Sciweavers

38 search results - page 2 / 8
» cca 2009
Sort
View
FOCS
2009
IEEE
14 years 15 days ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat
CCA
2009
Springer
14 years 10 days ago
Relativizations of the P =? DNP Question for the BSS Model
We consider the uniform BSS model of computation where the machines can perform additions, multiplications, and tests of the form x ≥ 0. The oracle machines can also check whethe...
Christine Gaßner
CCA
2009
Springer
14 years 10 days ago
Realisability and Adequacy for (Co)induction
Abstract. We prove the correctness of a formalised realisability interpretation of extensions of first-order theories by inductive and coinductive definitions in an untyped λ-ca...
Ulrich Berger
CCA
2009
Springer
14 years 10 days ago
Uniqueness, Continuity, and Existence of Implicit Functions in Constructive Analysis
We extract a quantitative variant of uniqueness from the usual hypotheses of the implicit functions theorem. This leads not only to an a priori proof of continuity, but also to an ...
Hannes Diener, Peter Schuster
CCA
2009
Springer
14 years 10 days ago
Random Iteration Algorithm for Graph-Directed Sets
Abstract. A random iteration algorithm for graph-directed sets is defined and discussed. Similarly to the Barnsley-Elton’s theorem, it is shown that almost all sequences obtaine...
Yoshiki Tsujii, Takakazu Mori, Mariko Yasugi, Hide...