| Publication | Date of Publication | Type |
|---|
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders Lecture Notes in Computer Science | 2024-01-29 | Paper |
Computing the Tutte polynomial of a graph of moderate size | 2023-03-21 | Paper |
OBDDs of a monotone function and of its prime implicants | 2023-01-25 | Paper |
Probing a set of hyperplanes by lines and related problems Lecture Notes in Computer Science | 2023-01-18 | Paper |
FPT algorithms to enumerate and count acyclic and totally cyclic orientations | 2022-04-27 | Paper |
Extended formulations of lower-truncated transversal polymatroids Optimization Methods & Software | 2021-07-06 | Paper |
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models | 2018-06-15 | Paper |
Parametric multiroute flow and its application to multilink-attack network Discrete Optimization | 2018-05-24 | Paper |
How to Strengthen the Security of RSA-OAEP IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Quantum Error Correction Beyond the Bounded Distance Decoding Limit IEEE Transactions on Information Theory | 2017-07-12 | Paper |
How to construct efficient signcryption schemes on elliptic curves Information Processing Letters | 2016-06-09 | Paper |
Parametric multiroute flow and its application to robust network with \(k\) edge failures Lecture Notes in Computer Science | 2015-10-16 | Paper |
scientific article; zbMATH DE number 6487863 (Why is no real title available?) | 2015-09-30 | Paper |
BDD operations for quantum graph states Reversible Computation | 2014-09-02 | Paper |
Reducing the spread of damage of key exposures in key-insulated encryption Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 Periodica Mathematica Hungarica | 2014-02-17 | Paper |
Proximity and motion planning on \(\ell _{1}\)-rigid planar periodic graphs Transactions on Computational Science XX | 2013-12-17 | Paper |
A construction method of matroidal networks Science China Information Sciences | 2013-08-20 | Paper |
Ciphertext Policy Multi-dimensional Range Encryption Lecture Notes in Computer Science | 2013-06-04 | Paper |
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function Information Processing Letters | 2012-10-23 | Paper |
Time-specific encryption from forward-secure encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Calculating average joint Hamming weight for minimal weight conversion of \(d\) integers WALCOM: Algorithms and Computation | 2012-06-08 | Paper |
Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints Lecture Notes in Computer Science | 2012-03-09 | Paper |
Matroid enumeration for incidence geometry Discrete & Computational Geometry | 2012-03-02 | Paper |
Distinguishability measures and entropies for general probabilistic theories Reports on Mathematical Physics | 2011-06-03 | Paper |
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories | 2010-12-24 | Paper |
Constructing Better KEMs with Partial Message Recovery Information Security and Cryptology | 2010-11-23 | Paper |
No-cloning theorem on quantum logics Journal of Mathematical Physics | 2010-08-17 | Paper |
Unconditionally secure electronic voting Towards Trustworthy Elections | 2010-06-17 | Paper |
Efficient hybrid encryption from ID-based encryption Designs, Codes and Cryptography | 2010-03-02 | Paper |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations Lecture Notes in Computer Science | 2010-02-09 | Paper |
The role of arbiters in asymmetric authentication schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
Very-efficient anonymous password-authenticated key exchange and its extensions Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Attribute-based encryption supporting direct/indirect revocation modes Cryptography and Coding | 2010-01-07 | Paper |
Leakage-resilient authenticated key establishment protocols Lecture Notes in Computer Science | 2010-01-05 | Paper |
Advances in Cryptology - ASIACRYPT 2003 Lecture Notes in Computer Science | 2010-01-05 | Paper |
Unconditionally secure chaffing-and-winnowing for multiple use Lecture Notes in Computer Science | 2009-12-03 | Paper |
Efficient oblivious transfer protocols achieving a non-zero rate from any non-trivial noisy correlation Lecture Notes in Computer Science | 2009-12-03 | Paper |
An improvement of discrete Tardos fingerprinting codes Designs, Codes and Cryptography | 2009-10-14 | Paper |
Generic Construction of Stateful Identity Based Encryption Lecture Notes in Computer Science | 2009-09-29 | Paper |
Conjunctive Broadcast and Attribute-Based Encryption Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
An approach for stream ciphers design based on joint computing over random and secret data Computing | 2009-08-10 | Paper |
Deciding non-realizability of oriented matroids by semidefinite programming | 2009-06-11 | Paper |
Computational Geometry Analysis of Quantum State Space and Its Applications Generalized Voronoi Diagram: A Geometry-Based Approach to Computational Intelligence | 2009-05-20 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Strong Anonymous Signatures Information Security and Cryptology | 2009-04-29 | Paper |
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange Public Key Infrastructure | 2009-04-23 | Paper |
