Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Hiroshi Imai - MaRDI portal

Hiroshi Imai

From MaRDI portal
(Redirected from Person:293454)
Person:583231

Available identifiers

zbMath Open imai.hidekiDBLP14/1398WikidataQ5752362 ScholiaQ5752362MaRDI QIDQ583231

List of research outcomes





PublicationDate of PublicationType
Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders2024-01-29Paper
Computing the Tutte polynomial of a graph of moderate size2023-03-21Paper
OBDDs of a monotone function and of its prime implicants2023-01-25Paper
Probing a set of hyperplanes by lines and related problems2023-01-18Paper
FPT algorithms to enumerate and count acyclic and totally cyclic orientations2022-04-27Paper
Extended formulations of lower-truncated transversal polymatroids2021-07-06Paper
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models2018-06-15Paper
Parametric multiroute flow and its application to multilink-attack network2018-05-24Paper
How to Strengthen the Security of RSA-OAEP2017-07-27Paper
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel2017-07-12Paper
Quantum Error Correction Beyond the Bounded Distance Decoding Limit2017-07-12Paper
How to construct efficient signcryption schemes on elliptic curves2016-06-09Paper
Parametric Multiroute Flow and Its Application to Robust Network with $$k$$ Edge Failures2015-10-16Paper
https://portal.mardi4nfdi.de/entity/Q29484332015-09-30Paper
BDD Operations for Quantum Graph States2014-09-02Paper
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption2014-08-21Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-1282014-02-17Paper
Proximity and Motion Planning on ℓ1-Rigid Planar Periodic Graphs2013-12-17Paper
A construction method of matroidal networks2013-08-20Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function2012-10-23Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
Calculating Average Joint Hamming Weight for Minimal Weight Conversion of d Integers2012-06-08Paper
Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints2012-03-09Paper
Matroid enumeration for incidence geometry2012-03-02Paper
Distinguishability measures and entropies for general probabilistic theories2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories2010-12-24Paper
Constructing Better KEMs with Partial Message Recovery2010-11-23Paper
No-cloning theorem on quantum logics2010-08-17Paper
Unconditionally Secure Electronic Voting2010-06-17Paper
Efficient hybrid encryption from ID-based encryption2010-03-02Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
The Role of Arbiters in Asymmetric Authentication Schemes2010-02-09Paper
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions2010-01-14Paper
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2010-01-14Paper
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes2010-01-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use2009-12-03Paper
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation2009-12-03Paper
An improvement of discrete Tardos fingerprinting codes2009-10-14Paper
Generic Construction of Stateful Identity Based Encryption2009-09-29Paper
Conjunctive Broadcast and Attribute-Based Encryption2009-08-18Paper
An approach for stream ciphers design based on joint computing over random and secret data2009-08-10Paper
https://portal.mardi4nfdi.de/entity/Q36324462009-06-11Paper
Computational Geometry Analysis of Quantum State Space and Its Applications2009-05-20Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
Strong Anonymous Signatures2009-04-29Paper
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange2009-04-23Paper
Semantic security for the McEliece cryptosystem without random oracles2009-03-31Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
The Commitment Capacity of the Gaussian Channel Is Infinite2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited2009-02-10Paper
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC2008-12-21Paper
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem2008-12-21Paper
Modeling Block Decoding Approaches for the Fast Correlation Attack2008-12-21Paper
A fibre bundle over manifolds of quantum channels and its application to quantum statistics2008-10-21Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
Algebraic Cryptanalysis of 58-Round SHA-12008-09-16Paper
https://portal.mardi4nfdi.de/entity/Q35225052008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35225102008-09-03Paper
Error-correcting codes and cryptography2008-08-20Paper
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol2008-07-25Paper
An Authentication and Key Exchange Protocol for Secure Credential Services2008-06-17Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption2008-06-10Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys2008-04-24Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths2008-04-17Paper
On the Key-Privacy Issue of McEliece Public-Key Encryption2008-04-17Paper
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption2008-04-15Paper
Trade-Off Traitor Tracing2008-04-11Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication2008-04-11Paper
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function2008-04-11Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations2008-03-18Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2008-03-18Paper
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks2008-03-17Paper
An Efficient Aggregate Shuffle Argument Scheme2008-03-07Paper
Applied Cryptography and Network Security2008-02-19Paper
Generating facets for the cut polytope of a graph by triangular elimination2008-01-07Paper
Cryptography and Coding2007-11-28Paper
