×
Compute Distance To:
Author ID: imai.hideki Recent zbMATH articles by "Imai, Hideki"
Published as: Imai, Hideki; Imai, Hiroshi; Imai, H.
Further Spellings: 今井 秀樹
External Links: MGP · Wikidata · ResearchGate · dblp · GND · IdRef
all top 5

Co-Authors

16 single-authored
41 Hanaoka, Goichiro
22 Kobara, Kazukuni
21 Zheng, Yuliang
15 Zhang, Rui
14 Imai, Keiko
14 Matsumoto, Tsutomu
14 Mihaljević, Miodrag J.
12 Fossorier, Marc P. C.
12 Shikata, Junji
10 Nascimento, Anderson C. A.
9 Attrapadung, Nuttapong
9 Cui, Yang
9 Matsuura, Kanta
8 Hagiwara, Manabu
7 Asano, Takao
7 Hanaoka, Yumiko
7 Iri, Masao
7 Müller-Quade, Jörn
7 Otsuka, Akira
7 Saitoh, Yuichi
6 Furukawa, Jun
6 Hiraishi, Hidefumi
6 Kobayashi, Hirotada
6 Shin, SeongHan
6 Yamasaki, Tomohiro
5 Avis, David M.
5 Ogawa, Kazuto
4 Ishizeki, Takayuki
4 Kitagawa, Takashi
4 Matsuda, Takahiro
4 Matsumoto, Keiji
4 Moriyama, Sonoko
4 Nishioka, Tsuyoshi
4 Watanabe, Hajime
4 Watanabe, Yuji
4 Yamaguchi, Kazuhiko
4 Yang, Peng
3 Abe, Masayuki
3 Asano, Tetsuo
3 Fujiwara, Akio
3 Ito, Tsuyoshi
3 Iwamura, Keiichi
3 Katoh, Naoki
3 Morozov, Kirill Evgen’evich
3 Nuida, Koji
3 Sugita, Makoto
3 Suppakitpaisarn, Vorapong
3 Takeuchi, Fumihiko
3 Tokunaga, Yuuki
3 Tokuyama, Takeshi
3 Winter, Andreas
3 Zhang, Xian-Mo
2 Asano, Yasuhito
2 Aurenhammer, Franz
2 Baffier, Jean-François
2 Breitbach, Markus
2 Edahiro, Masato
2 Fan, Heng
2 Fujitsu, Satoshi
2 Gangopadhyay, Sugata
2 Hasegawa, Susumu
2 Hayashi, Masahito
2 Hirakawa, Shuji
2 Houle, Michael E.
2 Inaba, Mary
2 Ishiguro, Masaki
2 Kasamatsu, Kohei
2 Kato, Kimikazu
2 Kawazoe, Mitsuru
2 Kiltz, Eike
2 Kurosawa, Kaoru
2 Lin, Shu
2 Masada, Tomonari
2 Miyakawa, Hiroshi
2 Nojima, Ryo
2 Ohtake, Go
2 Paul, Goutam
2 Poli, Alain
2 Robert, Jean-Marc
2 Sadakane, Kunihiko
2 Sakakibara, Yasubumi
2 Sekine, Kyoko
2 Shigetomi, Rie
2 Suzuki, Joe
2 Yamamoto, Peter
1 Aggarwal, Alok
1 Alharby, Abdulrahman
1 Ars, Gwénolé
1 Barros, João Paulo
1 Bhattacharya, Binay Kumar
1 Boldyreva, Alexandra
1 Bremner, David
1 Camion, Paul F.
1 Cerecedo, Manuel
1 CharnKeitKong, Pisit
1 Costello, Daniel J. jun.
1 Cramer, Ronald John Fitzgerald
1 Dai, Yang
1 de Fraysseix, Hubert
1 Dohi, Yasunori
...and 101 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

155 Publications have been cited 928 times in 825 Documents Cited by Year
Finding k points with minimum diameter and related problems. Zbl 0715.68082
Aggarwal, Alok; Imai, Hiroshi; Katoh, Naoki; Suri, Subhash
46
1991
Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane. Zbl 0548.68067
Imai, Hiroshi; Asano, Takao
41
1983
Visibility of disjoint polygons. Zbl 0611.68062
Asano, Takao; Asano, Tetsuo; Guibas, Leonidas; Hershberger, John; Imai, Hiroshi
41
1986
Voronoi diagram in the Laguerre geometry and its applications. Zbl 0556.68038
Imai, Hiroshi; Iri, Masao; Murota, Kazuo
40
1985
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. Zbl 0655.94013
Matsumoto, Tsutomu; Imai, Hideki
36
1988
A multiplicative barrier function method for linear programming. Zbl 0641.90048
Iri, Masao; Imai, Hiroshi
32
1986
On the construction of block ciphers provably secure and not relying on any unproved hypotheses. Zbl 0722.94020
Zheng, Yuliang; Matsumoto, Tsutomu; Imai, Hideki
23
1990
A theory of two-dimensional cyclic codes. Zbl 0379.94021
Imai, Hideki
21
1977
Efficient algorithms for geometric graph search problems. Zbl 0591.68068
Imai, Hiroshi; Asano, Takao
20
1986
Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. Zbl 0988.94021
Kobara, Kazukuni; Imai, Hideki
16
2001
An optimal algorithm for approximating a piecewise linear function. Zbl 0631.65010
Imai, Hiroshi; Iri, Masao
16
1986
Conjunctive broadcast and attribute-based encryption. Zbl 1248.94050
Attrapadung, Nuttapong; Imai, Hideki
14
2009
Classification of various neighborhood operations for the nurse scheduling problem. Zbl 1044.90509
Osogami, Takayuki; Imai, Hiroshi
14
2000
Matroid enumeration for incidence geometry. Zbl 1236.05055
Matsumoto, Yoshitake; Moriyama, Sonoko; Imai, Hiroshi; Bremner, David
14
2012
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
14
2007
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
