Edit Profile (opens in new tab) Imai, Hideki Compute Distance To: Compute Author ID: imai.hideki Published as: Imai, Hideki; Imai, Hiroshi; Imai, H. Further Spellings: 今井 秀樹 External Links: MGP · Wikidata · ResearchGate · dblp · GND · IdRef Documents Indexed: 265 Publications since 1972, including 1 Book 13 Contributions as Editor Co-Authors: 201 Co-Authors with 262 Joint Publications 3,412 Co-Co-Authors all top 5 Co-Authors 16 single-authored 41 Hanaoka, Goichiro 22 Kobara, Kazukuni 21 Zheng, Yuliang 15 Zhang, Rui 14 Imai, Keiko 14 Matsumoto, Tsutomu 14 Mihaljević, Miodrag J. 12 Fossorier, Marc P. C. 12 Shikata, Junji 10 Nascimento, Anderson C. A. 9 Attrapadung, Nuttapong 9 Cui, Yang 9 Matsuura, Kanta 8 Hagiwara, Manabu 7 Asano, Takao 7 Hanaoka, Yumiko 7 Iri, Masao 7 Müller-Quade, Jörn 7 Otsuka, Akira 7 Saitoh, Yuichi 6 Furukawa, Jun 6 Hiraishi, Hidefumi 6 Kobayashi, Hirotada 6 Shin, SeongHan 6 Yamasaki, Tomohiro 5 Avis, David M. 5 Ogawa, Kazuto 4 Ishizeki, Takayuki 4 Kitagawa, Takashi 4 Matsuda, Takahiro 4 Matsumoto, Keiji 4 Moriyama, Sonoko 4 Nishioka, Tsuyoshi 4 Watanabe, Hajime 4 Watanabe, Yuji 4 Yamaguchi, Kazuhiko 4 Yang, Peng 3 Abe, Masayuki 3 Asano, Tetsuo 3 Fujiwara, Akio 3 Ito, Tsuyoshi 3 Iwamura, Keiichi 3 Katoh, Naoki 3 Morozov, Kirill Evgen’evich 3 Nuida, Koji 3 Sugita, Makoto 3 Suppakitpaisarn, Vorapong 3 Takeuchi, Fumihiko 3 Tokunaga, Yuuki 3 Tokuyama, Takeshi 3 Winter, Andreas 3 Zhang, Xian-Mo 2 Asano, Yasuhito 2 Aurenhammer, Franz 2 Baffier, Jean-François 2 Breitbach, Markus 2 Edahiro, Masato 2 Fan, Heng 2 Fujitsu, Satoshi 2 Gangopadhyay, Sugata 2 Hasegawa, Susumu 2 Hayashi, Masahito 2 Hirakawa, Shuji 2 Houle, Michael E. 2 Inaba, Mary 2 Ishiguro, Masaki 2 Kasamatsu, Kohei 2 Kato, Kimikazu 2 Kawazoe, Mitsuru 2 Kiltz, Eike 2 Kurosawa, Kaoru 2 Lin, Shu 2 Masada, Tomonari 2 Miyakawa, Hiroshi 2 Nojima, Ryo 2 Ohtake, Go 2 Paul, Goutam 2 Poli, Alain 2 Robert, Jean-Marc 2 Sadakane, Kunihiko 2 Sakakibara, Yasubumi 2 Sekine, Kyoko 2 Shigetomi, Rie 2 Suzuki, Joe 2 Yamamoto, Peter 1 Aggarwal, Alok 1 Alharby, Abdulrahman 1 Ars, Gwénolé 1 Barros, João Paulo 1 Bhattacharya, Binay Kumar 1 Boldyreva, Alexandra 1 Bremner, David 1 Camion, Paul F. 1 Cerecedo, Manuel 1 CharnKeitKong, Pisit 1 Costello, Daniel J. jun. 1 Cramer, Ronald John Fitzgerald 1 Dai, Yang 1 de Fraysseix, Hubert 1 Dohi, Yasunori ...and 101 more Co-Authors all top 5 Serials 18 IEEE Transactions on Information Theory 15 RIMS Kokyuroku 10 Lecture Notes in Computer Science 9 Journal of the Operations Research Society of Japan 5 Discrete Applied Mathematics 5 Information Processing Letters 5 Theoretical Computer Science 5 Journal of Physics A: Mathematical and General 4 Designs, Codes and Cryptography 4 Optimization Methods & Software 3 Journal of Algorithms 3 Algorithmica 2 IEEE Transactions on Communications 2 IEEE Transactions on Computers 2 SIAM Journal on Computing 2 Discrete & Computational Geometry 2 Mathematical Programming. Series A. Series B 2 Journal of Physics A: Mathematical and Theoretical 2 Quantum Information & Computation 1 Electronics Letters 1 Journal of Mathematical Physics 1 Periodica Mathematica Hungarica 1 Reports on Mathematical Physics 1 Zeitschrift für Angewandte Mathematik und Mechanik (ZAMM) 1 The Computer Journal. Section A / Section B 1 Computing 1 Geometriae Dedicata 1 Information and Control 1 Journal of Information Processing 1 Journal of Symbolic Computation 1 The Visual Computer 1 International Journal of Computational Geometry & Applications 1 ORSA Journal on Computing 1 Applicable Algebra in Engineering, Communication and Computing 1 Theory of Computing Systems 1 Journal of Automata, Languages and Combinatorics 1 Discrete Optimization 1 Pacific Journal of Optimization 1 Topics in Applied Physics 1 Science China. Information Sciences all top 5 Fields 169 Information and communication theory, circuits (94-XX) 107 Computer science (68-XX) 29 Operations research, mathematical programming (90-XX) 26 Quantum theory (81-XX) 24 Combinatorics (05-XX) 17 Numerical analysis (65-XX) 13 General and overarching topics; collections (00-XX) 12 Convex and discrete geometry (52-XX) 5 Number theory (11-XX) 4 Commutative algebra (13-XX) 3 Algebraic geometry (14-XX) 3 Geometry (51-XX) 2 Calculus of variations and optimal control; optimization (49-XX) 2 Probability theory and stochastic