Person:583231: Difference between revisions

From MaRDI portal
Person:583231
m AuthorDisambiguator moved page Hiroshi Imai to Hiroshi Imai: Duplicate
Created automatically from import240128110107
 
Line 1: Line 1:
{{Person}}
{{person}}

Latest revision as of 11:50, 28 January 2024

Available identifiers

zbMath Open imai.hidekiDBLP14/1398WikidataQ5752362 ScholiaQ5752362MaRDI QIDQ583231

List of research outcomes

PublicationDate of PublicationType
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders2024-01-29Paper
Computing the Tutte polynomial of a graph of moderate size2023-03-21Paper
OBDDs of a monotone function and of its prime implicants2023-01-25Paper
Probing a set of hyperplanes by lines and related problems2023-01-18Paper
FPT algorithms to enumerate and count acyclic and totally cyclic orientations2022-04-27Paper
Extended formulations of lower-truncated transversal polymatroids2021-07-06Paper
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models2018-06-15Paper
Parametric multiroute flow and its application to multilink-attack network2018-05-24Paper
How to Strengthen the Security of RSA-OAEP2017-07-27Paper
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel2017-07-12Paper
Quantum Error Correction Beyond the Bounded Distance Decoding Limit2017-07-12Paper
How to construct efficient signcryption schemes on elliptic curves2016-06-09Paper
Parametric Multiroute Flow and Its Application to Robust Network with $$k$$ Edge Failures2015-10-16Paper
https://portal.mardi4nfdi.de/entity/Q29484332015-09-30Paper
BDD Operations for Quantum Graph States2014-09-02Paper
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption2014-08-21Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-1282014-02-17Paper
Proximity and Motion Planning on ℓ1-Rigid Planar Periodic Graphs2013-12-17Paper
A construction method of matroidal networks2013-08-20Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function2012-10-23Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
Calculating Average Joint Hamming Weight for Minimal Weight Conversion of d Integers2012-06-08Paper
Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints2012-03-09Paper
Matroid enumeration for incidence geometry2012-03-02Paper
Distinguishability measures and entropies for general probabilistic theories2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories2010-12-24Paper
Constructing Better KEMs with Partial Message Recovery2010-11-23Paper
No-cloning theorem on quantum logics2010-08-17Paper
Unconditionally Secure Electronic Voting2010-06-17Paper
Efficient hybrid encryption from ID-based encryption2010-03-02Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
The Role of Arbiters in Asymmetric Authentication Schemes2010-02-09Paper
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions2010-01-14Paper
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2010-01-14Paper
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes2010-01-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use2009-12-03Paper
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation2009-12-03Paper
An improvement of discrete Tardos fingerprinting codes2009-10-14Paper
Generic Construction of Stateful Identity Based Encryption2009-09-29Paper
Conjunctive Broadcast and Attribute-Based Encryption2009-08-18Paper
An approach for stream ciphers design based on joint computing over random and secret data2009-08-10Paper
https://portal.mardi4nfdi.de/entity/Q36324462009-06-11Paper
Computational Geometry Analysis of Quantum State Space and Its Applications2009-05-20Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
Strong Anonymous Signatures2009-04-29Paper
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange2009-04-23Paper
Semantic security for the McEliece cryptosystem without random oracles2009-03-31Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
The Commitment Capacity of the Gaussian Channel Is Infinite2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited2009-02-10Paper
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC2008-12-21Paper
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem2008-12-21Paper
Modeling Block Decoding Approaches for the Fast Correlation Attack2008-12-21Paper
A fibre bundle over manifolds of quantum channels and its application to quantum statistics2008-10-21Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
Algebraic Cryptanalysis of 58-Round SHA-12008-09-16Paper
https://portal.mardi4nfdi.de/entity/Q35225052008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35225102008-09-03Paper
Error-correcting codes and cryptography2008-08-20Paper
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol2008-07-25Paper
An Authentication and Key Exchange Protocol for Secure Credential Services2008-06-17Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption2008-06-10Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys2008-04-24Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths2008-04-17Paper
On the Key-Privacy Issue of McEliece Public-Key Encryption2008-04-17Paper
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption2008-04-15Paper
Trade-Off Traitor Tracing2008-04-11Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication2008-04-11Paper
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function2008-04-11Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations2008-03-18Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2008-03-18Paper
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks2008-03-17Paper
An Efficient Aggregate Shuffle Argument Scheme2008-03-07Paper
Applied Cryptography and Network Security2008-02-19Paper
Generating facets for the cut polytope of a graph by triangular elimination2008-01-07Paper