13
2006
Quantum parameter estimation of a generalized Pauli channel. Zbl 1052.81020
Fujiwara, Akio; Imai, Hiroshi
13
2003
Computing simple circuits from a set of line segments. Zbl 0692.05042
Rappaport, David; Imai, Hiroshi; Toussaint, Godfried T.
13
1990
Two-party Bell inequalities derived from combinatorics via triangular elimination. Zbl 1092.81508
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi; Saski, Yuuya
13
2005
A theory of two-dimensional linear recurring arrays. Zbl 0249.94001
Nomura, Tamiya; Miyakawa, Hiroshi; Imai, Hideki; Fukuda, Akira
13
1972
Comparison between XL and Gröbner basis algorithms. Zbl 1094.94024
Ars, Gwénolé; Faugère, Jean-Charles; Imai, Hideki; Kawazoe, Mitsuru; Sugita, Makoto
12
2004
Dynamic orthogonal segment intersection search. Zbl 0642.68117
Imai, Hiroshi; Asano, Takao
12
1987
On the convexity of the multiplicative version of Karmarkar’s potential function. Zbl 0657.90060
Imai, Hiroshi
12
1988
On combinatorial structures of line drawings of polyhedra. Zbl 0561.05020
Imai, Hiroshi
12
1985
Semantic security for the McEliece cryptosystem without random oracles. Zbl 1196.94062
Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill
12
2008
Distinguishability measures and entropies for general probabilistic theories. Zbl 1225.81028
Kimura, Gen; Nuida, Koji; Imai, Hideki
10
2010
Network-flow algorithms for lower-truncated transversal polymatroids. Zbl 0524.05025
Imai, Hiroshi
10
1983
Attribute-based encryption supporting direct/indirect revocation modes. Zbl 1234.68089
Attrapadung, Nuttapong; Imai, Hideki
10
2009
Geometric relations among Voronoi diagrams. Zbl 0642.52008
Aurenhammer, F.; Imai, H.
10
1988
On the relationship between convex bodies related to correlation experiments with dichotomic observables. Zbl 1097.81007
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi
10
2006
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
10
2005
How to construct efficient signcryption schemes on elliptic curves. Zbl 1339.94072
Zheng, Yuliang; Imai, Hideki
9
1998
Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171
Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike
8
2010
Quantify entanglement by concurrence hierarchy. Zbl 1068.81011
Fan, Heng; Matsumoto, Keiji; Imai, Hiroshi
8
2003
A new multilevel coding method using error-correcting codes. Zbl 0352.94012
Imai, Hideki; Hirakawa, Shuji
8
1977
1-segment center problems. Zbl 0769.90058
Imai, Hiroshi; Lee, D. T.; Yang, Chung-Do
7
1992
A fibre bundle over manifolds of quantum channels and its application to quantum statistics. Zbl 1149.82002
Fujiwara, Akio; Imai, Hiroshi
7
2008
Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications. Zbl 0770.68110
Houle, Michael E.; Imai, Hiroshi; Imai, Keiko; Robert, Jean-Marc; Yamamoto, Peter
7
1993
Short signature and universal designated verifier signature without random oracles. Zbl 1126.68421
Zhang, Rui; Furukawa, Jun; Imai, Hideki
6
2005
Generating facets for the cut polytope of a graph by triangular elimination. Zbl 1190.90281
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi
6
2008
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
6
2000
An analysis of absorbing times of quantum walks. Zbl 1029.68067
Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi
6
2002
One-way probabilistic reversible and quantum one-counter automata. Zbl 1061.68099
Yamasaki, Tomohiro; Kobayashi, Hirotada; Tokunaga, Yuuki; Imai, Hiroshi
6
2002
A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
6
2001
Computing the volume of the union of spheres. Zbl 0646.68051
Avis, David; Bhattacharya, Binay K.; Imai, Hiroshi
6
1988
Practical use of bucketing techniques in computational geometry. Zbl 0588.68017
Asano, Takao; Edahiro, Masato; Imai, Hiroshi; Iri, Masao
6
1985
An efficient group signature scheme from bilinear maps. Zbl 1127.94366
Furukawa, Jun; Imai, Hideki
6
2005
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078
Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta
6
2006
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures. Zbl 1213.81079
Hayashi, M.; Imai, H.; Matsumoto, K.; Ruskai, M. B.; Shimono, T.
