key-distribution protocols.,
Physical Review A,
Vol. 78,
pp. 042316,
Oct. 2008.
-
Ryutaroh Matsumoto,
Shun Watanabe.
Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle,
IEICE TRANS.FUNDAMENTALS.,
Vol. E91-A,
No. 10,
pp. 2870-2873,
Oct. 2008.
-
山田慈人,
松本隆太郎.
遅延がある場合のネットワーク誤り訂正符号化,
電子情報通信学会論文誌,
Vol. J91-A,
No. 9,
pp. 923-928,
Sept. 2008.
-
Ryutaroh Matsumoto.
Multiparty quantum-key-distribution protocol without use of entanglement,
Physical Review A,
Vol. A 76,
No. 6,
pp. 062316-1,
Dec. 2007.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu,
Yasuhito kawano.
Key rate of quantum key distribution with hashed two-way classical communication,
PHYSICAL REVIEW A,
Vol. 76,
No. 3,
pp. 032312,
Sept. 2007.
-
Ryutaroh Matumoto.
Construction Algorithm for Network Error-Correcting Attaining the Singlleton Bound,
IEICE TRANS.FUNDAMENTALS.,
Vol. E-90-A,
No. 9,
pp. 1729-1735,
Sept. 2007.
-
Shun Watanabe,
R. Matsumoto,
Tomohiko Uematu.
Noise tolerance of the BB84 protocol with random privacy amplification,
International Journal of Quantum Information,
Vol. 4,
No. 6,
pp. 935-946,
Dec. 2006.
-
R. Matsumoto,
K. Kurosawa,
T. Itoh,
T. Konno,
Tomohiko Uyumatu.
Primal-dual distance bounds of linear codes with application to cryptography,
IEEE Trans. Inform. Theory,
Vol. 52,
No. 9,
pp. 4251-4257,
Sept. 2006.
-
Shun Watanabe,
R. Matsumoto,
Tomohiko Uematu.
Improvement of stabilizer based entanglement distillation protocols by encoding operators,
J. Phys. A. Math. Gen.,
Vol. 39,
No. 16,
pp. 4273-4290,
Mar. 2006.
-
Shun Watanabe,
R. Matsumoto,
TOMOHIKO UYEMATSU.
Improvement of Stabilizer Based Entanglement Distillation Protocols by Encoding Operators,
ERATO Conference on Quantum Information Science 2005,
Proc. EQIS 05,
pp. 121-122,
Aug. 2005.
-
K. Tochikubo,
T. Uyematsu,
R. Matsumoto.
Efficient Secret Sharing Schemes Based on Authorized Subsets,
IEICE Trans. Fundamentals,
Vol. E88-A,
No. 1,
pp. 322-326,
Jan. 2005.
-
Takayuki FUKATANI,
Ryutaroh MATSUMOTO,
Tomohiko UYEMATSU,
T. Uyematsu.
Two Methods for Decreasing the Computational Complexity of the MIMO ML Decoder,
IEICE Trans. Fundamentals,
Vol. E87-A,
No. 10,
pp. 2571-2576,
Oct. 2004.
-
Kouya TOCHIKUBO,
Tomohiko UYEMATSU,
Ryutaroh MATSUMOTO.
Secret Key Capacity for Ergodic Correlated Sources,
IEICE Trans. Fundamentals,
Vol. E87-A,
No. 6,
pp. 1651-1654,
2004.
-
Kaoru Kurosawa,
Ryutaroh Matsumoto.
Almost security of cryptographic Boolean functions,
IEEE Trans. Inform. Theory,
Vol. 50,
No. 11,
pp. 2752-2761,
2004.
-
Ryutaroh Matsumoto.
Conversion of a General Quantum Stabilizer Code to an Entanglement Distillation Protocol,
J Phys. A: Math. and Gen.,
Vol. 36,
No. 29,
pp. 8113-8127,
2003.
-
松本隆太郎.
量子誤り訂正とエンタングルメント純粋化,
電子情報通信学会誌,
Vol. 85,
No. 8,
pp. 591-595,
2002.
-
Ryutaroh Matsumoto,
Masakuni Oishi,
KOHICHI SAKANIWA.
Fast encoding of algebraic geometry codes,
IEICE Trans. Fundamentals,
Vol. E84-A,
No. 10,
pp. 2514-2517,
2001.
