Hideki Imai

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders
Lecture Notes in Computer Science
2024-01-29Paper
Computing the Tutte polynomial of a graph of moderate size
 
2023-03-21Paper
OBDDs of a monotone function and of its prime implicants
 
2023-01-25Paper
Probing a set of hyperplanes by lines and related problems
Lecture Notes in Computer Science
2023-01-18Paper
FPT algorithms to enumerate and count acyclic and totally cyclic orientations
 
2022-04-27Paper
Extended formulations of lower-truncated transversal polymatroids
Optimization Methods & Software
2021-07-06Paper
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models
 
2018-06-15Paper
Parametric multiroute flow and its application to multilink-attack network
Discrete Optimization
2018-05-24Paper
How to Strengthen the Security of RSA-OAEP
IEEE Transactions on Information Theory
2017-07-27Paper
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel
IEEE Transactions on Information Theory
2017-07-12Paper
Quantum Error Correction Beyond the Bounded Distance Decoding Limit
IEEE Transactions on Information Theory
2017-07-12Paper
How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
2016-06-09Paper
Parametric multiroute flow and its application to robust network with \(k\) edge failures
Lecture Notes in Computer Science
2015-10-16Paper
scientific article; zbMATH DE number 6487863 (Why is no real title available?)
 
2015-09-30Paper
BDD operations for quantum graph states
Reversible Computation
2014-09-02Paper
Reducing the spread of damage of key exposures in key-insulated encryption
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
Periodica Mathematica Hungarica
2014-02-17Paper
Proximity and motion planning on \(\ell _{1}\)-rigid planar periodic graphs
Transactions on Computational Science XX
2013-12-17Paper
A construction method of matroidal networks
Science China Information Sciences
2013-08-20Paper
Ciphertext Policy Multi-dimensional Range Encryption
Lecture Notes in Computer Science
2013-06-04Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
Information Processing Letters
2012-10-23Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
Calculating average joint Hamming weight for minimal weight conversion of \(d\) integers
WALCOM: Algorithms and Computation
2012-06-08Paper
Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints
Lecture Notes in Computer Science
2012-03-09Paper
Matroid enumeration for incidence geometry
Discrete & Computational Geometry
2012-03-02Paper
Distinguishability measures and entropies for general probabilistic theories
Reports on Mathematical Physics
2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories
 
2010-12-24Paper
Constructing Better KEMs with Partial Message Recovery
Information Security and Cryptology
2010-11-23Paper
No-cloning theorem on quantum logics
Journal of Mathematical Physics
2010-08-17Paper
Unconditionally secure electronic voting
Towards Trustworthy Elections
2010-06-17Paper
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
2010-03-02Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
Lecture Notes in Computer Science
2010-02-09Paper
The role of arbiters in asymmetric authentication schemes
Lecture Notes in Computer Science
2010-02-09Paper
Very-efficient anonymous password-authenticated key exchange and its extensions
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Attribute-based encryption supporting direct/indirect revocation modes
Cryptography and Coding
2010-01-07Paper
Leakage-resilient authenticated key establishment protocols
Lecture Notes in Computer Science
2010-01-05Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
Unconditionally secure chaffing-and-winnowing for multiple use
Lecture Notes in Computer Science
2009-12-03Paper
Efficient oblivious transfer protocols achieving a non-zero rate from any non-trivial noisy correlation
Lecture Notes in Computer Science
2009-12-03Paper
An improvement of discrete Tardos fingerprinting codes
Designs, Codes and Cryptography
2009-10-14Paper
Generic Construction of Stateful Identity Based Encryption
Lecture Notes in Computer Science
2009-09-29Paper
Conjunctive Broadcast and Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
An approach for stream ciphers design based on joint computing over random and secret data
Computing
2009-08-10Paper
Deciding non-realizability of oriented matroids by semidefinite programming
 