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns2007-09-24Paper
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA2007-09-24Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles2007-09-24Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge2007-09-11Paper
Tag-KEM from Set Partial Domain One-Way Permutations2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT2007-09-07Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service2007-09-07Paper
Geometry of optimal estimation scheme forSU(D) channels2007-05-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Security in Communication Networks2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
On the relationship between convex bodies related to correlation experiments with dichotomic observables2006-09-28Paper
Information Security and Privacy2006-06-22Paper
NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS2006-06-14Paper
Two-party Bell inequalities derived from combinatorics via triangular elimination2006-01-13Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates2005-08-12Paper
Comparison Between XL and Gröbner Basis Algorithms2005-08-12Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
Quantum versus deterministic counter automata2005-06-01Paper
Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs2005-04-05Paper
https://portal.mardi4nfdi.de/entity/Q46546452005-03-08Paper
ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS2004-09-29Paper
https://portal.mardi4nfdi.de/entity/Q48175132004-09-24Paper
https://portal.mardi4nfdi.de/entity/Q48086812004-08-12Paper
Fast Correlation Attack Algorithm with List Decoding and an Application2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30445072004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439422004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724182004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724812004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741732004-08-04Paper
Quantify entanglement by concurrence hierarchy2004-06-10Paper
Quantum parameter estimation of a generalized Pauli channel2004-06-10Paper
Phase-covariant quantum cloning2004-06-09Paper
https://portal.mardi4nfdi.de/entity/Q44507312004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44507682004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44371022003-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44371102003-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44266882003-09-16Paper
https://portal.mardi4nfdi.de/entity/Q44283312003-09-15Paper
On the distribution of the peak-to-average power ratio in OFDM signals2003-08-19Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44146912003-07-25Paper
https://portal.mardi4nfdi.de/entity/Q44138632003-07-21Paper
Unconditionally Secure Anonymous Encryption and Group Authentication2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084422003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084442003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47086752003-06-18Paper
https://portal.mardi4nfdi.de/entity/Q45362622003-02-14Paper
https://portal.mardi4nfdi.de/entity/Q47904392003-01-28Paper
One-way probabilistic reversible and quantum one-counter automata.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q27245982002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27244582002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks2002-08-28Paper
https://portal.mardi4nfdi.de/entity/Q27245772002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q27668542002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q45381312002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45381752002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45381922002-07-11Paper
https://portal.mardi4nfdi.de/entity/Q45379922002-06-25Paper
Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs2002-06-17Paper
https://portal.mardi4nfdi.de/entity/Q49411932002-05-14Paper
https://portal.mardi4nfdi.de/entity/Q45299902002-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49453912002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q49453992002-03-18Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45025132002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024902002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27413912001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q27425972001-09-23Paper
https://portal.mardi4nfdi.de/entity/Q27426482001-09-23Paper
https://portal.mardi4nfdi.de/entity/Q27438022001-09-17Paper
Binary multilevel convolutional codes with unequal error protection capabilities2001-08-14Paper
https://portal.mardi4nfdi.de/entity/Q27074352001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q47618642001-02-21Paper
https://portal.mardi4nfdi.de/entity/Q45257512001-01-24Paper
https://portal.mardi4nfdi.de/entity/Q45026362001-01-14Paper
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima2000-11-08Paper
Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets2000-10-10Paper
https://portal.mardi4nfdi.de/entity/Q45054002000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q49450442000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q49450412000-08-24Paper
Restriction, terms and nonlinearity of Boolean functions2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q47636202000-07-04Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography2000-06-07Paper
Relating differential distribution tables to other properties of substitution boxes2000-06-04Paper
https://portal.mardi4nfdi.de/entity/Q49371792000-02-03Paper
https://portal.mardi4nfdi.de/entity/Q49372042000-02-03Paper
https://portal.mardi4nfdi.de/entity/Q42634432000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49351662000-01-30Paper