-
Ryutaroh Matsumoto.
On computing the integral closure,
Comm. Algebra,
Vol. 28,
No. 1,
pp. 401-405,
2000.
-
Ryutaroh Matsumoto,
Shinji Miura.
Finding a basis of a linear system with pairwise distinct discrete valuations on an algebraic curve,
Journal of Symbolic Computation,
Vol. 30,
No. 3,
pp. 309-324,
2000.
-
Ryutaroh Matsumoto.
On the Feng-Rao bound for the L-construction of algebraic geometry codes,
IEICE Trans. Fundamentals,
Vol. E83-A,
No. 5,
pp. 926-930,
2000.
-
Ryutaroh Matsumoto.
Linear codes on nonsingular curves are better than those on singular curves,
IEICE Trans. Fundamentals,
Vol. E82-A,
No. 4,
pp. 665-670,
1999.
-
Ryutaroh Matsumoto.
Constructing algebraic geometry codes on the normalization of a singular Cab curve,
IEICE Trans. Fundamentals,
Vol. E82-A,
No. 9,
pp. 1981-1986,
1999.
-
Ryutaroh Matsumoto.
Miura's generalization of one-point AG codes is equivalent to Hoeholdt, van Lint and Pellikaan's generalization,
IEICE Trans. Fundamentals,
Vol. E82-A,
No. 10,
pp. 2007-2010,
1999.
-
Ryutaroh Matsumoto.
Using Cab curves in the Function Field Sieve,
IEICE Trans. Fundamentals,
Vol. E82-A,
No. 3,
pp. 551-552,
1999.
-
Ryutaroh Matsumoto.
An improved bound for the dimension of subfield subcodes,
IEICE Trans. Fundamentals,
Vol. E80-A,
No. 5,
pp. 876-880,
1997.
-
Ryutaroh Matsumoto.
Simple estimation for the dimension of subfield subcodes of AG codes,
IEICE Trans. Fundamentals,
Vol. E80-A,
No. 11,
pp. 2058-2065,
1997.
著書
-
Paul Zhang,
Ryutaroh Matsumoto.
Quantum strongly secure ramp secret sharing,
QUANTUM INF PROCESS,
Vol. 14,
pp. 715-729,
2015.
-
植松友彦,
松本隆太郎.
基本を学ぶ通信工学,
基本を学ぶ通信工学,
オーム社,
Dec. 2012.
-
三瓶政一,
阪口啓,
松本隆太郎.
無線分散ネットワーク 第2章,
無線分散ネットワーク,
社団法人 電子情報通信学会,
Apr. 2012.
国際会議発表 (査読有り)
-
Ryutaroh Matsumoto,
Diego Ruano.
Geometric and Computational approach to classical and Quantum Secret Sharing,
CACTC2015000,
2016.
-
Mikio Fujiwara,
Toshiyuki Ito,
Mitsuo Kitamura,
Hiroyuki Endou,
Morio Tohoshima,
hideki Takenaka,
yoshihisa takayama,
Ryusuke Shimizu,
Masahito Takeoka,
Masahide Sakaki,
Ryutaroh Matsumoto.
Secret Key Agreement demonstration over 7.8km free-space optical channel,
QCMC 2016,
2016.
-
Hiroaki Sasaki,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Key rate of the B92 quantum key distribution oprotocol with finite qubits.,
2015 IEEE International Symposium,
2015 IEEE International Sypsium on Information Theory,
pp. 696-699,
2015.
-
Olav Geil,
Stefano Martin,
Ryutaroh Matsumoto,
Diego Ruano,
Luo Yuan.
Relative Generalaized hamming Weights of One-Point Algebraic Geometric Codes,
2014 IEEE Information Theory Workshop,
pp. 137-141,
Nov. 2014.
-
Hokuto Takahashi,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Maximum Multicast Throughput by Network Coding on Undirected Hypernetworks,
International Symposium on Information Theory and Its Applications,
IEICE,
pp. 363-367,
Oct. 2014.
-
Ryutaroh Matsumoto.
Coding Theoretic Study of Secure Network Coding and Quantum Secret Sharing,
2014 International Symposium on Information Theory and Its Applications,
IEICE,
pp. 335-337,
Oct. 2014.
-
Ryutaroh Matsumoto.