Semantic security for the McEliece cryptosystem without random oracles Designs, Codes and Cryptography | 2009-03-31 | Paper |
Introduction to the Special Issue on Information Theoretic Security IEEE Transactions on Information Theory | 2009-02-24 | Paper |
The Commitment Capacity of the Gaussian Channel Is Infinite IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Orthogonality between Key Privacy and Data Privacy, Revisited Information Security and Cryptology | 2009-02-10 | Paper |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services Research in Cryptology | 2009-01-22 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction Cryptology and Network Security | 2009-01-09 | Paper |
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Modeling Block Decoding Approaches for the Fast Correlation Attack IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A fibre bundle over manifolds of quantum channels and its application to quantum statistics Journal of Physics A: Mathematical and Theoretical | 2008-10-21 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
Algebraic Cryptanalysis of 58-Round SHA-1 Fast Software Encryption | 2008-09-16 | Paper |
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures | 2008-09-03 | Paper |
An information theoretical model for quantum secret sharing schemes | 2008-09-03 | Paper |
Error-correcting codes and cryptography Applicable Algebra in Engineering, Communication and Computing | 2008-08-20 | Paper |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol Advances in Information and Computer Security | 2008-07-25 | Paper |
An Authentication and Key Exchange Protocol for Secure Credential Services Lecture Notes in Computer Science | 2008-06-17 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function Provable Security | 2008-06-10 | Paper |
Formal Security Treatments for Signatures from Identity-Based Encryption Provable Security | 2008-06-10 | Paper |
Bounded CCA2-Secure Encryption Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
On the Key-Privacy Issue of McEliece Public-Key Encryption Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption Cryptology and Network Security | 2008-04-15 | Paper |
Trade-Off Traitor Tracing Lecture Notes in Computer Science | 2008-04-11 | Paper |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Lecture Notes in Computer Science | 2008-03-18 | Paper |
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations Lecture Notes in Computer Science | 2008-03-18 | Paper |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
An Efficient Aggregate Shuffle Argument Scheme Financial Cryptography and Data Security | 2008-03-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Generating facets for the cut polytope of a graph by triangular elimination Mathematical Programming. Series A. Series B | 2008-01-07 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA Applied Cryptography and Network Security | 2007-09-24 | Paper |
Short Signature and Universal Designated Verifier Signature Without Random Oracles Applied Cryptography and Network Security | 2007-09-24 | Paper |
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns Applied Cryptography and Network Security | 2007-09-24 | Paper |
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge Automata, Languages and Programming | 2007-09-11 | Paper |
Tag-KEM from Set Partial Domain One-Way Permutations Information Security and Privacy | 2007-09-07 | Paper |
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service Information Security and Privacy | 2007-09-07 | Paper |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT Information Security and Privacy | 2007-09-07 | Paper |
Geometry of optimal estimation scheme forSU(D) channels Journal of Physics A: Mathematical and Theoretical | 2007-05-07 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
On the relationship between convex bodies related to correlation experiments with dichotomic observables Journal of Physics A: Mathematical and General | 2006-09-28 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS Journal of the Operations Research Society of Japan | 2006-06-14 | Paper |
Two-party Bell inequalities derived from combinatorics via triangular elimination Journal of Physics A: Mathematical and General | 2006-01-13 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Comparison Between XL and Gröbner Basis Algorithms | 2005-08-12 | Paper |
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates | 2005-08-12 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Quantum versus deterministic counter automata Theoretical Computer Science | 2005-06-01 | Paper |
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs Optimization Methods & Software | 2005-04-05 | Paper |
scientific article; zbMATH DE number 2143016 (Why is no real title available?) | 2005-03-08 | Paper |
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS International Journal of Computational Geometry & Applications | 2004-09-29 | Paper |
scientific article; zbMATH DE number 2102678 (Why is no real title available?) | 2004-09-24 | Paper |