processes (60-XX) 1 History and biography (01-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Special functions (33-XX) 1 Differential geometry (53-XX) 1 Manifolds and cell complexes (57-XX) 1 Statistics (62-XX) 1 Statistical mechanics, structure of matter (82-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 155 Publications have been cited 928 times in 825 Documents Cited by ▼ Year ▼ Finding k points with minimum diameter and related problems. Zbl 0715.68082Aggarwal, Alok; Imai, Hiroshi; Katoh, Naoki; Suri, Subhash 46 1991 Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane. Zbl 0548.68067Imai, Hiroshi; Asano, Takao 41 1983 Visibility of disjoint polygons. Zbl 0611.68062Asano, Takao; Asano, Tetsuo; Guibas, Leonidas; Hershberger, John; Imai, Hiroshi 41 1986 Voronoi diagram in the Laguerre geometry and its applications. Zbl 0556.68038Imai, Hiroshi; Iri, Masao; Murota, Kazuo 40 1985 Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. Zbl 0655.94013Matsumoto, Tsutomu; Imai, Hideki 36 1988 A multiplicative barrier function method for linear programming. Zbl 0641.90048Iri, Masao; Imai, Hiroshi 32 1986 On the construction of block ciphers provably secure and not relying on any unproved hypotheses. Zbl 0722.94020Zheng, Yuliang; Matsumoto, Tsutomu; Imai, Hideki 23 1990 A theory of two-dimensional cyclic codes. Zbl 0379.94021Imai, Hideki 21 1977 Efficient algorithms for geometric graph search problems. Zbl 0591.68068Imai, Hiroshi; Asano, Takao 20 1986 Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. Zbl 0988.94021Kobara, Kazukuni; Imai, Hideki 16 2001 An optimal algorithm for approximating a piecewise linear function. Zbl 0631.65010Imai, Hiroshi; Iri, Masao 16 1986 Conjunctive broadcast and attribute-based encryption. Zbl 1248.94050Attrapadung, Nuttapong; Imai, Hideki 14 2009 Classification of various neighborhood operations for the nurse scheduling problem. Zbl 1044.90509Osogami, Takayuki; Imai, Hiroshi 14 2000 Matroid enumeration for incidence geometry. Zbl 1236.05055Matsumoto, Yoshitake; Moriyama, Sonoko; Imai, Hiroshi; Bremner, David 14 2012 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 14 2007 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 13 2006 Quantum parameter estimation of a generalized Pauli channel. Zbl 1052.81020Fujiwara, Akio; Imai, Hiroshi 13 2003 Computing simple circuits from a set of line segments. Zbl 0692.05042Rappaport, David; Imai, Hiroshi; Toussaint, Godfried T. 13 1990 Two-party Bell inequalities derived from combinatorics via triangular elimination. Zbl 1092.81508Avis, David; Imai, Hiroshi; Ito, Tsuyoshi; Saski, Yuuya 13 2005 A theory of two-dimensional linear recurring arrays. Zbl 0249.94001Nomura, Tamiya; Miyakawa, Hiroshi; Imai, Hideki; Fukuda, Akira 13 1972 Comparison between XL and Gröbner basis algorithms. Zbl 1094.94024Ars, Gwénolé; Faugère, Jean-Charles; Imai, Hideki; Kawazoe, Mitsuru; Sugita, Makoto 12 2004 Dynamic orthogonal segment intersection search. Zbl 0642.68117Imai, Hiroshi; Asano, Takao 12 1987 On the convexity of the multiplicative version of Karmarkar’s potential function. Zbl 0657.90060Imai, Hiroshi 12 1988 On combinatorial structures of line drawings of polyhedra. Zbl 0561.05020Imai, Hiroshi 12 1985 Semantic security for the McEliece cryptosystem without random oracles. Zbl 1196.94062Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill 12 2008 Distinguishability measures and entropies for general probabilistic theories. Zbl 1225.81028Kimura, Gen; Nuida, Koji; Imai, Hideki 10 2010 Network-flow algorithms for lower-truncated transversal polymatroids. Zbl 0524.05025Imai, Hiroshi 10 1983 Attribute-based encryption supporting direct/indirect revocation modes. Zbl 1234.68089Attrapadung, Nuttapong; Imai, Hideki 10 2009 Geometric relations among Voronoi diagrams. Zbl 0642.52008Aurenhammer, F.; Imai, H. 10 1988 On the relationship between convex bodies related to correlation experiments with dichotomic observables. Zbl 1097.81007Avis, David; Imai, Hiroshi; Ito, Tsuyoshi 10 2006 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 10 2005 How to construct efficient signcryption schemes on elliptic curves. Zbl 1339.94072Zheng, Yuliang; Imai, Hideki 9 1998 Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike 8 2010 Quantify entanglement by concurrence hierarchy. Zbl 1068.81011Fan, Heng; Matsumoto, Keiji; Imai, Hiroshi 