New Asymptotic Metrics for Relative Generalized Hamming Weight,
2014 IEEE International Symposium on Information Theory,
IEEE,
pp. 3122-3144,
June 2014.
-
Ryutaroh Matsumoto.
Improved Asymptotic Key Rate of the B92 Protocol,
IEEE International Symposium on Information Theory,
Proceedings of IEEE International Symposium on Information Theory,
IEEE,
July 2013.
-
Jun Kurihara,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding,
50th Annual Allerton Conference on Communication, Control, and Computing,
Proc. of 50th Annual Allerton Conference on Communication, Control, and Computing,
Oct. 2012.
-
Masahito HAYASHI,
Ryutaroh Matsumoto.
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages,
2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton),
Proc. 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton),
Oct. 2012.
-
Kenta Sakakibara,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Estimation of Phase Errors without the Gaussian Approximation and Improvement of the Secure Key Rate of BB84 Protocol,
QCRYPT 2012,
Proc. of QCRYPT 2012,
Sept. 2012.
公式リンク
-
Olav Geil,
Ryutaroh Matsumoto,
Diego Ruano.
List Decoding Algorithms based on Grobner Based for General One-Point AG Codes,
2012 IEEE International Symposium on Information Theory Proceedings,
pp. 86-90,
July 2012.
-
Jun Kurihara,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Explicit Construction of Universal Strongly Secure Network Coding via MRD Codes,
2012 IEEE International Symposium on Information Theory,
Proc. of 2012 IEEE Int. Symp. on Information Theory,
pp. 1488-1492,
July 2012.
-
Olav Geil,
Stefano Martin,
Ryutaroh Matsumoto.
A New Method for Constructing Small-Bias Spaces from hermitian Codes,
WAIFI 2012,LNCS7369,2012,
pp. 29-44,
July 2012.
-
Xiaolin Li,
Ryutaroh Matsumoto.
Secure Multiplex Coding Over Interferences Channel with Confidential Messages,
Int.Zurich Seminar on Communications(IZS),
pp. 75-78,
Mar. 2012.
-
Masahito Hayashi,
Ryutaroh Matsumoto.
Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confide,
Proceedings of the 2011 49th Annual Allerton Conference on Communication, Control, and Computing,
pp. 439-444,
Dec. 2011.
-
Ryutaroh Matsumoto,
Masahito Hayashi.
Secure multiplex coding with a common message,
2011 IEEE ISIT,
Proc. 2011 Intl. Symp. on Information Theory,
IEEE,
pp. 1965-1969,
Aug. 2011.
-
Ryutaroh Matsumoto,
Masahito HAYASHI.
Secure Multiple Network Coding,
NETCOD2011,
2011 International Symposium on Network Coding,
IEEE,
p. 24-29,
July 2011.
-
Kenta Kasai,
Ryutaroh Matsumoto,
Kohichi Sakaniwa.
Information Reconciliation for QKD with Rate-Compatible Non-Binary LDPC Codes,
ISITA 2010,
Proc. of International Symposium on Information Theroy and its Applications,
Oct. 2010.
-
Yousuke Sano,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Secure Key Rate of the BB84 Protocol using Finite Sample Bits,
IEEE International Symposium on Information Theory 2010,
Proc. of 2010 IEEE Inter. Symp. on Information Theory,
pp. 2677-2681,
June 2010.
-
Masahito HAYASHI,
Ryutaroh Matsumoto.
Construction of wiretap codes from ordinary channel codes,
ISIT 2010,
June 2010.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices,
2010 IEEE International Symposium on Information Theory,
Proc. of the 2010 IEEE International Symposium on Information Theory,
pp. 186-190,
June 2010.
-
Eitaro Shioji,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers,
IEEE International Symposium on Information Theory 2010,
Proc. of 2010 IEEE Inter. Symp. in Information Theory,
pp. 2433-2437,
June 2010.
-
Kenta Kasai,
Takayuki Tsujimoto,
Kohichi Sakaniwa,
Ryutaroh Matsumoto.
Rate-Compatible Slepian Wolf Coding with Short Non-Binary LDPC Codes,
IEEE Data Comression Conference,
Proc. of IEEE Data Comression Conference,
May 2010.