6
2005
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Enumeration of regular triangulations with computational results. Zbl 0925.68445
Masada, T.; Imai, K.; Imai, H.
5
1996
Weighted orthogonal linear \(L_{\infty{}}\)-approximation and applications. Zbl 0767.68093
Houle, Michael E.; Imai, Hiroshi; Imai, Keiko; Robert, Jean-Marc
5
1989
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
5
2002
Polygonal approximation of a curve - formulations and algorithms. Zbl 0657.65025
Imai, Hiroshi; Iri, Masao
5
1988
Generic combination of public key encryption with keyword search and public key encryption. Zbl 1282.94075
Zhang, Rui; Imai, Hideki
5
2007
Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. Zbl 1172.94557
Attrapadung, Nuttapong; Furukawa, Jun; Imai, Hideki
5
2006
An information theoretical model for quantum secret sharing schemes. Zbl 1213.81083
Imai, H.; Mueller-Quade, J.; Nascimento, A. C. A.; Tuyls, P.; Winter, A.
5
2005
Algebraic cryptanalysis of 58-round SHA-1. Zbl 1186.94472
Sugita, Makoto; Kawazoe, Mitsuru; Perret, Ludovic; Imai, Hideki
5
2007
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases. Zbl 0915.68034
Ikeda, Takahiro; Imai, Hiroshi
4
1999
Quantum identification protocol with technologically bounded parties. Zbl 0985.94033
Nascimento, Anderson; Mueller-Quade, Joern; Imai, Hideki
4
2001
Geometry of optimal estimation scheme for \(\mathrm{SU}(D)\) channels. Zbl 1114.81022
Imai, Hiroshi; Fujiwara, Akio
4
2007
Relating differential distribution tables to other properties of substitution boxes. Zbl 0969.94014
Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki
4
2000
Enumerating triangulations in general dimensions. Zbl 1045.05006
Imai, Hiroshi; Masada, Tomonari; Takeuchi, Fumihiko; Imai, Keiko
4
2002
A linear-time algorithm for linear \(L_ 1\) approximation of points. Zbl 0664.68044
Imai, Hiroshi; Kato, Kenji; Yamamoto, Peter
4
1989
Two-dimensional fire codes. Zbl 0289.94008
Imai, Hideki
4
1973
A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms. Zbl 0854.68071
Dai, Yang; Imai, Hiroshi; Iwano, Kazuo; Katoh, Naoki; Ohtsuka, Keiji; Yoshimura, Nobuhiko
4
1996
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2002
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
Commitment capacity of discrete memoryless channels. Zbl 1123.94364
Winter, Andreas; Nascimento, Anderson C. A.; Imai, Hideki
3
2003
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056
Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki
3
2012
Restriction, terms and nonlinearity of Boolean functions. Zbl 0960.94018
Zheng, Yuliang; Zhang, Xian-Mo; Imai, Hideki
3
1999
General-purpose parallel simulator for quantum computing. Zbl 1029.68552
Niwa, Jumpei; Matsumoto, Keiji; Imai, Hiroshi
3
2002
Flaws in some robust optimistic mix-nets. Zbl 1044.94523
Abe, Masayuki; Imai, Hideki
3
2003
No-cloning theorem on quantum logics. Zbl 1283.81004
Miyadera, Takayuki; Imai, Hideki
3
2009
Maximin location of convex objects in a polygon and related dynamic Voronoi diagrams. Zbl 1004.65032
Imai, Keiko; Imai, Hiroshi; Tokuyama, Takeshi
3
1999
Quantum versus deterministic counter automata. Zbl 1080.68060
Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi
3
2005
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
3
2002
Duality of Boolean functions and its cryptographic significance. Zbl 0886.94011
Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki
3
1997
Sequential key derivation patterns for broadcast encryption and key predistribution schemes. Zbl 1205.94105
Attrapadung, Nuttapong; Kobara, Kazukuni; Imai, Hideki
3
2003
A construction method of high-speed decoders using ROM’s for Bose- Chaudhuri-Hocquenghem and Reed-Solomon codes. Zbl 0643.94017
Okano, Hirokazu; Imai, Hideki
3
1987
Some classes of burst asymmetric or unidirectional error correcting codes. Zbl 0718.94014
Saitoh, Y.; Imai, H.