8 2003 A new multilevel coding method using error-correcting codes. Zbl 0352.94012Imai, Hideki; Hirakawa, Shuji 8 1977 1-segment center problems. Zbl 0769.90058Imai, Hiroshi; Lee, D. T.; Yang, Chung-Do 7 1992 A fibre bundle over manifolds of quantum channels and its application to quantum statistics. Zbl 1149.82002Fujiwara, Akio; Imai, Hiroshi 7 2008 Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications. Zbl 0770.68110Houle, Michael E.; Imai, Hiroshi; Imai, Keiko; Robert, Jean-Marc; Yamamoto, Peter 7 1993 Short signature and universal designated verifier signature without random oracles. Zbl 1126.68421Zhang, Rui; Furukawa, Jun; Imai, Hideki 6 2005 Generating facets for the cut polytope of a graph by triangular elimination. Zbl 1190.90281Avis, David; Imai, Hiroshi; Ito, Tsuyoshi 6 2008 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 6 2000 An analysis of absorbing times of quantum walks. Zbl 1029.68067Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi 6 2002 One-way probabilistic reversible and quantum one-counter automata. Zbl 1061.68099Yamasaki, Tomohiro; Kobayashi, Hirotada; Tokunaga, Yuuki; Imai, Hiroshi 6 2002 A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 6 2001 Computing the volume of the union of spheres. Zbl 0646.68051Avis, David; Bhattacharya, Binay K.; Imai, Hiroshi 6 1988 Practical use of bucketing techniques in computational geometry. Zbl 0588.68017Asano, Takao; Edahiro, Masato; Imai, Hiroshi; Iri, Masao 6 1985 An efficient group signature scheme from bilinear maps. Zbl 1127.94366Furukawa, Jun; Imai, Hideki 6 2005 An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta 6 2006 Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures. Zbl 1213.81079Hayashi, M.; Imai, H.; Matsumoto, K.; Ruskai, M. B.; Shimono, T. 6 2005 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Enumeration of regular triangulations with computational results. Zbl 0925.68445Masada, T.; Imai, K.; Imai, H. 5 1996 Weighted orthogonal linear \(L_{\infty{}}\)-approximation and applications. Zbl 0767.68093Houle, Michael E.; Imai, Hiroshi; Imai, Keiko; Robert, Jean-Marc 5 1989 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 5 2002 Polygonal approximation of a curve - formulations and algorithms. Zbl 0657.65025Imai, Hiroshi; Iri, Masao 5 1988 Generic combination of public key encryption with keyword search and public key encryption. Zbl 1282.94075Zhang, Rui; Imai, Hideki 5 2007 Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. Zbl 1172.94557Attrapadung, Nuttapong; Furukawa, Jun; Imai, Hideki 5 2006 An information theoretical model for quantum secret sharing schemes. Zbl 1213.81083Imai, H.; Mueller-Quade, J.; Nascimento, A. C. A.; Tuyls, P.; Winter, A. 5 2005 Algebraic cryptanalysis of 58-round SHA-1. Zbl 1186.94472Sugita, Makoto; Kawazoe, Mitsuru; Perret, Ludovic; Imai, Hideki 5 2007 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases. Zbl 0915.68034Ikeda, Takahiro; Imai, Hiroshi 4 1999 Quantum identification protocol with technologically bounded parties. Zbl 0985.94033Nascimento, Anderson; Mueller-Quade, Joern; Imai, Hideki 4 2001 Geometry of optimal estimation scheme for \(\mathrm{SU}(D)\) channels. Zbl 1114.81022Imai, Hiroshi; Fujiwara, Akio 4 2007 Relating differential distribution tables to other properties of substitution boxes. Zbl 0969.94014Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki 4 2000 Enumerating triangulations in general dimensions. Zbl 1045.05006Imai, Hiroshi; Masada, Tomonari; Takeuchi, Fumihiko; Imai, Keiko 4 2002 A linear-time algorithm for linear \(L_ 1\) approximation of points. Zbl 0664.68044Imai, Hiroshi; Kato, Kenji; Yamamoto, Peter 4 1989 Two-dimensional fire codes. Zbl 0289.94008Imai, Hideki 4 1973 A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms. Zbl 0854.68071Dai, Yang; Imai, Hiroshi; Iwano, Kazuo; Katoh, Naoki; Ohtsuka, Keiji; Yoshimura, Nobuhiko 4 1996 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2002 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 Commitment capacity of discrete memoryless channels. Zbl 1123.94364Winter, Andreas; Nascimento, Anderson C. A.; Imai, Hideki 3 2003 Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 3 2012 Restriction, terms and nonlinearity of Boolean functions. Zbl 0960.94018Zheng, Yuliang; Zhang, Xian-Mo; Imai, Hideki 3 