-
Shun Watanabe,
Tsuki Saitou,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Strongly Secure Privacy Amplification Cannot be Obtained By Encoder of Slepian-Wolf Code,
2009 IEEE International Symposium,
2009 IEEE International Symposium on Information Theory,
pp. 1214-1218,
July 2009.
-
Jasper Goseling,
Ryutaroh Matsumoto,
Tomohiko Uyematsu,
Jos H. Weber.
On the Energy Benefit of Network Coding for Wireless Multiple Unicast,
2009 IEEE International Symposium,
Proc. of 2009 IEEE Inter. Symp. on Information Theory,
pp. 2567-2571,
June 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Optimal Axis Compensation in Quantum Key Distribution Protocols over Unital Channels,
2009 IEEE International Symposium,
Proc. of 2009 IEEE Inter. Symp. on Information Theory,
pp. 1884-1888,
June 2009.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Closed Forms of the Achievable Rate Region For Wyner's Source Coding Systems,
2009 IEEE International Symposium on Information Theory,
Proc. of the 2009 IEEE International Symposium on Information Theory,
pp. 1214-1218,
June 2009.
-
Atsushi Okawado,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels,
ISIT 2008,
Proc.ISIT 2008,
pp. 2022-2025,
July 2008.
-
Olav Geil,
Ryutaroh Matsumoto,
Casper Thomsen.
On Field Size and Success Probability in Network Coding,
WAIFI 2008,
Springer Verlag Berlin Heidelberg 2008,
pp. 157-173,
July 2008.
-
Masashi Naitou,
Ryutaroh Matsumoto,
Shun Watanabe,
Tomohiko Uyematsu.
Secret Key Agreement by Reliability Information of Signals in Gaussian Maurer's Model,
ISIT 2008,
Proc.ISIT 2008,
pp. 727-731,
June 2008.
-
Olav Geil,
Ryutaroh Matsumoto.
Generalized Sudan’s List Decoding for Order Domain Codes,
AAECC 2007,
AAECC 2007,
Springer-Verlag,
pp. 50-59,
Dec. 2007.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohito Uematu,
Yasuhito Kawano.
Key rate of quantum key distribution with hashed two-way classical communication,
Proc.2007 IEEE International Symposium on Information Theory,
pp. 2601-2605,
June 2007.
-
Shun Watanabe,
Tomohiko Uyematu,
Ryutaroh Matsumoto.
Security of Quantum Key DIstribution Protocol with Two-Way Classical Communication Assisted by One-Time Pad Encryption,
Asian Conference on Quantum Information Science 2006,
Proc. AQIS 2006,
pp. 11-12,
Sept. 2006.
-
S. Watanabe,
R. Matsumoto,
T. Uyematsu.
Noise Tolerance of the BB84 Protocol with Random Privacy Amplification,
IEEE International Symposium on Information Theory,
Proc. ISIT 2005,
pp. 1013-1017,
Sept. 2005.
国内会議発表 (査読有り)
-
Ryutaroh Matsumoto.
Strong Security of the Strongly Multiplicative Ramp Secret sharing Based on Algebraic Curves.,
IEICE T. FUND.,
vol. E98-A,
pp. 1576-1578,
2015.
-
Ryutaroh Matsumoto.
Quantum multiparty key distribution protocol without use of entanglement,
SITA, 2007,
Proc. SITA 2007.,
pp. 401-404,
Nov. 2007.
-
渡辺峻,
松本 隆太郎,
植松友彦,
河野泰人.
ハッシュされた双方向古典通信を用いた量子鍵配送プロトコルの鍵レート,
第16回量子情報技術研究会,
第16回量子情報技術研究会資料,
pp. 70-75,
May 2007.
-
渡辺峻,
松本 隆太郎,
植松友彦.
部分的な測定によるスタビライザーを用いたエンタングルメント純粋化プロトコルの改善,
第14回量子情報技術研究会,
第14回量子情報技術研究会資料,
pp. 84-87,
May 2006.
-
土山 牧男,
植松 友彦,
松本 隆太郎.
適応型予測フィルタの継続接続によるオーディオ用可逆圧縮の性能向上,
電子情報通信学会信号処理研究会,
電子情報通信学会技術研究報告,
Vol. 105,
No. 557,
pp. 23-28,
Jan. 2006.
国際会議発表 (査読なし・不明)
-
Ryutaroh Matsumoto.