2009-06-11Paper
Computational Geometry Analysis of Quantum State Space and Its Applications
Generalized Voronoi Diagram: A Geometry-Based Approach to Computational Intelligence
2009-05-20Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Strong Anonymous Signatures
Information Security and Cryptology
2009-04-29Paper
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange
Public Key Infrastructure
2009-04-23Paper
Semantic security for the McEliece cryptosystem without random oracles
Designs, Codes and Cryptography
2009-03-31Paper
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
2009-02-24Paper
The Commitment Capacity of the Gaussian Channel Is Infinite
IEEE Transactions on Information Theory
2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited
Information Security and Cryptology
2009-02-10Paper
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services
Research in Cryptology
2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
IEEE Transactions on Information Theory
2008-12-21Paper
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem
IEEE Transactions on Information Theory
2008-12-21Paper
Modeling Block Decoding Approaches for the Fast Correlation Attack
IEEE Transactions on Information Theory
2008-12-21Paper
A fibre bundle over manifolds of quantum channels and its application to quantum statistics
Journal of Physics A: Mathematical and Theoretical
2008-10-21Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
Algebraic Cryptanalysis of 58-Round SHA-1
Fast Software Encryption
2008-09-16Paper
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures
 
2008-09-03Paper
An information theoretical model for quantum secret sharing schemes
 
2008-09-03Paper
Error-correcting codes and cryptography
Applicable Algebra in Engineering, Communication and Computing
2008-08-20Paper
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Advances in Information and Computer Security
2008-07-25Paper
An Authentication and Key Exchange Protocol for Secure Credential Services
Lecture Notes in Computer Science
2008-06-17Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption
Provable Security
2008-06-10Paper
Bounded CCA2-Secure Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
On the Key-Privacy Issue of McEliece Public-Key Encryption
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
Cryptology and Network Security
2008-04-15Paper
Trade-Off Traitor Tracing
Lecture Notes in Computer Science
2008-04-11Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Lecture Notes in Computer Science
2008-03-18Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
Lecture Notes in Computer Science
2008-03-18Paper
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
An Efficient Aggregate Shuffle Argument Scheme
Financial Cryptography and Data Security
2008-03-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Generating facets for the cut polytope of a graph by triangular elimination
Mathematical Programming. Series A. Series B
2008-01-07Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
Applied Cryptography and Network Security
2007-09-24Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Applied Cryptography and Network Security
2007-09-24Paper
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
Applied Cryptography and Network Security
2007-09-24Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge
Automata, Languages and Programming
2007-09-11Paper
Tag-KEM from Set Partial Domain One-Way Permutations
Information Security and Privacy
2007-09-07Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
Information Security and Privacy
2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Information Security and Privacy
2007-09-07Paper
Geometry of optimal estimation scheme forSU(D) channels
Journal of Physics A: Mathematical and Theoretical
2007-05-07Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
On the relationship between convex bodies related to correlation experiments with dichotomic observables
Journal of Physics A: Mathematical and General
2006-09-28Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS
Journal of the Operations Research Society of Japan
2006-06-14Paper
Two-party Bell inequalities derived from combinatorics via triangular elimination
Journal of Physics A: Mathematical and General
2006-01-13Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Comparison Between XL and Gröbner Basis Algorithms
 
2005-08-12Paper
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
 
2005-08-12Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Quantum versus deterministic counter automata
Theoretical Computer Science
2005-06-01Paper
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs
Optimization Methods & Software
2005-04-05Paper
scientific article; zbMATH DE number 2143016 (Why is no real title available?)
 
2005-03-08Paper
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS
International Journal of Computational Geometry & Applications
2004-09-29Paper
scientific article; zbMATH DE number 2102678 (Why is no real title available?)
 
2004-09-24Paper
Fast Correlation Attack Algorithm with List Decoding and an Application
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2090014 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2086723 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086336 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2085422 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085434 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2080181 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2080236 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2081066 (Why is no real title available?)
 
2004-08-04Paper
Quantify entanglement by concurrence hierarchy
Journal of Physics A: Mathematical and General
2004-06-10Paper
Quantum parameter estimation of a generalized Pauli channel
Journal of Physics A: Mathematical and General
2004-06-10Paper
Phase-covariant quantum cloning
Journal of Physics A: Mathematical and General
2004-06-09Paper
scientific article; zbMATH DE number 2043335 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 2043308 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 2013818 (Why is no real title available?)
 