3
1990
On verifiable implicit asking protocols for RSA computation. Zbl 0877.68044
Matsumoto, Tsutomu; Imai, Hideki; Laih, Chi-Sung; Yen, Sung-Ming
3
1993
Advances in Cryptology - ASIACRYPT ’91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11–14, 1991. Proceedings. Zbl 0801.00055
3
1993
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118
Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki
3
2007
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
OBDDs of a monotone function and its prime implicants. Zbl 0912.68002
Hayase, K.; Imai, Hiroshi
2
1998
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
2
2006
An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009
Mihaljević, Miodrag J.; Imai, Hideki
2
2009
Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints. Zbl 1250.68276
Tanuma, Toshihiro; Imai, Hiroshi; Moriyama, Sonoko
2
2011
Parametric multiroute flow and its application to robust network with \(k\) edge failures. Zbl 1451.90025
Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi
2
2014
Randomized algorithms for variance-based \(k\)-clustering. Zbl 0939.68661
Inaba, Mary; Katoh, Naoki; Imai, Hiroshi
2
1994
Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima. Zbl 0947.90121
Hakata, Koji; Imai, Hiroshi
2
1998
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
Limiting the visible space visual secret sharing schemes and their application to human identification. Zbl 1006.94542
Kobara, Kazukuni; Imai, Hideki
2
1996
Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. Zbl 1062.94554
Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki
2
2001
A generic conversion with optimal redundancy. Zbl 1079.94542
Cui, Yang; Kobara, Kazukuni; Imai, Hideki
2
2005
FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models. Zbl 06889932
Shiroshita, Shinya; Ogasawara, Tomoaki; Hiraishi, Hidefumi; Imai, Hiroshi
1
2018
Parametric multiroute flow and its application to multilink-attack network. Zbl 1387.90044
Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi
1
2016
Parametric multiroute flow and its application to robust network with \(k\) edge failures. Zbl 1451.90025
Baffier, Jean-François; Suppakitpaisarn, Vorapong; Hiraishi, Hidefumi; Imai, Hiroshi
2
2014
Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki
1
2013
Matroid enumeration for incidence geometry. Zbl 1236.05055
Matsumoto, Yoshitake; Moriyama, Sonoko; Imai, Hiroshi; Bremner, David
14
2012
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056
Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki
3
2012
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Zbl 1250.94039
Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki
1
2012
Revisiting hyperbolic Voronoi diagrams in two and higher dimensions from theoretical, applied and generalized viewpoints. Zbl 1250.68276
Tanuma, Toshihiro; Imai, Hiroshi; Moriyama, Sonoko
2
2011
Distinguishability measures and entropies for general probabilistic theories. Zbl 1225.81028
Kimura, Gen; Nuida, Koji; Imai, Hideki
10
2010
Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171
Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike
8
2010
Conjunctive broadcast and attribute-based encryption. Zbl 1248.94050
Attrapadung, Nuttapong; Imai, Hideki
14
2009
Attribute-based encryption supporting direct/indirect revocation modes. Zbl 1234.68089
Attrapadung, Nuttapong; Imai, Hideki
10
2009
No-cloning theorem on quantum logics. Zbl 1283.81004
Miyadera, Takayuki; Imai, Hideki
3
2009
An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009
Mihaljević, Miodrag J.; Imai, Hideki
2
2009
An improvement of discrete Tardos fingerprinting codes. Zbl 1174.94013
Nuida, Koji; Fujitsu, Satoshi; Hagiwara, Manabu; Kitagawa, Takashi; Watanabe, Hajime; Ogawa, Kazuto; Imai, Hideki
2
2009
Deciding non-realizability of oriented matroids by semidefinite programming. Zbl 1279.90129
Miyata, Hiroyuki; Moriyama, Sonoko; Imai, Hiroshi
1
2009
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE. Zbl 1273.94344
Cui, Yang; Morozov, Kirill; Kobara, Kazukuni; Imai, Hideki
1
2009
Semantic security for the McEliece cryptosystem without random oracles. Zbl 1196.94062
Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill
12
2008
A fibre bundle over manifolds of quantum channels and its application to quantum statistics. Zbl 1149.82002
Fujiwara, Akio; Imai, Hiroshi
7
2008
Generating facets for the cut polytope of a graph by triangular elimination. Zbl 1190.90281
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi
6
2008
Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki
2
2008
Computational geometry analysis of quantum state space and its applications. Zbl 1163.65012