Fast Correlation Attack Algorithm with List Decoding and an Application Fast Software Encryption | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2090014 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2086723 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2086336 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2085422 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085434 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2080181 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2080236 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2081066 (Why is no real title available?) | 2004-08-04 | Paper |
Quantify entanglement by concurrence hierarchy Journal of Physics A: Mathematical and General | 2004-06-10 | Paper |
Quantum parameter estimation of a generalized Pauli channel Journal of Physics A: Mathematical and General | 2004-06-10 | Paper |
Phase-covariant quantum cloning Journal of Physics A: Mathematical and General | 2004-06-09 | Paper |
scientific article; zbMATH DE number 2043335 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 2043308 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 2013818 (Why is no real title available?) | 2003-12-07 | Paper |
scientific article; zbMATH DE number 2013812 (Why is no real title available?) | 2003-12-07 | Paper |
scientific article; zbMATH DE number 1982619 (Why is no real title available?) | 2003-09-16 | Paper |
scientific article; zbMATH DE number 1980951 (Why is no real title available?) | 2003-09-15 | Paper |
On the distribution of the peak-to-average power ratio in OFDM signals IEEE Transactions on Communications | 2003-08-19 | Paper |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
scientific article; zbMATH DE number 1953229 (Why is no real title available?) | 2003-07-25 | Paper |
scientific article; zbMATH DE number 1951613 (Why is no real title available?) | 2003-07-21 | Paper |
Unconditionally Secure Anonymous Encryption and Group Authentication Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1941243 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1941244 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1930143 (Why is no real title available?) | 2003-06-18 | Paper |
scientific article; zbMATH DE number 1759325 (Why is no real title available?) | 2003-02-14 | Paper |
scientific article; zbMATH DE number 1860710 (Why is no real title available?) | 2003-01-28 | Paper |
One-way probabilistic reversible and quantum one-counter automata. Theoretical Computer Science | 2003-01-21 | Paper |
scientific article; zbMATH DE number 1618052 (Why is no real title available?) | 2002-11-04 | Paper |
scientific article; zbMATH DE number 1617941 (Why is no real title available?) | 2002-09-01 | Paper |
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks The Computer Journal | 2002-08-28 | Paper |
scientific article; zbMATH DE number 1618037 (Why is no real title available?) | 2002-07-22 | Paper |
scientific article; zbMATH DE number 1696659 (Why is no real title available?) | 2002-07-22 | Paper |
scientific article; zbMATH DE number 1766719 (Why is no real title available?) Journal of the Operations Research Society of Japan | 2002-07-11 | Paper |
scientific article; zbMATH DE number 1766771 (Why is no real title available?) Journal of the Operations Research Society of Japan | 2002-07-11 | Paper |
scientific article; zbMATH DE number 1766758 (Why is no real title available?) Journal of the Operations Research Society of Japan | 2002-07-11 | Paper |
scientific article; zbMATH DE number 1759271 (Why is no real title available?) | 2002-06-25 | Paper |
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs | 2002-06-17 | Paper |
scientific article; zbMATH DE number 1408378 (Why is no real title available?) | 2002-05-14 | Paper |
scientific article; zbMATH DE number 1738653 (Why is no real title available?) | 2002-05-07 | Paper |
scientific article; zbMATH DE number 1424191 (Why is no real title available?) | 2002-04-08 | Paper |
scientific article; zbMATH DE number 1424199 (Why is no real title available?) | 2002-03-18 | Paper |
scientific article; zbMATH DE number 1583775 (Why is no real title available?) | 2002-03-06 | Paper |
scientific article; zbMATH DE number 1504561 (Why is no real title available?) | 2002-01-29 | Paper |
scientific article; zbMATH DE number 1504542 (Why is no real title available?) | 2002-01-27 | Paper |
Quantum identification protocol with technologically bounded parties | 2001-10-14 | Paper |
One-way probabilistic reversible and quantum one-counter automata RIMS Kokyuroku | 2001-09-23 | Paper |
Gröbner bases of acyclic tournament graphs and hypergeometric systems on the group of unipotent matrices RIMS Kokyuroku | 2001-09-23 | Paper |
Complexity of Gröbner bases for toric ideals of acyclic tournament graphs RIMS Kokyuroku | 2001-09-17 | Paper |
Binary multilevel convolutional codes with unequal error protection capabilities IEEE Transactions on Communications | 2001-08-14 | Paper |
scientific article; zbMATH DE number 1583794 (Why is no real title available?) | 2001-04-03 | Paper |
scientific article; zbMATH DE number 1568060 (Why is no real title available?) | 2001-02-21 | Paper |
scientific article; zbMATH DE number 1555978 (Why is no real title available?) | 2001-01-24 | Paper |