1999 General-purpose parallel simulator for quantum computing. Zbl 1029.68552Niwa, Jumpei; Matsumoto, Keiji; Imai, Hiroshi 3 2002 Flaws in some robust optimistic mix-nets. Zbl 1044.94523Abe, Masayuki; Imai, Hideki 3 2003 No-cloning theorem on quantum logics. Zbl 1283.81004Miyadera, Takayuki; Imai, Hideki 3 2009 Maximin location of convex objects in a polygon and related dynamic Voronoi diagrams. Zbl 1004.65032Imai, Keiko; Imai, Hiroshi; Tokuyama, Takeshi 3 1999 Quantum versus deterministic counter automata. Zbl 1080.68060Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi 3 2005 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 3 2002 Duality of Boolean functions and its cryptographic significance. Zbl 0886.94011Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki 3 1997 Sequential key derivation patterns for broadcast encryption and key predistribution schemes. Zbl 1205.94105Attrapadung, Nuttapong; Kobara, Kazukuni; Imai, Hideki 3 2003 A construction method of high-speed decoders using ROM’s for Bose- Chaudhuri-Hocquenghem and Reed-Solomon codes. Zbl 0643.94017Okano, Hirokazu; Imai, Hideki 3 1987 Some classes of burst asymmetric or unidirectional error correcting codes. Zbl 0718.94014Saitoh, Y.; Imai, H. 3 1990 On verifiable implicit asking protocols for RSA computation. Zbl 0877.68044Matsumoto, Tsutomu; Imai, Hideki; Laih, Chi-Sung; Yen, Sung-Ming 3 1993 Advances in Cryptology - ASIACRYPT ’91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11–14, 1991. Proceedings. Zbl 0801.00055 3 1993 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki 3 2007 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 OBDDs of a monotone function and its prime implicants. Zbl 0912.68002Hayase, K.; Imai, Hiroshi 2 1998 A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 2 2006 An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009Mihaljević, Miodrag J.; Imai, Hideki 2 2009 Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints. Zbl 1250.68276Tanuma, Toshihiro; Imai, Hiroshi; Moriyama, Sonoko 2 2011 Parametric multiroute flow and its application to robust network with \(k\) edge failures. Zbl 1451.90025Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi 2 2014 Randomized algorithms for variance-based \(k\)-clustering. Zbl 0939.68661Inaba, Mary; Katoh, Naoki; Imai, Hiroshi 2 1994 Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima. Zbl 0947.90121Hakata, Koji; Imai, Hiroshi 2 1998 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 Limiting the visible space visual secret sharing schemes and their application to human identification. Zbl 1006.94542Kobara, Kazukuni; Imai, Hideki 2 1996 Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. Zbl 1062.94554Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki 2 2001 A generic conversion with optimal redundancy. Zbl 1079.94542Cui, Yang; Kobara, Kazukuni; Imai, Hideki 2 2005 FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models. Zbl 06889932Shiroshita, Shinya; Ogasawara, Tomoaki; Hiraishi, Hidefumi; Imai, Hiroshi 1 2018 Parametric multiroute flow and its application to multilink-attack network. Zbl 1387.90044Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi 1 2016 Parametric multiroute flow and its application to robust network with \(k\) edge failures. Zbl 1451.90025Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi 2 2014 Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki 1 2013 Matroid enumeration for incidence geometry. Zbl 1236.05055Matsumoto, Yoshitake; Moriyama, Sonoko; Imai, Hiroshi; Bremner, David 14 2012 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 3 2012 Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Zbl 1250.94039Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 1 2012 Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints. Zbl 1250.68276Tanuma, Toshihiro; Imai, Hiroshi; Moriyama, Sonoko 2 2011 Distinguishability measures and entropies for general probabilistic theories. Zbl 1225.81028Kimura, Gen; Nuida, Koji; Imai, Hideki 10 2010 Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike 8 2010 Conjunctive broadcast and attribute-based encryption. Zbl 1248.94050Attrapadung, Nuttapong; Imai, Hideki 14 2009 Attribute-based encryption supporting direct/indirect revocation modes. Zbl 1234.68089Attrapadung, Nuttapong; Imai, Hideki 10 2009 No-cloning theorem