2003-12-07Paper
scientific article; zbMATH DE number 2013812 (Why is no real title available?)
 
2003-12-07Paper
scientific article; zbMATH DE number 1982619 (Why is no real title available?)
 
2003-09-16Paper
scientific article; zbMATH DE number 1980951 (Why is no real title available?)
 
2003-09-15Paper
On the distribution of the peak-to-average power ratio in OFDM signals
IEEE Transactions on Communications
2003-08-19Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1953229 (Why is no real title available?)
 
2003-07-25Paper
scientific article; zbMATH DE number 1951613 (Why is no real title available?)
 
2003-07-21Paper
Unconditionally Secure Anonymous Encryption and Group Authentication
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941243 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1941244 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1930143 (Why is no real title available?)
 
2003-06-18Paper
scientific article; zbMATH DE number 1759325 (Why is no real title available?)
 
2003-02-14Paper
scientific article; zbMATH DE number 1860710 (Why is no real title available?)
 
2003-01-28Paper
One-way probabilistic reversible and quantum one-counter automata.
Theoretical Computer Science
2003-01-21Paper
scientific article; zbMATH DE number 1618052 (Why is no real title available?)
 
2002-11-04Paper
scientific article; zbMATH DE number 1617941 (Why is no real title available?)
 
2002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
The Computer Journal
2002-08-28Paper
scientific article; zbMATH DE number 1618037 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1696659 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1766719 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1766771 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1766758 (Why is no real title available?)
Journal of the Operations Research Society of Japan
2002-07-11Paper
scientific article; zbMATH DE number 1759271 (Why is no real title available?)
 
2002-06-25Paper
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs
 
2002-06-17Paper
scientific article; zbMATH DE number 1408378 (Why is no real title available?)
 
2002-05-14Paper
scientific article; zbMATH DE number 1738653 (Why is no real title available?)
 
2002-05-07Paper
scientific article; zbMATH DE number 1424191 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1424199 (Why is no real title available?)
 
2002-03-18Paper
scientific article; zbMATH DE number 1583775 (Why is no real title available?)
 
2002-03-06Paper
scientific article; zbMATH DE number 1504561 (Why is no real title available?)
 
2002-01-29Paper
scientific article; zbMATH DE number 1504542 (Why is no real title available?)
 
2002-01-27Paper
Quantum identification protocol with technologically bounded parties
 
2001-10-14Paper
One-way probabilistic reversible and quantum one-counter automata
RIMS Kokyuroku
2001-09-23Paper
Gröbner bases of acyclic tournament graphs and hypergeometric systems on the group of unipotent matrices
RIMS Kokyuroku
2001-09-23Paper
Complexity of Gröbner bases for toric ideals of acyclic tournament graphs
RIMS Kokyuroku
2001-09-17Paper
Binary multilevel convolutional codes with unequal error protection capabilities
IEEE Transactions on Communications
2001-08-14Paper
scientific article; zbMATH DE number 1583794 (Why is no real title available?)
 
2001-04-03Paper
scientific article; zbMATH DE number 1568060 (Why is no real title available?)
 
2001-02-21Paper
scientific article; zbMATH DE number 1555978 (Why is no real title available?)
 
2001-01-24Paper
scientific article; zbMATH DE number 1504673 (Why is no real title available?)
 
2001-01-14Paper
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima
Optimization Methods & Software
2000-11-08Paper
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets
Optimization Methods & Software
2000-10-10Paper
scientific article; zbMATH DE number 1511712 (Why is no real title available?)
 
2000-09-27Paper
scientific article; zbMATH DE number 1420972 (Why is no real title available?)
 
2000-09-04Paper
scientific article; zbMATH DE number 1420969 (Why is no real title available?)
 
2000-08-24Paper
Restriction, terms and nonlinearity of Boolean functions
Theoretical Computer Science
2000-08-23Paper
scientific article; zbMATH DE number 744106 (Why is no real title available?)
 
