Information Processing Letters

Papers
(The median citation count of Information Processing Letters is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method22
Editorial Board19
Polynomial invariants for cactuses12
A note on the satisfactory partition problem: Constant size requirement11
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm11
Density of distinct squares in non-primitive words10
Geometric separability using orthogonal objects9
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions8
On matrices potentially useful for tree codes8
Embedded edge connectivity of k-ary n-cubes7
Rank and select operations on a word7
A note on the method of equal shares7
Waypoint routing on bounded treewidth graphs7
Recognizing well-dominated graphs is coNP-complete6
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees6
The longest common subsequence problem for small alphabets in the word RAM model6
Metric distortion of obnoxious distributed voting6
Fault-tolerant Hamiltonicity of hypercubes with faulty subcubes5
Bounds and algorithms for generalized superimposed codes5
Faster deterministic algorithm for Cactus Vertex Deletion5
Recursion-free modular arithmetic in the lambda-calculus5
Editorial Board5
Exact PPS sampling with bounded sample size5
Grid straight-line embeddings of trees with a minimum number of bends per path5
A short note on “A note on single-machine scheduling with job-dependent learning effects”4
Simplicity in Eulerian circuits: Uniqueness and safety4
Online delay management on a single train line with predictions4
Instability results for cosine-dissimilarity-based nearest neighbor search on high dimensional Gaussian data4
Order-preserving pattern matching with scaling4
Tight inapproximability of Nash equilibria in public goods games4
Editorial Board4
Editorial Board4
A simple 4-approximation algorithm for maximum agreement forests on multiple unrooted binary trees4
Long directed detours: Reduction to 2-Disjoint Paths4
Editorial Board4
Heavy and light paths and Hamilton cycles4
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs4
Weighted fair division of indivisible items: A review4
Editorial Board4
The group factorization problem in finite groups of Lie type3
Strong edge-colorings of sparse graphs with 3Δ − 1 colors3
Public-key encryption scheme with optimal continuous leakage resilience3
Discrete load balancing on complete bipartite graphs3
Analyzing Residual Random Greedy for monotone submodular maximization3
On Voronoi visibility maps of 1.5D terrains with multiple viewpoints3
Linear discrepancy is Π2-hard to approximate3
Packing batches of items into a single bin3
A 22k-approximation 3
Long paths in heterogeneous random subgraphs of graphs with large minimum degree3
A real polynomial for bipartite graph minimum weight perfect matchings3
A constant-time sampling algorithm for binary Gaussian distribution over the integers3
Weighted well-covered graphs without cycles of lengths 5, 6 and 73
On size-independent sample complexity of ReLU networks3
A new class of generalized almost perfect nonlinear monomial functions3
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine3
Thou shalt covet the average of thy neighbors' cakes3
Hamiltonian cycles and paths in hypercubes with disjoint faulty edges3
On public-coin zero-error randomized communication complexity3
Luby's MIS algorithms made self-stabilizing3
Inapproximability of counting independent sets in linear hypergraphs3
On-line exploration of rectangular cellular environments with a rectangular hole3
Smoothness of Schatten norms and sliding-window matrix streams3
On conflict-free cuts: Algorithms and complexity3
Efficient linear-time ranking and unranking of derangements2
Anti Tai mapping for unordered labeled trees2
On approximate reconfigurability of label cover2
The loss of serving in the dark2
An improved uniform convergence bound with fat-shattering dimension2
Palindromic trees for a sliding window and its applications2
Relating planar graph drawings to planar satisfiability problems2
Two-level hub Steiner trees2
String searching with mismatches using AVX2 and AVX-512 instructions2
Friends-and-strangers is PSPACE-complete2
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher2
On optimization problems in acyclic hypergraphs2
Synchronizing words under LTL constraints2
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks2
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions2
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance2
The complexity of the vertex-minor problem2
On regularity of Max-CSPs and Min-CSPs2
On some decidability questions concerning supports of rational series2
Algorithmic results in Roman dominating functions on graphs2
Packing batches of cubes into a single bin2
Editorial Board2
Computing the k densest subgraphs of a graph2
A refined approximation for Euclidean k-means2
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality2
