Information Processing Letters

Papers
(The median citation count of Information Processing Letters is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method23
Editorial Board12
Polynomial invariants for cactuses12
A note on the satisfactory partition problem: Constant size requirement11
Density of distinct squares in non-primitive words10
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm10
Geometric separability using orthogonal objects10
On matrices potentially useful for tree codes9
Embedded edge connectivity of k-ary n-cubes7
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions7
Recognizing well-dominated graphs is coNP-complete7
A note on the method of equal shares7
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees7
Waypoint routing on bounded treewidth graphs7
Metric distortion of obnoxious distributed voting6
Faster deterministic algorithm for Cactus Vertex Deletion6
The longest common subsequence problem for small alphabets in the word RAM model6
Editorial Board6
Grid straight-line embeddings of trees with a minimum number of bends per path6
Tight inapproximability of Nash equilibria in public goods games5
Bounds and algorithms for generalized superimposed codes5
Recursion-free modular arithmetic in the lambda-calculus5
Logical characterization of branching bisimilarity over random processes5
Exact PPS sampling with bounded sample size5
Online delay management on a single train line with predictions4
Editorial Board4
Editorial Board4
Weighted well-covered graphs without cycles of lengths 5, 6 and 74
A constant-time sampling algorithm for binary Gaussian distribution over the integers4
Notes about the linear complexity of quaternary cyclotomic sequences of order four4
Heavy and light paths and Hamilton cycles4
Editorial Board4
Smoothness of Schatten norms and sliding-window matrix streams4
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs4
Simplicity in Eulerian circuits: Uniqueness and safety4
A short note on “A note on single-machine scheduling with job-dependent learning effects”4
A simple 4-approximation algorithm for maximum agreement forests on multiple unrooted binary trees4
Analyzing Residual Random Greedy for monotone submodular maximization4
On the parameterized complexity of the Maximum Exposure Problem3
Packing batches of cubes into a single bin3
The group factorization problem in finite groups of Lie type3
Long paths in heterogeneous random subgraphs of graphs with large minimum degree3
On public-coin zero-error randomized communication complexity3
Discrete load balancing on complete bipartite graphs3
Inapproximability of counting independent sets in linear hypergraphs3
Thou shalt covet the average of thy neighbors' cakes3
A new class of generalized almost perfect nonlinear monomial functions3
A refined approximation for Euclidean k-means3
Packing batches of items into a single bin3
Luby's MIS algorithms made self-stabilizing3
On size-independent sample complexity of ReLU networks3
A real polynomial for bipartite graph minimum weight perfect matchings3
Long directed detours: Reduction to 2-Disjoint Paths3
Strong edge-colorings of sparse graphs with 3Δ − 1 colors3
Weighted fair division of indivisible items: A review3
Editorial Board3
On conflict-free cuts: Algorithms and complexity3
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine3
A 22k-approximation 3
On-line exploration of rectangular cellular environments with a rectangular hole3
Order-preserving pattern matching with scaling3
On Voronoi visibility maps of 1.5D terrains with multiple viewpoints3
Instability results for cosine-dissimilarity-based nearest neighbor search on high dimensional Gaussian data3
Public-key encryption scheme with optimal continuous leakage resilience3
Monochromatic partitioning of colored points by lines2
Algorithmic results in Roman dominating functions on graphs2
Palindromic trees for a sliding window and its applications2
Comparing approximate and probabilistic differential privacy parameters2
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher2
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks2
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions2
Corrigendum to “On the complexity of co-secure dominating set problem” [Inf. Process. Lett. 185 (2024) 106463]2
Online single-machine scheduling to minimize the linear combination of makespans of two agents2
Relating planar graph drawings to planar satisfiability problems2
On regularity of Max-CSPs and Min-CSPs2
Synchronizing words under LTL constraints2
Smaller kernels for two vertex deletion problems2
Tight FPT Approximation for Socially Fair Clustering2
Escaping Braess's paradox through approximate Caratheodory's theorem2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Two-level hub Steiner trees2
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality2
Static type checking without downcast operator2