Kato, Kimikazu; Oto, Mayumi; Imai, Hiroshi; Imai, Keiko
1
2008
Error-correcting codes and cryptography. Zbl 1242.94030
Imai, Hideki; Hagiwara, Manabu
1
2008
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
14
2007
Generic combination of public key encryption with keyword search and public key encryption. Zbl 1282.94075
Zhang, Rui; Imai, Hideki
5
2007
Algebraic cryptanalysis of 58-round SHA-1. Zbl 1186.94472
Sugita, Makoto; Kawazoe, Mitsuru; Perret, Ludovic; Imai, Hideki
5
2007
Geometry of optimal estimation scheme for \(\mathrm{SU}(D)\) channels. Zbl 1114.81022
Imai, Hiroshi; Fujiwara, Akio
4
2007
Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118
Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki
3
2007
Modeling bit flipping decoding based on nonorthogonal check sums with application to iterative decoding attack of McEliece cryptosystem. Zbl 1310.94143
Fossorier, Marc P. C.; Kobara, Kazukuni; Imai, Hideki
2
2007
On the key-privacy issue of McEliece public-key encryption. Zbl 1195.94071
Yamakawa, Shigenori; Cui, Yang; Kobara, Kazukuni; Hagiwara, Manabu; Imai, Hideki
1
2007
Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379
Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
1
2007
A secure threshold anonymous password-authenticated key exchange protocol. Zbl 1203.94124
Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
1
2007
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
13
2006
On the relationship between convex bodies related to correlation experiments with dichotomic observables. Zbl 1097.81007
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi
10
2006
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078
Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta
6
2006
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Forward-secure and searchable broadcast encryption with short ciphertexts and private keys. Zbl 1172.94557
Attrapadung, Nuttapong; Furukawa, Jun; Imai, Hideki
5
2006
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
2
2006
Quantum computation and information. From theory to experiment. Zbl 1096.81003
2
2006
A short random fingerprinting code against a small number of pirates. Zbl 1125.94042
Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki
1
2006
An efficient compiler from \(\Sigma\)-protocol to 2-move deniable zero-knowledge. Zbl 1133.94343
Furukawa, Jun; Kurosawa, Kaoru; Imai, Hideki
1
2006
Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130
Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki
1
2006
Two-party Bell inequalities derived from combinatorics via triangular elimination. Zbl 1092.81508
Avis, David; Imai, Hiroshi; Ito, Tsuyoshi; Saski, Yuuya
13
2005
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
10
2005
Short signature and universal designated verifier signature without random oracles. Zbl 1126.68421
Zhang, Rui; Furukawa, Jun; Imai, Hideki
6
2005
An efficient group signature scheme from bilinear maps. Zbl 1127.94366
Furukawa, Jun; Imai, Hideki
6
2005
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures. Zbl 1213.81079
Hayashi, M.; Imai, H.; Matsumoto, K.; Ruskai, M. B.; Shimono, T.
6
2005
An information theoretical model for quantum secret sharing schemes. Zbl 1213.81083
Imai, H.; Mueller-Quade, J.; Nascimento, A. C. A.; Tuyls, P.; Winter, A.
5
2005
Quantum versus deterministic counter automata. Zbl 1080.68060
Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi
3
2005
A generic conversion with optimal redundancy. Zbl 1079.94542
Cui, Yang; Kobara, Kazukuni; Imai, Hideki
2
2005
Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations. Zbl 1154.94370
Attrapadung, Nuttapong; Imai, Hideki
2
2005
Improvements on security proofs of some identity based encryption schemes. Zbl 1151.94636
Zhang, Rui; Imai, Hideki
1
2005
Comparison between XL and Gröbner basis algorithms. Zbl 1094.94024
Ars, Gwénolé; Faugère, Jean-Charles; Imai, Hideki; Kawazoe, Mitsuru; Sugita, Makoto
12
2004
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Quantum parameter estimation of a generalized Pauli channel. Zbl 1052.81020
Fujiwara, Akio; Imai, Hiroshi
13
2003
Quantify entanglement by concurrence hierarchy. Zbl 1068.81011
Fan, Heng; Matsumoto, Keiji; Imai, Hiroshi
8
2003
Commitment capacity of discrete memoryless channels. Zbl 1123.94364
Winter, Andreas; Nascimento, Anderson C. A.; Imai, Hideki
3
2003
Flaws in some robust optimistic mix-nets. Zbl 1044.94523
Abe, Masayuki; Imai, Hideki
3
2003
Sequential key derivation patterns for broadcast encryption and key predistribution schemes. Zbl 1205.94105
Attrapadung, Nuttapong; Kobara, Kazukuni; Imai, Hideki
3
2003