2000-07-04Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
Advances in Cryptology — EUROCRYPT ’99
2000-06-07Paper
Relating differential distribution tables to other properties of substitution boxes
Designs, Codes and Cryptography
2000-06-04Paper
scientific article; zbMATH DE number 1398063 (Why is no real title available?)
 
2000-02-03Paper
scientific article; zbMATH DE number 1398082 (Why is no real title available?)
 
2000-02-03Paper
scientific article; zbMATH DE number 1341883 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1395339 (Why is no real title available?)
 
2000-01-30Paper
scientific article; zbMATH DE number 1379132 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1379531 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1379519 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1372655 (Why is no real title available?)
 
1999-12-01Paper
Applications of error-control coding
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1322334 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 1322335 (Why is no real title available?)
 
1999-11-08Paper
A New Approach to the Analysis of Free Rotations of Rigid Bodies
ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik
1999-11-08Paper
scientific article; zbMATH DE number 1351090 (Why is no real title available?)
 
1999-10-24Paper
scientific article; zbMATH DE number 1351105 (Why is no real title available?)
 
1999-10-20Paper
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases
Theoretical Computer Science
1999-01-12Paper
scientific article; zbMATH DE number 1189383 (Why is no real title available?)
 
1998-08-13Paper
scientific article; zbMATH DE number 1107700 (Why is no real title available?)
 
1998-06-14Paper
scientific article; zbMATH DE number 1107684 (Why is no real title available?)
 
1998-05-12Paper
scientific article; zbMATH DE number 1186881 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1024017 (Why is no real title available?)
 
1997-12-08Paper
scientific article; zbMATH DE number 1062099 (Why is no real title available?)
 
1997-09-17Paper
scientific article; zbMATH DE number 1024096 (Why is no real title available?)
 
1997-07-20Paper
scientific article; zbMATH DE number 1024024 (Why is no real title available?)
 
1997-06-18Paper
On classes of rate k/(k+1) convolutional codes and their decoding techniques
IEEE Transactions on Information Theory
1997-05-12Paper
\(\varepsilon\)-approximations of \(k\)-label spaces
Theoretical Computer Science
1997-02-28Paper
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms
Discrete Applied Mathematics
1996-07-07Paper
scientific article; zbMATH DE number 697829 (Why is no real title available?)
 
1995-01-08Paper
A design of Reed-Solomon decoder with systolic-array structure
IEEE Transactions on Computers
1995-01-01Paper
scientific article; zbMATH DE number 503257 (Why is no real title available?)
 
1994-09-20Paper
scientific article; zbMATH DE number 503275 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 503363 (Why is no real title available?)
 
1994-02-22Paper
scientific article; zbMATH DE number 503341 (Why is no real title available?)
 
1994-02-22Paper
scientific article; zbMATH DE number 503204 (Why is no real title available?)
 
1994-02-17Paper
Generalized concatenated codes for channels where unidirectional byte errors are predominant
IEEE Transactions on Information Theory
1994-02-07Paper
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications
Discrete Applied Mathematics
1993-08-10Paper
scientific article; zbMATH DE number 177893 (Why is no real title available?)
 
1993-05-18Paper
Human Identification Through Insecure Channel
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 140468 (Why is no real title available?)
 
1993-03-28Paper
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference
Discrete Applied Mathematics
1992-06-27Paper
Finding k points with minimum diameter and related problems
Journal of Algorithms
1991-01-01Paper
scientific article; zbMATH DE number 4208002 (Why is no real title available?)
 
1991-01-01Paper
scientific article; zbMATH DE number 4207997 (Why is no real title available?)
 
1991-01-01Paper
scientific article; zbMATH DE number 4207998 (Why is no real title available?)
 
1991-01-01Paper
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Advances in Cryptology — CRYPTO’ 89 Proceedings
1990-01-01Paper
Computing simple circuits from a set of line segments
Discrete & Computational Geometry
1990-01-01Paper
Locating a robot with angle measurements
Journal of Symbolic Computation
1990-01-01Paper
Some classes of burst asymmetric or unidirectional error correcting codes
Electronics Letters
1990-01-01Paper
Some new binary codes correcting asymmetric/unidirectional errors
IEEE Transactions on Information Theory
1990-01-01Paper
scientific article; zbMATH DE number 4213303 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4168547 (Why is no real title available?)
 