Fast exact computation of the tail probability of a hypergeometric distribution and its application to quantum cryptography,
Japan-Singapore Workshop on Multi-useer Quantum Networks,
Proc. Japan-Singapore Workshop on Multi-useer Quantum Networks,
Sept. 2012.
公式リンク
-
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Network Coding -- Early History and Some of Recent Developement,
2011 IEEE Communication Theory Workshop,
June 2011.
-
Ryutaroh Matsumoto.
Information Theoretic and Quantum Cryptography,
IC-ICTES,
Abstracts ICICTES2011,
p. 5,
Jan. 2011.
-
Ryutaroh Matsumoto.
A Construction of Universal Secure Network Coding,
6th Asia-Europe Workshop on Information Theory,
Oct. 2010.
-
Ryutaroh Matsumoto.
Problems in application of LDPC codes to information in quantum key distribution protocols,
the seminar of Quantum information :Foundation for the Future and ItsTrends in Thailand,
Sept. 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Tomography Increases Key Rates of Quantum-Key-Distribution Protocols,
GSIS Workshop on Quantum Information Theory,
Dec. 2008.
-
C. Koike,
R. Matsumoto,
T. Uyematsu.
Sphere Decoder for Imperfect Channel State Estimation,
2006 International Symposium on Information Theory and its Applications,
Proc. ISITA 2006,
pp. 466-470,
Oct. 2006.
国内会議発表 (査読なし・不明)
-
池端 健吾,
植松 友彦,
松本 隆太郎,
松田 哲直.
情報とエネルギーの同時伝送を行う2ユーザMIMO干渉通信路におけるアウテージ容量,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 117,
no. 487,
pp. 43-48,
Mar. 2018.
-
村中勇樹,
松本隆太郎,
松田哲直,
植松友彦.
複数の二次利用者によるスペクトルセンシングの検出確率の改善,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 116,
no. 504,
pp. 209-214,
Mar. 2017.
-
中村祥有,
松田哲直,
松本隆太郎,
植松友彦.
送信ユーザーを限定した場合の公開通信路を用いた多者間秘密鍵容量について,
第39回情報理論とその応用シンポジウム,
第39回情報理論とその応用シンポジウム予稿集,
pp. 396-399,
Dec. 2016.
-
小宮山智也,
松本隆太郎,
松田哲直,
植松友彦.
エネルギー伝送を行う協力妨害局を用いた盗聴通信路における秘密通信レート,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 115,
no. 500,
pp. 131-136,
Mar. 2016.
-
木戸涼介,
松田哲直,
松本隆太郎,
植松友彦.
任意の事前分布を用いたネットワーク内ウィルス感染源のベイズ推定,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 115,
no. 500,
pp. 19-24,
Mar. 2016.
-
高橋 優,
松田哲直,
松本隆太郎,
植松友彦.
受信者の事前情報が重複しないインデックス符号化における最小符号語長の導出,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 115,
no. 500,
pp. 55-60,
Mar. 2016.
-
Ryutaroh Matsumoto.
Secrecy Capacity of Wiretap Channels with the Bit Error Rate Criterion,
The ]institute of Electronics,Information and Communication Engineers,
電子情報通信学会技術研究報告,
Vol. 115,
No. 394,
pp. 161-162,
Jan. 2016.
-
大澤 豊,
松本隆太郎,
松田哲直,
植松友彦.
情報とエネルギーの同時伝送を行う2ユーザ干渉通信路におけるアウテージ容量,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 114,
no. 470,
pp. 117-122,
Feb. 2015.
-
魯培,
植松友彦,
松本隆太郎,
松田哲直.
無線デュオキャストリレーマルチアクセス通信路におけるエネルギー効率の解析,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
電子情報通信学会,
vol. 113,
no. 483,
pp. 169-174,
Mar. 2014.
-
森茉莉香,
松田哲直,
松本隆太郎,
植松友彦.
リスト復号を用いた生体識別システムにおける識別容量,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
vol. 113,
no. 483,
pp. 249-254,
Mar. 2014.
-
小池 恭史,
石井 伴旺,
市川 翼,
平野 琢也,
笠井健太,
松本隆太郎,
鶴丸 豊広.
単一光路干渉計を用いた連続変数量子鍵配送Ⅶ,
日本物理学会 第69回年次大会,
2014.