scientific article; zbMATH DE number 1504673 (Why is no real title available?) | 2001-01-14 | Paper |
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima Optimization Methods & Software | 2000-11-08 | Paper |
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets Optimization Methods & Software | 2000-10-10 | Paper |
scientific article; zbMATH DE number 1511712 (Why is no real title available?) | 2000-09-27 | Paper |
scientific article; zbMATH DE number 1420972 (Why is no real title available?) | 2000-09-04 | Paper |
scientific article; zbMATH DE number 1420969 (Why is no real title available?) | 2000-08-24 | Paper |
Restriction, terms and nonlinearity of Boolean functions Theoretical Computer Science | 2000-08-23 | Paper |
scientific article; zbMATH DE number 744106 (Why is no real title available?) | 2000-07-04 | Paper |
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography Advances in Cryptology — EUROCRYPT ’99 | 2000-06-07 | Paper |
Relating differential distribution tables to other properties of substitution boxes Designs, Codes and Cryptography | 2000-06-04 | Paper |
scientific article; zbMATH DE number 1398063 (Why is no real title available?) | 2000-02-03 | Paper |
scientific article; zbMATH DE number 1398082 (Why is no real title available?) | 2000-02-03 | Paper |
scientific article; zbMATH DE number 1341883 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1395339 (Why is no real title available?) | 2000-01-30 | Paper |
scientific article; zbMATH DE number 1379132 (Why is no real title available?) | 1999-12-15 | Paper |
scientific article; zbMATH DE number 1379531 (Why is no real title available?) | 1999-12-15 | Paper |
scientific article; zbMATH DE number 1379519 (Why is no real title available?) | 1999-12-15 | Paper |
scientific article; zbMATH DE number 1372655 (Why is no real title available?) | 1999-12-01 | Paper |
Applications of error-control coding IEEE Transactions on Information Theory | 1999-11-21 | Paper |
scientific article; zbMATH DE number 1322334 (Why is no real title available?) | 1999-11-08 | Paper |
scientific article; zbMATH DE number 1322335 (Why is no real title available?) | 1999-11-08 | Paper |
A New Approach to the Analysis of Free Rotations of Rigid Bodies ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik | 1999-11-08 | Paper |
scientific article; zbMATH DE number 1351090 (Why is no real title available?) | 1999-10-24 | Paper |
scientific article; zbMATH DE number 1351105 (Why is no real title available?) | 1999-10-20 | Paper |
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases Theoretical Computer Science | 1999-01-12 | Paper |
scientific article; zbMATH DE number 1189383 (Why is no real title available?) | 1998-08-13 | Paper |
scientific article; zbMATH DE number 1107700 (Why is no real title available?) | 1998-06-14 | Paper |
scientific article; zbMATH DE number 1107684 (Why is no real title available?) | 1998-05-12 | Paper |
scientific article; zbMATH DE number 1186881 (Why is no real title available?) | 1998-01-01 | Paper |
scientific article; zbMATH DE number 1024017 (Why is no real title available?) | 1997-12-08 | Paper |
scientific article; zbMATH DE number 1062099 (Why is no real title available?) | 1997-09-17 | Paper |
scientific article; zbMATH DE number 1024096 (Why is no real title available?) | 1997-07-20 | Paper |
scientific article; zbMATH DE number 1024024 (Why is no real title available?) | 1997-06-18 | Paper |
On classes of rate k/(k+1) convolutional codes and their decoding techniques IEEE Transactions on Information Theory | 1997-05-12 | Paper |
\(\varepsilon\)-approximations of \(k\)-label spaces Theoretical Computer Science | 1997-02-28 | Paper |
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms Discrete Applied Mathematics | 1996-07-07 | Paper |
scientific article; zbMATH DE number 697829 (Why is no real title available?) | 1995-01-08 | Paper |
A design of Reed-Solomon decoder with systolic-array structure IEEE Transactions on Computers | 1995-01-01 | Paper |
scientific article; zbMATH DE number 503257 (Why is no real title available?) | 1994-09-20 | Paper |
scientific article; zbMATH DE number 503275 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 503363 (Why is no real title available?) | 1994-02-22 | Paper |
scientific article; zbMATH DE number 503341 (Why is no real title available?) | 1994-02-22 | Paper |
scientific article; zbMATH DE number 503204 (Why is no real title available?) | 1994-02-17 | Paper |
Generalized concatenated codes for channels where unidirectional byte errors are predominant IEEE Transactions on Information Theory | 1994-02-07 | Paper |
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications Discrete Applied Mathematics | 1993-08-10 | Paper |
scientific article; zbMATH DE number 177893 (Why is no real title available?) | 1993-05-18 | Paper |
Human Identification Through Insecure Channel Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
scientific article; zbMATH DE number 140468 (Why is no real title available?) | 1993-03-28 | Paper |
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference Discrete Applied Mathematics | 1992-06-27 | Paper |