https://portal.mardi4nfdi.de/entity/Q47034741999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47050291999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47050411999-12-15Paper
https://portal.mardi4nfdi.de/entity/Q47038571999-12-01Paper
Applications of error-control coding1999-11-21Paper
https://portal.mardi4nfdi.de/entity/Q42533551999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42533561999-11-08Paper
A New Approach to the Analysis of Free Rotations of Rigid Bodies1999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42678111999-10-24Paper
https://portal.mardi4nfdi.de/entity/Q42678261999-10-20Paper
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases1999-01-12Paper
https://portal.mardi4nfdi.de/entity/Q38391791998-08-13Paper
https://portal.mardi4nfdi.de/entity/Q43736451998-06-14Paper
https://portal.mardi4nfdi.de/entity/Q43736271998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q38400961998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43416961997-12-08Paper
https://portal.mardi4nfdi.de/entity/Q43547831997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417901997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43417061997-06-18Paper
On classes of rate k/(k+1) convolutional codes and their decoding techniques1997-05-12Paper
\(\varepsilon\)-approximations of \(k\)-label spaces1997-02-28Paper
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms1996-07-07Paper
https://portal.mardi4nfdi.de/entity/Q43140471995-01-08Paper
A design of Reed-Solomon decoder with systolic-array structure1995-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42795821994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q42796031994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796801994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42797021994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42795271994-02-17Paper
Generalized concatenated codes for channels where unidirectional byte errors are predominant1994-02-07Paper
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications1993-08-10Paper
Human Identification Through Insecure Channel1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40387761993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40288851993-03-28Paper
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference1992-06-27Paper
Finding k points with minimum diameter and related problems1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562331991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562341991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33562401991-01-01Paper
Some classes of burst asymmetric or unidirectional error correcting codes1990-01-01Paper
Computing simple circuits from a set of line segments1990-01-01Paper
Locating a robot with angle measurements1990-01-01Paper
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33596341990-01-01Paper
Some new binary codes correcting asymmetric/unidirectional errors1990-01-01Paper
A linear-time algorithm for linear \(L_ 1\) approximation of points1989-01-01Paper
Notes on oriented depth-first search and longest paths1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34952341989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34952361989-01-01Paper
Geometric relations among Voronoi diagrams1988-01-01Paper
Computing the volume of the union of spheres1988-01-01Paper
On the convexity of the multiplicative version of Karmarkar's potential function1988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38030321988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38057371988-01-01Paper
Shortest path between two simple polygons1987-01-01Paper
EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37823421987-01-01Paper
Dynamic orthogonal segment intersection search1987-01-01Paper
A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37939371987-01-01Paper
Visibility of disjoint polygons1986-01-01Paper
A multiplicative barrier function method for linear programming1986-01-01Paper
Efficient Algorithms for Geometric Graph Search Problems1986-01-01Paper
WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES1986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37343081986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37682471986-01-01Paper
On combinatorial structures of line drawings of polyhedra1985-01-01Paper
Voronoi Diagram in the Laguerre Geometry and Its Applications1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37162941985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37415631985-01-01Paper
PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM1984-01-01Paper
NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS1983-01-01Paper
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane1983-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36772041983-01-01Paper
ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS1983-01-01Paper
Finding connected components of an intersection graph of squares in the Euclidean plane1982-01-01Paper
Generalized tensor product codes1981-01-01Paper
A new multilevel coding method using error-correcting codes1977-01-01Paper
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'1977-01-01Paper
A theory of two-dimensional cyclic codes1977-01-01Paper
A construction method for path-invariant comma-free codes (Corresp.)1974-01-01Paper
Two-dimensional Fire codes1973-01-01Paper
A theory of two-dimensional linear recurring arrays1972-01-01Paper
Lazy states: sufficient and necessary condition for zero quantum entropy rates under any coupling to the environmentN/APaper
Quantum Quasi-Cyclic LDPC CodesN/APaper

Research outcomes over time

This page was built for person: Hiroshi Imai