On the one-wayness against chosen-plaintext attacks of the Loidreau’s modified McEliece PKC. Zbl 1245.94077
Kobara, Kazukuni; Imai, Hideki
2
2003
Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(\(q\)). Zbl 1066.94537
Camion, Paul; Mihaljević, Miodrag J.; Imai, Hideki
1
2003
Unconditionally secure homomorphic pre-distributed commitments. Zbl 1031.94523
Nascimento, Anderson C. A.; Otsuka, Akira; Imai, Hideki; Mueller-Quade, Joern
1
2003
Leakage-resilient authenticated key establishment protocols. Zbl 1205.94100
Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
1
2003
An analysis of absorbing times of quantum walks. Zbl 1029.68067
Yamasaki, Tomohiro; Kobayashi, Hirotada; Imai, Hiroshi
6
2002
One-way probabilistic reversible and quantum one-counter automata. Zbl 1061.68099
Yamasaki, Tomohiro; Kobayashi, Hirotada; Tokunaga, Yuuki; Imai, Hiroshi
6
2002
Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
5
2002
Enumerating triangulations in general dimensions. Zbl 1045.05006
Imai, Hiroshi; Masada, Tomonari; Takeuchi, Fumihiko; Imai, Keiko
4
2002
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2002
General-purpose parallel simulator for quantum computing. Zbl 1029.68552
Niwa, Jumpei; Matsumoto, Keiji; Imai, Hiroshi
3
2002
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
3
2002
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
Fast and space-efficient algorithms for deciding shellability of simplicial complexes of large size using \(h\)-assignments. Zbl 1011.68183
Moriyama, Sonoko; Nagai, Ayumu; Imai, Hiroshi
1
2002
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki
1
2002
Phase-covariant quantum cloning. Zbl 1066.81522
Fan, Heng; Matsumoto, Keiji; Wang, Xiang-Bin; Imai, Hiroshi
1
2002
Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. Zbl 0988.94021
Kobara, Kazukuni; Imai, Hideki
16
2001
A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632
Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki
6
2001
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Quantum identification protocol with technologically bounded parties. Zbl 0985.94033
Nascimento, Anderson; Mueller-Quade, Joern; Imai, Hideki
4
2001
Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. Zbl 1062.94554
Sugita, Makoto; Kobara, Kazukuni; Imai, Hideki
2
2001
Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521
Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
1
2001
Classification of various neighborhood operations for the nurse scheduling problem. Zbl 1044.90509
Osogami, Takayuki; Imai, Hiroshi
14
2000
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
6
2000
Relating differential distribution tables to other properties of substitution boxes. Zbl 0969.94014
Zhang, Xian-Mo; Zheng, Yuliang; Imai, Hideki
4
2000
Complexity of Gröbner bases for toric ideals of acyclic tournament graphs. Zbl 0968.13507
Ishizeki, Takayuki; Imai, Hiroshi
1
2000
CRYPTREC project – Cryptographic Evaluation Project for the Japanese Electronic Government. Zbl 0980.94019
Imai, Hideki; Yamagishi, Atsuhiro
1
2000
A path-exchange-type local search algorithm for vehicle routing and its efficient search strategy. Zbl 0998.90079
Park, Narihiro; Okano, Hiroyuki; Imai, Hiroshi
1
2000
Practical efficiency of the linear-time algorithm for the single source shortest path problem. Zbl 0998.90080
Asano, Yasuhito; Imai, Hiroshi
1
2000
Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases. Zbl 0915.68034
Ikeda, Takahiro; Imai, Hiroshi
4
1999
Restriction, terms and nonlinearity of Boolean functions. Zbl 0960.94018
Zheng, Yuliang; Zhang, Xian-Mo; Imai, Hideki
3
1999
Maximin location of convex objects in a polygon and related dynamic Voronoi diagrams. Zbl 1004.65032
Imai, Keiko; Imai, Hiroshi; Tokuyama, Takeshi
3
1999
Computing and combinatorics. 5th annual international conference. COCOON ’99, Tokyo, Japan, July 26–28, 1999. Proceedings. Zbl 0918.00033
1
1999
Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications. Zbl 0953.94021
Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki
1
1999
A system for computing the Tutte polynomial of a graph. Zbl 0957.05515
Imai, Hiroshi; Sekine, Kyoko
1
1999
On the channel capacity of narrow-band subliminal channels. Zbl 0981.94006
Kobara, Kazukuni; Imai, Hideki
1
1999
Comparing the MOV and FR reductions in elliptic curve cryptography. Zbl 0938.94009
Harasawa, Ryuichi; Shikata, Junji; Suzuki, Joe; Imai, Hideki
1
1999
How to construct efficient signcryption schemes on elliptic curves. Zbl 1339.94072
Zheng, Yuliang; Imai, Hideki
9
1998
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
...and 55 more Documents
all top 5

Cited by 1,562 Authors