Static type checking without downcast operator2
A note on matching-cut in P-free graphs2
Improved kernels for tracking paths2
Online single-machine scheduling to minimize the linear combination of makespans of two agents2
A nearly tight lower bound for the d-dimensional cow-path problem2
Tight FPT Approximation for Socially Fair Clustering2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Security weakness of a certificate-based proxy signature scheme for IIoT environments2
On the parameterized complexity of the Maximum Exposure Problem2
The facility location problem with maximum distance constraint2
Entailment is Undecidable for Symbolic Heap Separation Logic Formulæ with Non-Established Inductive Rules2
Worst-case analysis of LPT scheduling on a small number of non-identical processors1
Improved hardness of approximation for Geometric Bin Packing1
On d-distance m-tuple (ℓ,r)-domination in graphs1
Smaller kernels for two vertex deletion problems1
Faster counting empty convex polygons in a planar point set1
Steiner connectivity problems in hypergraphs1
Fair and truthful allocations under leveled valuations1
Revisiting lower dimension lattice attacks on NTRU1
Escaping Braess's paradox through approximate Caratheodory's theorem1
Branching bisimulation semantics for quantum processes1
On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times1
The complexity of finding temporal separators under waiting time constraints1
Red Blue Set Cover problem on axis-parallel hyperplanes and other objects1
Tight lower bound for average number of terms in optimal double-base number system using information-theoretic tools1
Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee1
Online search for a hyperplane in high-dimensional Euclidean space1
A note on distance-preserving graph sparsification1
Editorial Board1
There is no APTAS for 2-dimensional vector bin packing: Revisited1
New sharp lower bound for the quorum coloring number of trees1
Efficient Implementations of Square-root Vélu's Formulas1
Improved entropy bounds for parity filtered self-timed ring based random number generators1
Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”1
On product decomposition1
Modular termination of prefix-constrained term rewrite systems1
Lower bound proof for the size of BDDs representing a shifted addition1
Special issue on Economics and Computation1
Insertion depth in power-weight trees1
Simplified Chernoff bounds with powers-of-two probabilities1
NP-hardness of shortest path problems in networks with non-FIFO time-dependent travel times1
Learning from positive and negative examples: New proof for binary alphabets1
A polylogarithmic approximation algorithm for 2-edge-connected dominating set1
Spanners under the Hausdorff and Fréchet distances1
Hard problems that quickly become very easy1
On the k-means/median cost function1
Quantum attacks on Sum of Even-Mansour pseudorandom functions1
New network entropy: The domination entropy of graphs1
Approximating the minimal lookahead needed to win infinite games1
Editorial Board1
Robust probabilistic temporal logics1
Spectral independence, coupling, and the spectral gap of the Glauber dynamics1
On radio k-labeling of the power of the infinite path1
On the security of TrCBC1
Reducing the space used by the sieve of Eratosthenes when factoring1
Discrete and mixed two-center problems for line segments1
Monochromatic partitioning of colored points by lines1
Faster algorithms and a smaller kernel for Cliques or Trees Vertex Deletion1
Comparing approximate and probabilistic differential privacy parameters1
A note on the complexity of one-sided crossing minimization of trees1
A note for approximating the submodular cover problem over integer lattice with low adaptive and query complexities1
An efficient algorithm for identifying rainbow ortho-convex 4-sets in k-colored point sets1
Connectivity, super connectivity and generalized 3-connectivity of folded divide-and-swap cubes1
On the preferred extensions of argumentation frameworks: Bijections with naive sets1
Effective data reduction for strongly stable matching in very sparse graphs1
New results on pairwise compatibility graphs1
The effect of iterativity on adversarial opinion forming1
Dispersion problem on a convex polygon0
4/3 rectangle tiling lower bound0
A note on algebraic techniques for subgraph detection0
All-pairs suffix/prefix in optimal time using Aho-Corasick space0
Fast primal-dual update against local weight update in linear assignment problem and its application0
On the non-efficient PAC learnability of conjunctive queries0
Strong hardness of approximation for tree transversals0
Approximation error of single hidden layer neural networks with fixed weights0
Corrigendum to “Revisiting reachability in polynomial interrupt timed automata” [Information Processing Letters 174 (2022) 106208]0
Hamiltonian cycles of balanced hypercube with disjoint faulty edges0