A note on matching-cut in P-free graphs2
Efficient linear-time ranking and unranking of derangements2
Computing the k densest subgraphs of a graph2
An improved uniform convergence bound with fat-shattering dimension2
Improved kernels for tracking paths2
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance2
On optimization problems in acyclic hypergraphs2
On approximate reconfigurability of label cover2
String searching with mismatches using AVX2 and AVX-512 instructions2
Insertion depth in power-weight trees2
Security weakness of a certificate-based proxy signature scheme for IIoT environments2
The facility location problem with maximum distance constraint2
Fair and truthful allocations under leveled valuations2
Anti Tai mapping for unordered labeled trees2
The complexity of the vertex-minor problem2
On some families of binary codes2
On some decidability questions concerning supports of rational series2
The loss of serving in the dark2
Entailment is Undecidable for Symbolic Heap Separation Logic Formulæ with Non-Established Inductive Rules2
Friends-and-strangers is PSPACE-complete2
Reducing the space used by the sieve of Eratosthenes when factoring2
A nearly tight lower bound for the d-dimensional cow-path problem2
Efficient Implementations of Square-root Vélu's Formulas1
An improved kernel for the flip distance problem on simple convex polygons1
A note for approximating the submodular cover problem over integer lattice with low adaptive and query complexities1
On the complexity of some restricted variants of Quotient Pigeon and a weak variant of Kőnig1
Steiner connectivity problems in hypergraphs1
New sharp lower bound for the quorum coloring number of trees1
On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times1
Quantum attacks on Sum of Even-Mansour pseudorandom functions1
The complexity of finding temporal separators under waiting time constraints1
Improved hardness of approximation for Geometric Bin Packing1
Branching bisimulation semantics for quantum processes1
A polylogarithmic approximation algorithm for 2-edge-connected dominating set1
Worst-case analysis of LPT scheduling on a small number of non-identical processors1
NP-hardness of shortest path problems in networks with non-FIFO time-dependent travel times1
On d-distance m-tuple (ℓ,r)-domination in graphs1
Faster counting empty convex polygons in a planar point set1
Tight lower bound for average number of terms in optimal double-base number system using information-theoretic tools1
On radio k-labeling of the power of the infinite path1
The effect of iterativity on adversarial opinion forming1
Spanners under the Hausdorff and Fréchet distances1
A note on distance-preserving graph sparsification1
Polynomial kernels for tracking shortest paths1
A note on the complexity of one-sided crossing minimization of trees1
Connectivity, super connectivity and generalized 3-connectivity of folded divide-and-swap cubes1
New network entropy: The domination entropy of graphs1
A simple supercritical tradeoff between size and height in resolution1
Effective data reduction for strongly stable matching in very sparse graphs1
Online search for a hyperplane in high-dimensional Euclidean space1
An efficient algorithm for identifying rainbow ortho-convex 4-sets in k-colored point sets1
On the preferred extensions of argumentation frameworks: Bijections with naive sets1
Robust probabilistic temporal logics1
There is no APTAS for 2-dimensional vector bin packing: Revisited1
Approximating the minimal lookahead needed to win infinite games1
On the security of TrCBC1
On product decomposition1
Improved entropy bounds for parity filtered self-timed ring based random number generators1
Simplified Chernoff bounds with powers-of-two probabilities1
Editorial Board1
Red Blue Set Cover problem on axis-parallel hyperplanes and other objects1
Tighter bounds on non-clairvoyant parallel machine scheduling with prediction to minimize makespan1
Checking in polynomial time whether or not a regular tree language is deterministic top-down1
Discrete and mixed two-center problems for line segments1
New results on pairwise compatibility graphs1
Modular termination of prefix-constrained term rewrite systems1
Hard problems that quickly become very easy1
Spectral independence, coupling, and the spectral gap of the Glauber dynamics1
Learning from positive and negative examples: New proof for binary alphabets1
Faster algorithms and a smaller kernel for Cliques or Trees Vertex Deletion1
On the k-means/median cost function1
Special issue on Economics and Computation1
Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”1
Editorial Board1
Lower bound proof for the size of BDDs representing a shifted addition1
Revisiting lower dimension lattice attacks on NTRU1
Note on pancake sorting1
Unbiased estimation of inner product via higher order count sketch1
0.15801501274109