on quantum logics. Zbl 1283.81004Miyadera, Takayuki; Imai, Hideki 3 2009 An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009Mihaljević, Miodrag J.; Imai, Hideki 2 2009 An improvement of discrete Tardos fingerprinting codes. Zbl 1174.94013Nuida, Koji; Fujitsu, Satoshi; Hagiwara, Manabu; Kitagawa, Takashi; Watanabe, Hajime; Ogawa, Kazuto; Imai, Hideki 2 2009 Deciding non-realizability of oriented matroids by semidefinite programming. Zbl 1279.90129Miyata, Hiroyuki; Moriyama, Sonoko; Imai, Hiroshi 1 2009 Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE. Zbl 1273.94344Cui, Yang; Morozov, Kirill; Kobara, Kazukuni; Imai, Hideki 1 2009 Semantic security for the McEliece cryptosystem without random oracles. Zbl 1196.94062Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill 12 2008 A fibre bundle over manifolds of quantum channels and its application to quantum statistics. Zbl 1149.82002Fujiwara, Akio; Imai, Hiroshi 7 2008 Generating facets for the cut polytope of a graph by triangular elimination. Zbl 1190.90281Avis, David; Imai, Hiroshi; Ito, Tsuyoshi 6 2008 Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki 2 2008 Computational geometry analysis of quantum state space and its applications. Zbl 1163.65012Kato, Kimikazu; Oto, Mayumi; Imai, Hiroshi; Imai, Keiko 1 2008 Error-correcting codes and cryptography. Zbl 1242.94030Imai, Hideki; Hagiwara, Manabu 1 2008 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 14 2007 Generic combination of public key encryption with keyword search and public key encryption. Zbl 1282.94075Zhang, Rui; Imai, Hideki 5 2007 Algebraic cryptanalysis of 58-round SHA-1. Zbl 1186.94472Sugita, Makoto; Kawazoe, Mitsuru; Perret, Ludovic; Imai, Hideki 5 2007 Geometry of optimal estimation scheme for \(\mathrm{SU}(D)\) channels. Zbl 1114.81022Imai, Hiroshi; Fujiwara, Akio 4 2007 Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki 3 2007 Modeling bit flipping decoding based on nonorthogonal check sums with application to iterative decoding attack of McEliece cryptosystem. Zbl 1310.94143Fossorier, Marc P. C.; Kobara, Kazukuni; Imai, Hideki 2 2007 On the key-privacy issue of McEliece public-key encryption. Zbl 1195.94071Yamakawa, Shigenori; Cui, Yang; Kobara, Kazukuni; Hagiwara, Manabu; Imai, Hideki 1 2007 Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 1 2007 A secure threshold anonymous password-authenticated key exchange protocol. Zbl 1203.94124Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki 1 2007 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 13 2006 On the relationship between convex bodies related to correlation experiments with dichotomic observables. Zbl 1097.81007Avis, David; Imai, Hiroshi; Ito, Tsuyoshi 10 2006 An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta 6 2006 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. Zbl 1172.94557Attrapadung, Nuttapong; Furukawa, Jun; Imai, Hideki 5 2006 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 2 2006 Quantum computation and information. From theory to experiment. Zbl 1096.81003 2 2006 A short random fingerprinting code against a small number of pirates. Zbl 1125.94042Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki 1 2006 An efficient compiler from \(\Sigma\)-protocol to 2-move deniable zero-knowledge. Zbl 1133.94343Furukawa, Jun; Kurosawa, Kaoru; Imai, Hideki 1 2006 Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki 1 2006 Two-party Bell inequalities derived from combinatorics via triangular elimination. Zbl 1092.81508Avis, David; Imai, Hiroshi; Ito, Tsuyoshi; Saski, Yuuya 13 2005 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 10 2005 Short signature and universal designated verifier signature without random oracles. Zbl 1126.68421Zhang, Rui; Furukawa, Jun; Imai, Hideki 6 2005 An efficient group signature scheme from bilinear maps. Zbl 1127.94366Furukawa, Jun; Imai, Hideki 6 2005 Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures. Zbl 1213.81079Hayashi, M.; Imai, H.; Matsumoto, K.; Ruskai, M. B.; Shimono, T. 6 2005 An information theoretical model for quantum secret sharing schemes. Zbl 1213.81083Imai, H.; Mueller-Quade, J.; Nascimento, A. C. A.; Tuyls, P.; Winter, A. 5 2005 Quantum versus deterministic counter automata. Zbl 1080.68060Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi 3 2005 A generic conversion