H
Hideki Imai
Researcher at University of Tokyo
Publications - 86
Citations - 4233
Hideki Imai is an academic researcher from University of Tokyo. The author has contributed to research in topics: Decoding methods & Concatenated error correction code. The author has an hindex of 25, co-authored 86 publications receiving 4114 citations. Previous affiliations of Hideki Imai include Yokohama National University.
Papers
More filters
Journal ArticleDOI
A new multilevel coding method using error-correcting codes
Hideki Imai,S. Hirakawa +1 more
TL;DR: A new multilevel coding method that uses several error-correcting codes that makes effective use of soft-decisions to improve the performance of decoding and is superior to other multileVEL coding systems.
Book ChapterDOI
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Tsutomu Matsumoto,Hideki Imai +1 more
TL;DR: It is shown that for C* it is practically infeasible to extract the n-tuple of n-variate polynomials representing the inverse of the corresponding public key.
Journal ArticleDOI
Combinations of an adaptive array antenna and a canceller of interference for direct-sequence spread-spectrum multiple-access system
TL;DR: An adaptive array antenna system is proposed that includes a cancellor of cochannel interference that can improve performance by a combination of temporal and spatial filtering, which can achieve stable acquisition and low error rate of demodulated data even in a heavy-interference channel where a conventional array antennas cannot achieve satisfactory acquisition.
Journal ArticleDOI
A spread-spectrum multiaccess system with cochannel interference cancellation for multipath fading channels
TL;DR: The authors investigate the canceller's bit error rate (BER) performance in both the absence and presence of errors in the amplitude and phase estimates of each user's received signal.
Book ChapterDOI
Speeding Up Secret Computations with Insecure Auxiliary Devices
TL;DR: This paper deals with and gives some solutions to the problem of how a small device such as a smart card can efficiently execute secret computations using computing power of auxiliary devices like auxiliary devices which are not necessarily trusted.