Name
Papers
Collaborators
BRUCE M. KAPRON
44
50
Citations 
PageRank 
Referers 
308
26.02
569
Referees 
References 
606
568
Search Limit
100606
Title
Citations
PageRank
Year
Complete and tractable machine-independent characterizations of second-order polytime00.342022
Type-two Iteration with Bounded Query Revision.00.342019
Unweighted linear congruences with distinct coordinates and the Varshamov–Tenengolts codes00.342018
A Survey of Classes of Primitive Recursive Functions.00.342017
Reproducible Circularly Secure Bit Encryption: Applications and Realizations.00.342017
A generalization of Schönemann's theorem via a graph theoretic method.00.342017
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions.00.342017
The Cayley Graphs Associated With Some Quasi-Perfect Lee Codes Are Ramanujan Graphs.10.362016
MMH⁎ with arbitrary modulus is always almost-universal.30.482016
Stability of certainty and opinion in influence networks.00.342016
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes.433.502016
On a variant of multilinear modular hashing with applications to authentication and secrecy codes00.342016
Semantically Non-preserving Transformations for Antivirus Evaluation.00.342016
Simultaneous Secrecy and Reliability Amplification for a General Channel Model.00.342016
On an almost-universal hash function family with applications to authentication and secrecy codes.10.392015
Restricted linear congruences and an authenticated encryption scheme.10.352015
Restricted linear congruences10.352015
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations20.362015
Dynamic graph connectivity with improved worst case update time and sublinear space100.522015
On almost-universal multilinear modular hashing with composite moduli00.342015
Gambling, Computational Information And Encryption Security00.342015
Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes.130.602013
Dynamic graph connectivity in polylogarithmic worst case time491.632013
Complexity of social network anonymization.220.812013
Computational soundness of coinductive symbolic security under active attacks10.372013
k-Anonymization of Social Networks by Vertex Addition.160.672011
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles.00.342011
Computational Indistinguishability Logic180.712010
On the Equality of Probabilistic Terms70.442010
Fast asynchronous byzantine agreement and leader election with full information290.962010
Lower bound for scalable Byzantine Agreement90.662008
A characterization of non-interactive instance-dependent commitment-schemes (NIC)80.492007
Logics for Reasoning about Cryptographic Constructions401.152006
Erratum to “Zero-one laws for modal logic” [Ann. Pure Appl. Logic 69 (1994) 157–193]00.342003
The modal logic of the countable random frame20.382003
On characterizations of the basic feasible functionals, Part I170.842001
Resource-bounded continuity and sequentiality for type-two functionals20.392000
A note on negative tagging for least fixed-point formulae00.341999
Feasibly continuous type-two functionals20.501999
A modal mu-calculus and a proof system for value passing processes20.421996
Parallel computable higher type functionals (Extended Abstract)10.381993
A new characterization of Mehlhorn's polynomial time functionals (extended abstract)10.361991
Characterizations of the Basic Feasible Functionals of Finite Type (Extended Abstract)00.341989
Modal Sequents And Definability72.201987