with optimal redundancy. Zbl 1079.94542Cui, Yang; Kobara, Kazukuni; Imai, Hideki 2 2005 Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations. Zbl 1154.94370Attrapadung, Nuttapong; Imai, Hideki 2 2005 Improvements on security proofs of some identity based encryption schemes. Zbl 1151.94636Zhang, Rui; Imai, Hideki 1 2005 Comparison between XL and Gröbner basis algorithms. Zbl 1094.94024Ars, Gwénolé; Faugère, Jean-Charles; Imai, Hideki; Kawazoe, Mitsuru; Sugita, Makoto 12 2004 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Quantum parameter estimation of a generalized Pauli channel. Zbl 1052.81020Fujiwara, Akio; Imai, Hiroshi 13 2003 Quantify entanglement by concurrence hierarchy. Zbl 1068.81011Fan, Heng; Matsumoto, Keiji; Imai, Hiroshi 8 2003 Commitment capacity of discrete memoryless channels. Zbl 1123.94364Winter, Andreas; Nascimento, Anderson C. A.; Imai, Hideki 3 2003 Flaws in some robust optimistic mix-nets. Zbl 1044.94523Abe, Masayuki; Imai, Hideki 3 2003 Sequential key derivation patterns for broadcast encryption and key predistribution schemes. Zbl 1205.94105Attrapadung, Nuttapong; Kobara, Kazukuni; Imai, Hideki 3 2003 On the one-wayness against chosen-plaintext attacks of the Loidreau’s modified McEliece PKC. Zbl 1245.94077Kobara, Kazukuni; Imai, Hideki 2 2003 Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(\(q\)). Zbl 1066.94537Camion, Paul; Mihaljević, Miodrag J.; Imai, Hideki 1 2003 Unconditionally secure homomorphic pre-distributed commitments. Zbl 1031.94523Nascimento, Anderson C. A.; Otsuka, Akira; Imai, Hideki; Mueller-Quade, Joern 1 2003 Leakage-resilient authenticated key establishment protocols. Zbl 1205.94100Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki 1 2003 An analysis of absorbing times of quantum walks. Zbl 1029.68067Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi 6 2002 One-way probabilistic reversible and quantum one-counter automata. Zbl 1061.68099Yamasaki, Tomohiro; Kobayashi, Hirotada; Tokunaga, Yuuki; Imai, Hiroshi 6 2002 Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 5 2002 Enumerating triangulations in general dimensions. Zbl 1045.05006Imai, Hiroshi; Masada, Tomonari; Takeuchi, Fumihiko; Imai, Keiko 4 2002 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2002 General-purpose parallel simulator for quantum computing. Zbl 1029.68552Niwa, Jumpei; Matsumoto, Keiji; Imai, Hiroshi 3 2002 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 3 2002 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 Fast and space-efficient algorithms for deciding shellability of simplicial complexes of large size using \(h\)-assignments. Zbl 1011.68183Moriyama, Sonoko; Nagai, Ayumu; Imai, Hiroshi 1 2002 A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki 1 2002 Phase-covariant quantum cloning. Zbl 1066.81522Fan, Heng; Matsumoto, Keiji; Wang, Xiang-Bin; Imai, Hiroshi 1 2002 Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. Zbl 0988.94021Kobara, Kazukuni; Imai, Hideki 16 2001 A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 6 2001 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Quantum identification protocol with technologically bounded parties. Zbl 0985.94033Nascimento, Anderson; Mueller-Quade, Joern; Imai, Hideki 4 2001 Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. Zbl 1062.94554Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki 2 2001 Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 1 2001 Classification of various neighborhood operations for the nurse scheduling problem. Zbl 1044.90509Osogami, Takayuki; Imai, Hiroshi 14 2000 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 6 2000 Relating differential distribution tables to other properties of substitution boxes. Zbl 0969.94014Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki 4 2000 Complexity of Gröbner bases for toric ideals of acyclic tournament graphs. Zbl 0968.13507Ishizeki, Takayuki; Imai, Hiroshi 1 2000 CRYPTREC project – Cryptographic Evaluation Project for the Japanese Electronic Government. Zbl 0980.94019Imai, Hideki; Yamagishi, Atsuhiro 1 2000 A path-exchange-type local search algorithm for vehicle routing and its efficient search strategy. Zbl 0998.90079Park, Narihiro; Okano, Hiroyuki; Imai, Hiroshi 1 2000 Practical efficiency of the linear-time algorithm for the single source shortest path problem. Zbl 0998.90080Asano, Yasuhito; Imai, Hiroshi 1 2000 Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases. Zbl 0915.68034Ikeda, Takahiro; Imai, Hiroshi 4 1999 Restriction, terms and nonlinearity of Boolean functions. Zbl 0960.94018Zheng, Yuliang; Zhang, Xian-Mo; Imai, Hideki 3 1999 Maximin location of convex objects in a polygon and related dynamic Voronoi diagrams. Zbl 1004.65032Imai, Keiko; Imai, Hiroshi; Tokuyama, Takeshi 3 1999 Computing and combinatorics. 