Space-efficient Huffman codes revisited0
A note on the class of languages generated by F-systems over regular languages0
A faster parameterized algorithm for temporal matching0
The autocorrelation of a class of quaternary sequences of length pq with high complexity0
Editorial Board0
On the hardness of inclusion-wise minimal separators enumeration0
Prenex universal first-order safety properties0
Editorial Board0
A note on improved results for one round distributed clique listing0
An Algorithm for the Sequence Alignment with Gap Penalty Problem using Multiway Divide-and-Conquer and Matrix Transposition0
Splitting NP-complete sets infinitely0
A lower bound for the Quickhull convex hull algorithm that disproves the Quickhull precision conjecture0
Linear threshold functions in decision lists, decision trees, and depth-2 circuits0
Improved lower bound for differentially private facility location0
Cluster deletion revisited0
Counter abstraction for regular open teams0
Zone theorem for arrangements in dimension three0
End vertices of graph searches on bipartite graphs0
On the hull number on cycle convexity of graphs0
GR(10
Satisfying the restricted isometry property with the optimal number of rows and slightly less randomness0
New bounds for the number of lightest cycles in undirected graphs0
On maximum bipartite matching with separation0
A note on approximations of directed edge dominating set0
Mesosome avoidance0
Vertex-connectivity for node failure identification in Boolean Network Tomography0
Editorial Board0
The upper and lower bounds of R-conditional diagnosability of networks0
Cryptanalysis of multivariate threshold ring signature schemes0
Generalized cuckoo hashing with a stash, revisited0
Optimal approximations made easy0
An information theoretic proof of the Chernoff-Hoeffding inequality0
Recognizing LBFS trees of bipartite graphs0
On reversing arcs to improve arc-connectivity0
Minimum projective linearizations of trees in linear time0
An improved kernel for the flip distance problem on simple convex polygons0
Is this network proper forest-based?0
Airports and railways with unsplittable demand0
A sharper lower bound on Rankin's constant0
Geometric systems of unbiased representatives0
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments0
The computational complexity of some explainable clustering problems0
Computing inductive vertex orderings0
A new key recovery attack on a code-based signature from the Lyubashevsky framework0
Improving compressed matrix multiplication using control variate method0
FPT approximation and subexponential algorithms for covering few or many edges0
On the (im)possibility of improving the round diffusion of generalized Feistel structures0
Word automatic groups of nilpotency class 20
Algorithms with improved delay for enumerating connected induced subgraphs of a large cardinality0
A generalization of the Blind Rotating Table game0
The complexity of comparing optimal solutions0
Non-uniform packings0
A polynomial algorithm for deciding the validity of an electrical distribution tree0
Globally minimal defensive alliances0
Horton-Strahler number, rooted pathwidth and upward drawings of trees0
An asymptotically tight online algorithm for m-Steiner Traveling Salesman Problem0
Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography0
Randomized consensus with regular registers0
Semantic flowers for good-for-games and deterministic automata0
Maximal elements with minimal logic0
On semi-transitive orientability of split graphs0
Editorial Board0
Connected equitable cake division via Sperner's lemma0
Quantitative controller synthesis for consumption Markov decision processes0
On clustering with discounts0
Total variation distance for product distributions is #0
The maximum linear arrangement problem for trees under projectivity and planarity0
Editorial Board0
Editorial Board0
Faster deterministic algorithm for Co-Path Set0
Deciding origin equivalence of weakly self-nesting macro tree transducers0
An undecidability result for Separation Logic with theory reasoning0
Determining asynchronous test equivalence for probabilistic processes0
A note on VNP-completeness and border complexity0
Approximation and polynomial algorithms for the data mule scheduling with handling time and time span constraints0
An improved spectral lower bound of treewidth0
Editorial Board0
Polynomial recognition of vulnerable multi-commodities0
Lower and upper bounds on graph communicabilities0
Improved bounds for rectangular monotone Min-Plus Product and applications0
Robust algorithms for preemptive scheduling on uniform machines of non-increasing job sizes0
On the chromatic numbers of signed triangular and hexagonal grids0
A non-clausal tableau calculus for MinSat0
An improved exact algorithm for minimum dominating set in chordal graphs0
On the “majority is least stable” conjecture0
0.18440103530884