-
Ryutaroh Matsumoto.
Coding Theoretic Construction of Quantum Ramp Secret Sharing,
IEICE,
IEICE Technical Report,
Vol. 114,
No. 138,
pp. 31-35,
2014.
-
高橋北斗,
松本隆太郎,
植松友彦.
無向ハイパーネットワーク上でのネットワーク符号化による最大マルチキャストスループット,
IEICE 電子情報通信学会技術研究報告,
電子情報通信学会,
Vol. 114,
No. 138,
pp. 37-42,
2014.
-
Ryutaroh Matsumoto.
Improved Asymptotic Key Rate of the B92 Protocol,
第30回 量子情報技術研究会,
2014.
-
國松昇平,
植松友彦,
松本隆太郎.
Intrinsic RandomnessのSmooth Renyiエントロピーによる表現について,
電子情報通信学会 情報理論研究会,
電子情報通信学会技術研究報告,
電子情報通信学会,
Vol. 113,
No. 153,
pp. 43-48,
July 2013.
-
菅井熱志,
松本隆太郎,
植松友彦.
双方向リレーチャネルにおけるダイバーシチマルチプレキシングトレードオフ,
電子情報通信学会 情報理論研究会,
電子情報通信学会技術研究報告,
Vol. 112,
No. 382,
pp. 1-6,
Jan. 2013.
-
Ryutaroh Matsumoto.
Gilbert-Varshamov-type Bound for relative Dimension Length Profile,
電子情報通信学会技術研究報告,
IEICE Technical Report,
pp. 39-40,
2013.
-
Ryutaroh Matsumoto.
General Rank Weight of Linear Codes and Its Application to Seure Network Coding,
九州大学マスフォアインダストリ研究所共同利用研究集会Ⅱ,
Math-for-industry,
2013.
-
大川倫明,
植松友彦,
松本隆太郎.
フレーム間の相関を利用した量子化器を用いたWyner-Ziv動画像符号化,
電子情報通信学会 情報理論研究会,
電子情報通信学会 技術報告,
社団法人 電子情報通信学会,
Vol. 111,
No. 454,
pp. 67-72,
Mar. 2012.
-
Jun Kurihara,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight,
電子情報通信学会総合大会,
電子情報通信学会 総合大会講演論文集,
社団法人 電子情報通信学会,
Mar. 2012.
-
松本隆太郎.
Physical Layer Securityの符号化,
無線通信システム,
信学技報\,
社団法人 電子情報通信学会,
Vol. 111,
No. 180,
pp. 51-53,
Aug. 2011.
-
國松昇平,
植松友彦,
松本隆太郎.
相関を有する2つの情報源から個別写像による独立な2つの乱数の生成法,
情報理論研究会,
電子情報通信学会 技術報告,
社団法人 電子情報通信学会,
Vol. 111,
No. 142,
pp. 65-70,
July 2011.
-
齋藤津樹,
松田哲直,
松本隆太郎,
植松友彦.
最多一致部分列に基づくユニバーサル情報源符号化法の実用的なアルゴリズム,
電子情報通信学会情報理論研究会,
電子情報通信学会技術研究報告,
電子情報通信学会,
vol. 110,
no. 443,
pp. 243-248,
Feb. 2011.
-
老木智章,
松本隆太郎,
植松友彦.
凸最適化とmin-sum復号によるLDPC符号の反復復号性,
電子情報通信学会技術研究報告,
電子情報通信学会技術研究報告,
社団法人電子情報通信学会,
IT2010-65,
pp. 67-72,
Jan. 2011.
-
下野健佑,
植松友彦,
松本隆太郎.
情報源の固定長符号化におけるリスト復号法の信頼性関数,
社団法人電子情報通信学会技術研究報告,
電子情報通信学会技術研究報告,
社団法人 電子情報通信学会,
IT2010-59,
pp. 31-36,
Jan. 2011.
-
松本隆太郎.
情報理論的セキュリティとネットワーク符号化,
男性研究者・女性研究者合同研究発表会 第4回,
Dec. 2010.
-
Ryutaroh Matsumoto.
A construction of universal secure network coding,
SITA 2010,
Dec. 2010.
-
Ryutaroh Matsumoto,
Masahito HAYASHI.