5th annual international conference. COCOON ’99, Tokyo, Japan, July 26–28, 1999. Proceedings. Zbl 0918.00033 1 1999 Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications. Zbl 0953.94021Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki 1 1999 A system for computing the Tutte polynomial of a graph. Zbl 0957.05515Imai, Hiroshi; Sekine, Kyoko 1 1999 On the channel capacity of narrow-band subliminal channels. Zbl 0981.94006Kobara, Kazukuni; Imai, Hideki 1 1999 Comparing the MOV and FR reductions in elliptic curve cryptography. Zbl 0938.94009Harasawa, Ryuichi; Shikata, Junji; Suzuki, Joe; Imai, Hideki 1 1999 How to construct efficient signcryption schemes on elliptic curves. Zbl 1339.94072Zheng, Yuliang; Imai, Hideki 9 1998 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 ...and 55 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 1,562 Authors 19 Imai, Hideki 8 Díaz-Báñez, Jose Miguel 8 Mitchell, Joseph S. B. 8 Mu, Yi 8 Park, Jonghwan 8 Sugihara, Kokichi 8 Susilo, Willy 7 Lin, Dongdai 7 Sharir, Micha 7 Wang, Haitao 6 Avis, David M. 6 Chandran, L. Sunil 6 Edelsbrunner, Herbert 6 Hershberger, John E. 6 Shikata, Junji 6 van Kreveld, Marc J. 5 Bae, Sang Won 5 Chen, Danny Ziyi 5 Daescu, Ovidiu 5 Khandeev, Vladimir Il’ich 5 Long, Yu 5 Pérez-Lantero, Pablo 5 Watanabe, Yodai 5 Wu, Wenling 5 Yung, Moti 5 Zhang, Shuzhong 4 Agarwal, Pankaj Kumar 4 Bogdanov, Andrey 4 de Berg, Mark Theodoor 4 Ding, Jintai 4 Faugère, Jean-Charles 4 Feng, Dengguo 4 Hanaoka, Goichiro 4 Hiraishi, Hidefumi 4 Huang, Xinyi 4 Joswig, Michael 4 Katoh, Naoki 4 Kiltz, Eike 4 Korman, Matias 4 Lee, Kwangsu 4 Libert, Benoît 4 Mehlhorn, Kurt 4 Mesa, Juan-Antonio 4 Moriyama, Sonoko 4 Overmars, Mark H. 4 Patarin, Jacques 4 Perret, Ludovic 4 Pyatkin, Artem V. 4 Shenmaier, Vladimir 4 Tóth, Csaba D. 4 Ventura, Inmaculada 4 Yang, Bo-Yin 4 Yang, Guomin 4 Ye, Yinyu 3 Abdalla, Michel 3 Ahn, Hee-Kap 3 Attrapadung, Nuttapong 3 Baena, John Bayron 3 Bai, Chenming 3 Bellare, Mihir 3 Bernal, José Joaquín 3 Bhattacharya, Binay Kumar 3 Cabello, Sergio 3 Chakraborty, Dibyayan 3 Chan, Timothy Moon-Yew 3 Chen, Kefei 3 Choi, Seung Geol 3 Coretti, Sandro 3 Dahlsten, Oscar C. O. 3 Dodis, Yevgeniy 3 Emura, Keita 3 Eppstein, David Arthur 3 Fouque, Pierre-Alain 3 Gangopadhyay, Sugata 3 Ghodsi, Mohammad 3 Gonzaga, Clovis C. 3 Groth, Jens 3 Güneri, Cem 3 Guo, Fuchun 3 Hayashi, Masahito 3 Hiwatari, Harunaga 3 Hurtado, Ferran 3 Johansson, Thomas 3 Jünger, Michael 3 Kaplan, Haim 3 Kuklinski, Parker 3 Lange, Tanja 3 Liu, Mulan 3 Liu, Shengli 3 Maenhout, Broos 3 Mihaljević, Miodrag J. 3 Mount, David M. 3 Mulzer, Wolfgang Johann Heinrich 3 Nishida, Tetsushi 3 Nuida, Koji 3 Özbudak, Ferruh 3 Pach, János 3 Paterson, Kenneth G. 3 Paul, Goutam 3 Polishchuk, Valentin ...and 1,462 more Authors all top 5 Cited in 170 Serials 42 Computational Geometry 38 Designs, Codes and Cryptography 34 Algorithmica 29 Information Processing Letters 26 Discrete Applied Mathematics 26 Theoretical Computer Science 26 Discrete & Computational Geometry 23 Mathematical Programming. Series A. Series B 22 Quantum Information Processing 18 Information Sciences 16 Journal of Cryptology 11 International Journal of Computational Geometry & Applications 11 New Journal of Physics 10 Finite Fields and their Applications 9 Discrete Mathematics 9 Journal of Optimization Theory and Applications 9 Annals of Operations Research 8 International Journal of Theoretical Physics 8 Journal of Symbolic Computation 8 European Journal of Operational Research 8 Cryptography and Communications 7 Artificial Intelligence 7 Advances in Mathematics of Communications 6 Computers & Mathematics with Applications 6 Journal of Mathematical Physics 6 Journal of Computer and System Sciences 6 Journal of Mathematical Cryptology 6 Science China. Information Sciences 5 Journal of Computational Physics 5 Computing 5 European