19 Imai, Hideki
8 Díaz-Báñez, Jose Miguel
8 Mitchell, Joseph S. B.
8 Mu, Yi
8 Park, Jonghwan
8 Sugihara, Kokichi
8 Susilo, Willy
7 Lin, Dongdai
7 Sharir, Micha
7 Wang, Haitao
6 Avis, David M.
6 Chandran, L. Sunil
6 Edelsbrunner, Herbert
6 Hershberger, John E.
6 Shikata, Junji
6 van Kreveld, Marc J.
5 Bae, Sang Won
5 Chen, Danny Ziyi
5 Daescu, Ovidiu
5 Khandeev, Vladimir Il’ich
5 Long, Yu
5 Pérez-Lantero, Pablo
5 Watanabe, Yodai
5 Wu, Wenling
5 Yung, Moti
5 Zhang, Shuzhong
4 Agarwal, Pankaj Kumar
4 Bogdanov, Andrey
4 de Berg, Mark Theodoor
4 Ding, Jintai
4 Faugère, Jean-Charles
4 Feng, Dengguo
4 Hanaoka, Goichiro
4 Hiraishi, Hidefumi
4 Huang, Xinyi
4 Joswig, Michael
4 Katoh, Naoki
4 Kiltz, Eike
4 Korman, Matias
4 Lee, Kwangsu
4 Libert, Benoît
4 Mehlhorn, Kurt
4 Mesa, Juan-Antonio
4 Moriyama, Sonoko
4 Overmars, Mark H.
4 Patarin, Jacques
4 Perret, Ludovic
4 Pyatkin, Artem V.
4 Shenmaier, Vladimir
4 Tóth, Csaba D.
4 Ventura, Inmaculada
4 Yang, Bo-Yin
4 Yang, Guomin
4 Ye, Yinyu
3 Abdalla, Michel
3 Ahn, Hee-Kap
3 Attrapadung, Nuttapong
3 Baena, John Bayron
3 Bai, Chenming
3 Bellare, Mihir
3 Bernal, José Joaquín
3 Bhattacharya, Binay Kumar
3 Cabello, Sergio
3 Chakraborty, Dibyayan
3 Chan, Timothy Moon-Yew
3 Chen, Kefei
3 Choi, Seung Geol
3 Coretti, Sandro
3 Dahlsten, Oscar C. O.
3 Dodis, Yevgeniy
3 Emura, Keita
3 Eppstein, David Arthur
3 Fouque, Pierre-Alain
3 Gangopadhyay, Sugata
3 Ghodsi, Mohammad
3 Gonzaga, Clovis C.
3 Groth, Jens
3 Güneri, Cem
3 Guo, Fuchun
3 Hayashi, Masahito
3 Hiwatari, Harunaga
3 Hurtado, Ferran
3 Johansson, Thomas
3 Jünger, Michael
3 Kaplan, Haim
3 Kuklinski, Parker
3 Lange, Tanja
3 Liu, Mulan
3 Liu, Shengli
3 Maenhout, Broos
3 Mihaljević, Miodrag J.
3 Mount, David M.
3 Mulzer, Wolfgang Johann Heinrich
3 Nishida, Tetsushi
3 Nuida, Koji
3 Özbudak, Ferruh
3 Pach, János
3 Paterson, Kenneth G.
3 Paul, Goutam
3 Polishchuk, Valentin
...and 1,462 more Authors
all top 5

Cited in 170 Serials

42 Computational Geometry
38 Designs, Codes and Cryptography
34 Algorithmica
29 Information Processing Letters
26 Discrete Applied Mathematics
26 Theoretical Computer Science
26 Discrete & Computational Geometry
23 Mathematical Programming. Series A. Series B
22 Quantum Information Processing
18 Information Sciences
16 Journal of Cryptology
11 International Journal of Computational Geometry & Applications
11 New Journal of Physics
10 Finite Fields and their Applications
9 Discrete Mathematics
9 Journal of Optimization Theory and Applications
9 Annals of Operations Research
8 International Journal of Theoretical Physics
8 Journal of Symbolic Computation
8 European Journal of Operational Research
8 Cryptography and Communications
7 Artificial Intelligence
7 Advances in Mathematics of Communications
6 Computers & Mathematics with Applications
6 Journal of Mathematical Physics
6 Journal of Computer and System Sciences
6 Journal of Mathematical Cryptology
6 Science China. Information Sciences
5 Journal of Computational Physics
5 Computing
5 European Journal of Combinatorics
5 SIAM Journal on Discrete Mathematics
5 International Journal of Foundations of Computer Science
5 Journal of Combinatorial Optimization
4 Communications in Mathematical Physics
4 International Journal of Computer Mathematics
4 Applicable Algebra in Engineering, Communication and Computing
4 Soft Computing
4 Prikladnaya Diskretnaya Matematika
3 Physics Letters. A
3 Journal of Combinatorial Theory. Series A
3 Journal of Combinatorial Theory. Series B
3 Operations Research Letters
3 Computers & Operations Research
3 ZOR. Zeitschrift für Operations Research
3 Top
3 Journal of Scheduling
3 Journal of Discrete Mathematical Sciences & Cryptography