Finding k points with minimum diameter and related problems Journal of Algorithms | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4208002 (Why is no real title available?) | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4207997 (Why is no real title available?) | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4207998 (Why is no real title available?) | 1991-01-01 | Paper |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses Advances in Cryptology — CRYPTO’ 89 Proceedings | 1990-01-01 | Paper |
Computing simple circuits from a set of line segments Discrete & Computational Geometry | 1990-01-01 | Paper |
Locating a robot with angle measurements Journal of Symbolic Computation | 1990-01-01 | Paper |
Some classes of burst asymmetric or unidirectional error correcting codes Electronics Letters | 1990-01-01 | Paper |
Some new binary codes correcting asymmetric/unidirectional errors IEEE Transactions on Information Theory | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4213303 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4168547 (Why is no real title available?) | 1989-01-01 | Paper |
scientific article; zbMATH DE number 4168549 (Why is no real title available?) | 1989-01-01 | Paper |
A linear-time algorithm for linear \(L_ 1\) approximation of points Algorithmica | 1989-01-01 | Paper |
Notes on oriented depth-first search and longest paths Information Processing Letters | 1989-01-01 | Paper |
Geometric relations among Voronoi diagrams Geometriae Dedicata | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4070803 (Why is no real title available?) | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4074316 (Why is no real title available?) | 1988-01-01 | Paper |
Computing the volume of the union of spheres The Visual Computer | 1988-01-01 | Paper |
On the convexity of the multiplicative version of Karmarkar's potential function Mathematical Programming. Series A. Series B | 1988-01-01 | Paper |
Shortest path between two simple polygons Information Processing Letters | 1987-01-01 | Paper |
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes IEEE Transactions on Computers | 1987-01-01 | Paper |
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING Journal of the Operations Research Society of Japan | 1987-01-01 | Paper |
scientific article; zbMATH DE number 4059112 (Why is no real title available?) | 1987-01-01 | Paper |
Dynamic orthogonal segment intersection search Journal of Algorithms | 1987-01-01 | Paper |
scientific article; zbMATH DE number 4044614 (Why is no real title available?) | 1987-01-01 | Paper |
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES Journal of the Operations Research Society of Japan | 1986-01-01 | Paper |
scientific article; zbMATH DE number 4026646 (Why is no real title available?) | 1986-01-01 | Paper |
Efficient Algorithms for Geometric Graph Search Problems SIAM Journal on Computing | 1986-01-01 | Paper |
Visibility of disjoint polygons Algorithmica | 1986-01-01 | Paper |
A multiplicative barrier function method for linear programming Algorithmica | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3965972 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3974880 (Why is no real title available?) | 1985-01-01 | Paper |
On combinatorial structures of line drawings of polyhedra Discrete Applied Mathematics | 1985-01-01 | Paper |
Voronoi Diagram in the Laguerre Geometry and Its Applications SIAM Journal on Computing | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3945343 (Why is no real title available?) | 1985-01-01 | Paper |
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM Journal of the Operations Research Society of Japan | 1984-01-01 | Paper |
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS Journal of the Operations Research Society of Japan | 1983-01-01 | Paper |
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane Journal of Algorithms | 1983-01-01 | Paper |
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS Journal of the Operations Research Society of Japan | 1983-01-01 | Paper |
scientific article; zbMATH DE number 3898275 (Why is no real title available?) | 1983-01-01 | Paper |
Finding connected components of an intersection graph of squares in the Euclidean plane Information Processing Letters | 1982-01-01 | Paper |
Generalized tensor product codes IEEE Transactions on Information Theory | 1981-01-01 | Paper |
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes' IEEE Transactions on Information Theory | 1977-01-01 | Paper |
A new multilevel coding method using error-correcting codes IEEE Transactions on Information Theory | 1977-01-01 | Paper |
A theory of two-dimensional cyclic codes Information and Control | 1977-01-01 | Paper |
A construction method for path-invariant comma-free codes (Corresp.) IEEE Transactions on Information Theory | 1974-01-01 | Paper |
Two-dimensional Fire codes IEEE Transactions on Information Theory | 1973-01-01 | Paper |
A theory of two-dimensional linear recurring arrays IEEE Transactions on Information Theory | 1972-01-01 | Paper |
Lazy states: sufficient and necessary condition for zero quantum entropy rates under any coupling to the environment | N/A | Paper |
Quantum Quasi-Cyclic LDPC Codes | N/A | Paper |