Journal of Combinatorics 5 SIAM Journal on Discrete Mathematics 5 International Journal of Foundations of Computer Science 5 Journal of Combinatorial Optimization 4 Communications in Mathematical Physics 4 International Journal of Computer Mathematics 4 Applicable Algebra in Engineering, Communication and Computing 4 Soft Computing 4 Prikladnaya Diskretnaya Matematika 3 Physics Letters. A 3 Journal of Combinatorial Theory. Series A 3 Journal of Combinatorial Theory. Series B 3 Operations Research Letters 3 Computers & Operations Research 3 ZOR. Zeitschrift für Operations Research 3 Top 3 Journal of Scheduling 3 Journal of Discrete Mathematical Sciences & Cryptography 3 Journal of Discrete Algorithms 3 Journal of Shanghai Jiaotong University (Science) 3 Mathematics in Computer Science 3 Journal of Physics A: Mathematical and Theoretical 3 Frontiers of Computer Science 3 Matematicheskie Voprosy Kriptografii 2 Computer Methods in Applied Mechanics and Engineering 2 Journal of the Franklin Institute 2 Physica A 2 Problems of Information Transmission 2 Applied Mathematics and Computation 2 BIT 2 Journal of Computational and Applied Mathematics 2 SIAM Journal on Computing 2 Advances in Applied Mathematics 2 Acta Applicandae Mathematicae 2 Computer Aided Geometric Design 2 Journal of Computer Science and Technology 2 Computational Mechanics 2 Japan Journal of Industrial and Applied Mathematics 2 Computational Mathematics and Mathematical Physics 2 Linear Algebra and its Applications 2 Pattern Recognition 2 Cybernetics and Systems Analysis 2 Experimental Mathematics 2 The Electronic Journal of Combinatorics 2 Annals of Mathematics and Artificial Intelligence 2 Doklady Mathematics 2 Optimization Methods & Software 2 Optimization and Engineering 2 RAIRO. Operations Research 2 Physical Review Letters 2 Journal of Applied Mathematics 2 2 Foundations of Physics 2 Discrete Optimization 2 Optimization Letters 2 Physical Review A, Third Series 2 Science China. Mathematics 1 International Journal of Modern Physics B 1 ACM Computing Surveys 1 Acta Mechanica 1 Advances in Applied Probability 1 Computers and Fluids 1 Computer Physics Communications 1 IEEE Transactions on Information Theory 1 Indian Journal of Pure & Applied Mathematics 1 Periodica Mathematica Hungarica 1 Reports on Mathematical Physics 1 Reviews of Modern Physics 1 Russian Mathematical Surveys 1 Journal of Geometry and Physics ...and 70 more Serials all top 5 Cited in 46 Fields 336 Information and communication theory, circuits (94-XX) 284 Computer science (68-XX) 122 Operations research, mathematical programming (90-XX) 97 Quantum theory (81-XX) 91 Combinatorics (05-XX) 78 Convex and discrete geometry (52-XX) 57 Numerical analysis (65-XX) 39 Number theory (11-XX) 23 Algebraic geometry (14-XX) 18 Statistics (62-XX) 12 Commutative algebra (13-XX) 11 Probability theory and stochastic processes (60-XX) 9 Geometry (51-XX) 9 Statistical mechanics, structure of matter (82-XX) 7 Order, lattices, ordered algebraic structures (06-XX) 6 Fluid mechanics (76-XX) 5 Calculus of variations and optimal control; optimization (49-XX) 5 Mechanics of deformable solids (74-XX) 4 Mathematical logic and foundations (03-XX) 4 Group theory and generalizations (20-XX) 4 Real functions (26-XX) 4 Mechanics of particles and systems (70-XX) 4 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 3 Field theory and polynomials (12-XX) 3 Associative rings and algebras (16-XX) 3 Dynamical systems and ergodic theory (37-XX) 3 Geophysics (86-XX) 2 General and overarching topics; collections (00-XX) 2 Linear and multilinear algebra; matrix theory (15-XX) 2 Topological groups, Lie groups (22-XX) 2 Ordinary differential equations (34-XX) 2 Operator theory (47-XX) 2 Systems theory; control (93-XX) 1 Measure and integration (28-XX) 1 Functions of a complex variable (30-XX) 1 Several complex variables and analytic spaces (32-XX) 1 Partial differential equations (35-XX) 1 Approximations and expansions (41-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Functional analysis (46-XX) 1 Differential geometry (53-XX) 1 Algebraic topology (55-XX) 1 Manifolds and cell complexes (57-XX) 1 Optics, electromagnetic theory (78-XX) 1 Relativity and gravitational theory (83-XX) 1 Biology and other natural sciences (92-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.