Strong security and separated code constructions for the broadcast channels with confidential messages,
SITA 2010,
Dec. 2010.
-
松本隆太郎.
秘密増幅定理と盗聴通信路,
第33回情理理論とその応用シンポジウム,
Dec. 2010.
-
松本隆太郎.
情報理論的セキュリティと秘密増幅,
第13回情報理論的学習理論ワークショップ(IBIS2010),
Nov. 2010.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
A Design Method of Universal Channel Codes Based on Mixed Channels,
33th Symposium on Information Theory and its Applications,
Proc. of the 33th Symposium on Information Theory and its Applications,
pp. 25-30,
Nov. 2010.
-
Masahito HAYASHI,
Ryutaroh Matsumoto.
Construction of wiretap codes from ordinary channel codes,
情報通信基礎サブソサイエティ合同研究会,
IEICE Technical Report,
IEICE Technical Report,
Vol. 109,
No. 444,
pp. 461-465,
Mar. 2010.
-
松本隆太郎.
多端子情報理論とネットワーク符号化,
電子情報通信学会総合大会,
電子情報通信学会総合大会講演論文集,
p. BT-3-2,
Mar. 2010.
-
小林武史,
松本隆太郎,
植松友彦.
MIMO通信における通信路とLDPC符号語の非線形最適化による同時推定,
情報通信基礎サブソサイエティ合同研究会,
信学技報,
IT2009-92,
Mar. 2010.
-
Sonny Lumbantoruan,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Bit Transmission Probabiliry Maximizing the Key Rate of the BB84 Protocol,
情報通信基礎サブソサイエティ合同研究会,
IEICE Technical Report,
電子情報通信学会,
IT2009-139,
Mar. 2010.
-
Yousuke Sano,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Secure Key Rate of the BB84Protocol using Finite Sample Bits,
情報通信基礎サブソサイエティ合同研究会,
IEICE Technical Report,
IT2009-138,
Mar. 2010.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices,
IEICE Technical Committee Conference on Information Theory,
IEICE Technical Report,
vol. 109,
no. 444,
pp. 181-186,
Feb. 2010.
-
Kenta Kasai,
Takayuki Tsujimoto,
Kohichi Sakaniwa,
Ryutaroh Matsumoto.
Rate-Compatible Slepian Wolf Coding with Short Non-Binary LDPC Codes,
第32回情報理論とその応用シンポジウム,
Dec. 2009.
-
鮎川晋弥,
植松友彦,
松本隆太郎.
ユニバーサル情報源符号を用いたギャンブリング,
第32回情報理論とその応用シンポジウム,
SITA 2009予稿集,
pp.833-838,
Dec. 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto.
Narrow Basis Angle Doubles secret Key in the BB84 protocol,
第32回情報理論とその応用シンポジウム,
Dec. 2009.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Universal Slepian-Wolf Source Encoders Constructed by LDPC Matrix with Maximum-Likelihood Decoding,
32th Symposium on Information Theory and its Applications,
Proc. of the 32th Symposium on Information Theory and its Applications,
pp. 625-630,
Nov. 2009.
-
松本隆太郎.
量子鍵配送の誤り訂正にLDPC符号を適用するときの課題について,
情報理論研究会IT,
IEICE Technical Report,
Vol. IEICE-109,
No. IEICE-IT-212,
pp. 49-52,
Sept. 2009.
-
Tetsunao Matsuta,
Shun Watanabe,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Error Exponents for Wyner's Source Coding System,
IEICE Technical Committee Conference on Information Theory,
IEICE Technical Report,
vol. 108,
no. 472,
pp. 379-385,
Mar. 2009.
-
Yuki Tanaka,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Relationship among Conditional Complexities of Individual Sequences,
IEICE Technical Report,
IT2008-64,
Mar. 2009.
-
林 雁かお,
植松友彦,
松本隆太郎.
最多一致に基づく符号化法のユニバーサル性の証明,
電子情報通信学会技術報告,
IT2008-96,
Mar. 2009.
-
Tetsunao Matsuta,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Closed Forms of the Achievable Rate Region for Wyner's Source Coding Systems,
IEICE Technical Committee Conference on Information Theory,
IEICE Technical Report,
vol. 108,
no. 472,
pp. 371-378,
Mar. 2009.
-
Masaki Jono,
Tomohiko Uyematsu,
Ryutaroh Matsumoto.