Cryptography and Coding2007-11-28Paper
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns2007-09-24Paper
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA2007-09-24Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles2007-09-24Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge2007-09-11Paper
Tag-KEM from Set Partial Domain One-Way Permutations2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT2007-09-07Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service2007-09-07Paper
Geometry of optimal estimation scheme forSU(D) channels2007-05-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Security in Communication Networks2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
On the relationship between convex bodies related to correlation experiments with dichotomic observables2006-09-28Paper
Information Security and Privacy2006-06-22Paper
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS2006-06-14Paper
Two-party Bell inequalities derived from combinatorics via triangular elimination2006-01-13Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates2005-08-12Paper
Comparison Between XL and Gröbner Basis Algorithms2005-08-12Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
Quantum versus deterministic counter automata2005-06-01Paper
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs2005-04-05Paper
https://portal.mardi4nfdi.de/entity/Q46546452005-03-08Paper
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS2004-09-29Paper
https://portal.mardi4nfdi.de/entity/Q48175132004-09-24Paper
Fast Correlation Attack Algorithm with List Decoding and an Application2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q48086812004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30445072004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439422004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724182004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724812004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741732004-08-04Paper
Quantify entanglement by concurrence hierarchy2004-06-10Paper
Quantum parameter estimation of a generalized Pauli channel2004-06-10Paper
Phase-covariant quantum cloning2004-06-09Paper
https://portal.mardi4nfdi.de/entity/Q44507312004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44507682004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44371022003-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44371102003-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44266882003-09-16Paper
https://portal.mardi4nfdi.de/entity/Q44283312003-09-15Paper
On the distribution of the peak-to-average power ratio in OFDM signals2003-08-19Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44146912003-07-25Paper
https://portal.mardi4nfdi.de/entity/Q44138632003-07-21Paper
Unconditionally Secure Anonymous Encryption and Group Authentication2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084422003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084442003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47086752003-06-18Paper
https://portal.mardi4nfdi.de/entity/Q45362622003-02-14Paper
https://portal.mardi4nfdi.de/entity/Q47904392003-01-28Paper
One-way probabilistic reversible and quantum one-counter automata.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q27245982002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27244582002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks2002-08-28Paper
https://portal.mardi4nfdi.de/entity/Q27245772002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q27668542002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q45381312002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45381752002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45381922002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45379922002-06-25Paper
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs2002-06-17Paper
https://portal.mardi4nfdi.de/entity/Q49411932002-05-14Paper
https://portal.mardi4nfdi.de/entity/Q45299902002-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49453912002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q49453992002-03-18Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45025132002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024902002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27413912001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q27425972001-09-23Paper
https://portal.mardi4nfdi.de/entity/Q27426482001-09-23Paper
https://portal.mardi4nfdi.de/entity/Q27438022001-09-17Paper
Binary multilevel convolutional codes with unequal error protection capabilities2001-08-14Paper
https://portal.mardi4nfdi.de/entity/Q27074352001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q47618642001-02-21Paper
https://portal.mardi4nfdi.de/entity/Q45257512001-01-24Paper
https://portal.mardi4nfdi.de/entity/Q45026362001-01-14Paper
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima2000-11-08Paper
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets2000-10-10Paper
https://portal.mardi4nfdi.de/entity/Q45054002000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q49450442000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q49450412000-08-24Paper
Restriction, terms and nonlinearity of Boolean functions2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q47636202000-07-04Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography2000-06-07Paper
Relating differential distribution tables to other properties of substitution boxes2000-06-04Paper
https://portal.mardi4nfdi.de/entity/Q49371792000-02-03Paper
https://portal.mardi4nfdi.de/entity/Q49372042000-02-03Paper
https://portal.mardi4nfdi.de/entity/Q42634432000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49351662000-01-30Paper