1989-01-01Paper
scientific article; zbMATH DE number 4168549 (Why is no real title available?)
 
1989-01-01Paper
A linear-time algorithm for linear \(L_ 1\) approximation of points
Algorithmica
1989-01-01Paper
Notes on oriented depth-first search and longest paths
Information Processing Letters
1989-01-01Paper
Geometric relations among Voronoi diagrams
Geometriae Dedicata
1988-01-01Paper
scientific article; zbMATH DE number 4070803 (Why is no real title available?)
 
1988-01-01Paper
scientific article; zbMATH DE number 4074316 (Why is no real title available?)
 
1988-01-01Paper
Computing the volume of the union of spheres
The Visual Computer
1988-01-01Paper
On the convexity of the multiplicative version of Karmarkar's potential function
Mathematical Programming. Series A. Series B
1988-01-01Paper
Shortest path between two simple polygons
Information Processing Letters
1987-01-01Paper
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes
IEEE Transactions on Computers
1987-01-01Paper
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING
Journal of the Operations Research Society of Japan
1987-01-01Paper
scientific article; zbMATH DE number 4059112 (Why is no real title available?)
 
1987-01-01Paper
Dynamic orthogonal segment intersection search
Journal of Algorithms
1987-01-01Paper
scientific article; zbMATH DE number 4044614 (Why is no real title available?)
 
1987-01-01Paper
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES
Journal of the Operations Research Society of Japan
1986-01-01Paper
scientific article; zbMATH DE number 4026646 (Why is no real title available?)
 
1986-01-01Paper
Efficient Algorithms for Geometric Graph Search Problems
SIAM Journal on Computing
1986-01-01Paper
Visibility of disjoint polygons
Algorithmica
1986-01-01Paper
A multiplicative barrier function method for linear programming
Algorithmica
1986-01-01Paper
scientific article; zbMATH DE number 3965972 (Why is no real title available?)
 
1986-01-01Paper
scientific article; zbMATH DE number 3974880 (Why is no real title available?)
 
1985-01-01Paper
On combinatorial structures of line drawings of polyhedra
Discrete Applied Mathematics
1985-01-01Paper
Voronoi Diagram in the Laguerre Geometry and Its Applications
SIAM Journal on Computing
1985-01-01Paper
scientific article; zbMATH DE number 3945343 (Why is no real title available?)
 
1985-01-01Paper
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM
Journal of the Operations Research Society of Japan
1984-01-01Paper
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS
Journal of the Operations Research Society of Japan
1983-01-01Paper
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane
Journal of Algorithms
1983-01-01Paper
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS
Journal of the Operations Research Society of Japan
1983-01-01Paper
scientific article; zbMATH DE number 3898275 (Why is no real title available?)
 
1983-01-01Paper
Finding connected components of an intersection graph of squares in the Euclidean plane
Information Processing Letters
1982-01-01Paper
Generalized tensor product codes
IEEE Transactions on Information Theory
1981-01-01Paper
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'
IEEE Transactions on Information Theory
1977-01-01Paper
A new multilevel coding method using error-correcting codes
IEEE Transactions on Information Theory
1977-01-01Paper
A theory of two-dimensional cyclic codes
Information and Control
1977-01-01Paper
A construction method for path-invariant comma-free codes (Corresp.)
IEEE Transactions on Information Theory
1974-01-01Paper
Two-dimensional Fire codes
IEEE Transactions on Information Theory
1973-01-01Paper
A theory of two-dimensional linear recurring arrays
IEEE Transactions on Information Theory
1972-01-01Paper
Lazy states: sufficient and necessary condition for zero quantum entropy rates under any coupling to the environment
 
N/APaper
Quantum Quasi-Cyclic LDPC Codes
 
N/APaper


Research outcomes over time


This page was built for person: Hideki Imai