Universal Lossless Source Coding Based on Sequential Grammar Transforms,
IEICE Technical Report,
IT2008-98,
Mar. 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Optimal Axis Compensation in Quantum Key Distribution Protocols,
IEICE Technical Report,
IT2008-104,
Mar. 2009.
-
Shun Watanabe,
Tuki Saitou,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Strongly Secure Privacy Amplification Cannot be Obtained by Encoder of Slepian-Wolf Code,
IEICE Technical Report,
IT2008-103,
Mar. 2009.
-
Kazuhiro Yamasaki,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
On the Admissible Rate Region of Slepian-Wolf Coding Problem with LDPC Code and Mismatched Decoder,
電子情報通信学会技術報告,
IT2008-102,
Mar. 2009.
-
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Tomography increases key rates of quantum-key distribution protocols.,
SITA2008,
第31回情報理論とその応用シンポジウム予稿集,
pp. 704-709,
Oct. 2008.
-
松本隆太郎.
BB84型量子暗号の情報理論的安全性証明とその応用,
EIC電子情報通信学会2008年ソサイエティ大会講演,
Sept. 2008.
-
立野 央将,
松本隆太郎,
植松友彦.
遅延が時間変動する場合のネットワーク符号化,
電子情報通信学会技術研究報告,
Vol. 108,
No. 158,
pp. 1-6,
July 2008.
-
Atsushi Okawado,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Near ML detection using Dijkstra`s algorithm with bounded list size over MIMO channels,
3rd International Workshop on Wireless Distributed Networks,
電子情報通信学会技術報告,
IT2007-54,
Mar. 2008.
-
Yoshito Yamada,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Network Error-Correcting Codes for Network with Delay,
情報理論研究会,
IEICE Technical Report,
The Institute of Electronics, Information and Communication Engineers,
Vol. 107,
No. 499,
pp. 133-140,
Feb. 2008.
-
山田慈人,
松本 隆太郎,
植松 友彦.
遅延がある場合のネットワーク誤り訂正符号化法,
電子情報通信学会技術報告,
IT2007-69,
Feb. 2008.
-
Masashi Naitou,
Shun Watanabe,
Ryutaroh Matsumoto,
Tomohiko Uyematsu.
Secret Key Agreement by Reliability Information of Signals in Gaussian Maurer's Model,
情報理論研究会,
IEICE Technical Report,
The Institute of Elections、Information and Communication Enginners,
Vol. 107,
No. 499,
pp. 37-41,
Feb. 2008.
-
Ryutaroh Matsumoto.
Secret Key can be obtained from both compatible and incompatible measurements in the six-state QKD protocol,
IEICE Technical Report,
The Institute of Electronics,Information and Communitation Engineers,
p. IT2007-43,
Feb. 2008.
-
松本隆太郎,
渡辺 俊.
BB84量子鍵配送プロトコルで測定基底が送信基底と異なるときの鍵レートと不確定性原理,
社団法人 電子情報通信学会,
pp. 31-40,
Jan. 2008.
-
岩崎正太,
植松友彦,
松本隆太郎.
アウテージ容量が高いMIMO-MLC通信システムの提案,
電子情報通信学会技術研究報告,
Vol. 107,
No. 142,
pp. 31-35,
July 2007.
-
R. Matsumoto.
Construction Algorithm for Optimal Network Error-Correcting Codes,
電子情報通信学会情報理論研究会,
IEICE Technical Report,
Vol. 106,
No. 516,
pp. 41-46,
Jan. 2007.
-
栗原 淳,
植松友彦,
松本 隆太郎.
PA符号を用いたシャノン限界に迫る効率的な多値符号化方式,
電子情報通信学会通信方式研究会,
電子情報通信学会技術研究報告,
Vol. 105,
No. 460,
pp. 45-50,
Dec. 2005.
学位論文
-
A Study of Algebraic Geometry Codes and Related Topics,
本文,
Ph.D.,
Tokyo Institute of Technology,
2001/--/--,
-
,
Master of Engineering,
東京工業大学大学院,
1998/--/--,
-
,
Bachelor,
東京工業大学,
1996/--/--,
[ BibTeX 形式で保存 ]
[ 論文・著書をCSV形式で保存
]
[ 特許をCSV形式で保存
]
|