https://portal.mardi4nfdi.de/entity/Q47034741999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47050291999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47050411999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47038571999-12-01Paper
Applications of error-control coding1999-11-21Paper
https://portal.mardi4nfdi.de/entity/Q42533551999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42533561999-11-08Paper
A New Approach to the Analysis of Free Rotations of Rigid Bodies1999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42678111999-10-24Paper
https://portal.mardi4nfdi.de/entity/Q42678261999-10-20Paper
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases1999-01-12Paper
https://portal.mardi4nfdi.de/entity/Q38391791998-08-13Paper
https://portal.mardi4nfdi.de/entity/Q43736451998-06-14Paper
https://portal.mardi4nfdi.de/entity/Q43736271998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q38400961998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416961997-12-08Paper
https://portal.mardi4nfdi.de/entity/Q43547831997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417901997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43417061997-06-18Paper
On classes of rate k/(k+1) convolutional codes and their decoding techniques1997-05-12Paper
\(\varepsilon\)-approximations of \(k\)-label spaces1997-02-28Paper
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms1996-07-07Paper
https://portal.mardi4nfdi.de/entity/Q43140471995-01-08Paper
A design of Reed-Solomon decoder with systolic-array structure1995-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42795821994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q42796031994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796801994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42797021994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42795271994-02-17Paper
Generalized concatenated codes for channels where unidirectional byte errors are predominant1994-02-07Paper
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications1993-08-10Paper
Human Identification Through Insecure Channel1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40387761993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40288851993-03-28Paper
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference1992-06-27Paper
Finding k points with minimum diameter and related problems1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562331991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562341991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562401991-01-01Paper
Computing simple circuits from a set of line segments1990-01-01Paper
Locating a robot with angle measurements1990-01-01Paper
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33596341990-01-01Paper
Some new binary codes correcting asymmetric/unidirectional errors1990-01-01Paper
Some classes of burst asymmetric or unidirectional error correcting codes1990-01-01Paper
A linear-time algorithm for linear \(L_ 1\) approximation of points1989-01-01Paper
Notes on oriented depth-first search and longest paths1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34952341989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34952361989-01-01Paper
Geometric relations among Voronoi diagrams1988-01-01Paper
Computing the volume of the union of spheres1988-01-01Paper
On the convexity of the multiplicative version of Karmarkar's potential function1988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38030321988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38057371988-01-01Paper
Shortest path between two simple polygons1987-01-01Paper
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37823421987-01-01Paper
Dynamic orthogonal segment intersection search1987-01-01Paper
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37939371987-01-01Paper
Visibility of disjoint polygons1986-01-01Paper
A multiplicative barrier function method for linear programming1986-01-01Paper
Efficient Algorithms for Geometric Graph Search Problems1986-01-01Paper
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES1986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37343081986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37682471986-01-01Paper
On combinatorial structures of line drawings of polyhedra1985-01-01Paper
Voronoi Diagram in the Laguerre Geometry and Its Applications1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37162941985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37415631985-01-01Paper
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM1984-01-01Paper
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS1983-01-01Paper
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane1983-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36772041983-01-01Paper
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS1983-01-01Paper
Finding connected components of an intersection graph of squares in the Euclidean plane1982-01-01Paper
Generalized tensor product codes1981-01-01Paper
A new multilevel coding method using error-correcting codes1977-01-01Paper
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'1977-01-01Paper
A theory of two-dimensional cyclic codes1977-01-01Paper
A construction method for path-invariant comma-free codes (Corresp.)1974-01-01Paper
Two-dimensional Fire codes1973-01-01Paper
A theory of two-dimensional linear recurring arrays1972-01-01Paper
Lazy states: sufficient and necessary condition for zero quantum entropy rates under any coupling to the environment0001-01-03Paper
Quantum Quasi-Cyclic LDPC Codes0001-01-03Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Hiroshi Imai