3 Journal of Discrete Algorithms
3 Journal of Shanghai Jiaotong University (Science)
3 Mathematics in Computer Science
3 Journal of Physics A: Mathematical and Theoretical
3 Frontiers of Computer Science
3 Matematicheskie Voprosy Kriptografii
2 Computer Methods in Applied Mechanics and Engineering
2 Journal of the Franklin Institute
2 Physica A
2 Problems of Information Transmission
2 Applied Mathematics and Computation
2 BIT
2 Journal of Computational and Applied Mathematics
2 SIAM Journal on Computing
2 Advances in Applied Mathematics
2 Acta Applicandae Mathematicae
2 Computer Aided Geometric Design
2 Journal of Computer Science and Technology
2 Computational Mechanics
2 Japan Journal of Industrial and Applied Mathematics
2 Computational Mathematics and Mathematical Physics
2 Linear Algebra and its Applications
2 Pattern Recognition
2 Cybernetics and Systems Analysis
2 Experimental Mathematics
2 The Electronic Journal of Combinatorics
2 Annals of Mathematics and Artificial Intelligence
2 Doklady Mathematics
2 Optimization Methods & Software
2 Optimization and Engineering
2 RAIRO. Operations Research
2 Physical Review Letters
2 Journal of Applied Mathematics
2
2 Foundations of Physics
2 Discrete Optimization
2 Optimization Letters
2 Physical Review A, Third Series
2 Science China. Mathematics
1 International Journal of Modern Physics B
1 ACM Computing Surveys
1 Acta Mechanica
1 Advances in Applied Probability
1 Computers and Fluids
1 Computer Physics Communications
1 IEEE Transactions on Information Theory
1 Indian Journal of Pure & Applied Mathematics
1 Periodica Mathematica Hungarica
1 Reports on Mathematical Physics
1 Reviews of Modern Physics
1 Russian Mathematical Surveys
1 Journal of Geometry and Physics
...and 70 more Serials
all top 5

Cited in 46 Fields

336 Information and communication theory, circuits (94-XX)
284 Computer science (68-XX)
122 Operations research, mathematical programming (90-XX)
97 Quantum theory (81-XX)
91 Combinatorics (05-XX)
78 Convex and discrete geometry (52-XX)
57 Numerical analysis (65-XX)
39 Number theory (11-XX)
23 Algebraic geometry (14-XX)
18 Statistics (62-XX)
12 Commutative algebra (13-XX)
11 Probability theory and stochastic processes (60-XX)
9 Geometry (51-XX)
9 Statistical mechanics, structure of matter (82-XX)
7 Order, lattices, ordered algebraic structures (06-XX)
6 Fluid mechanics (76-XX)
5 Calculus of variations and optimal control; optimization (49-XX)
5 Mechanics of deformable solids (74-XX)
4 Mathematical logic and foundations (03-XX)
4 Group theory and generalizations (20-XX)
4 Real functions (26-XX)
4 Mechanics of particles and systems (70-XX)
4 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
3 Field theory and polynomials (12-XX)
3 Associative rings and algebras (16-XX)
3 Dynamical systems and ergodic theory (37-XX)
3 Geophysics (86-XX)
2 General and overarching topics; collections (00-XX)
2 Linear and multilinear algebra; matrix theory (15-XX)
2 Topological groups, Lie groups (22-XX)
2 Ordinary differential equations (34-XX)
2 Operator theory (47-XX)
2 Systems theory; control (93-XX)
1 Measure and integration (28-XX)
1 Functions of a complex variable (30-XX)
1 Several complex variables and analytic spaces (32-XX)
1 Partial differential equations (35-XX)
1 Approximations and expansions (41-XX)
1 Harmonic analysis on Euclidean spaces (42-XX)
1 Functional analysis (46-XX)
1 Differential geometry (53-XX)
1 Algebraic topology (55-XX)
1 Manifolds and cell complexes (57-XX)
1 Optics, electromagnetic theory (78-XX)
1 Relativity and gravitational theory (83-XX)
1 Biology and other natural sciences (92-XX)

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.