Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Forking lemma

The forking lemma is any of a number of related lemmas in cryptography research. The lemma states that if an adversary (typically a probabilistic… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
  • S. Vasey
  • Ann. Pure Appl. Log.
  • 2016
  • Corpus ID: 34956375
Abstract We study general methods to build forking-like notions in the framework of tame abstract elementary classes (AECs) with… Expand
Is this relevant?
2014
2014
  • B. Yang, Lina Fang
  • IEEE Journal of Selected Topics in Applied Earth…
  • 2014
  • Corpus ID: 29268976
The demand for automated railway tracks extraction is driven by the importance of maintaining and updating the fundamental… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2011
2011
A project fork occurs when software developers take a copy of source code from one software package and use it to begin an… Expand
  • figure 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The prevalence of multicore architectures has accentuated the need for scalable cache coherence solutions. Many of the proposed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2008
2008
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many… Expand
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We develop a new notion of independence (ϸ-independence, read “thorn”-independence) that arises from a family of ranks suggested… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Time-dependent optimization problems pose a new challenge to evolutionary algorithms, since they not only require a search for… Expand
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
1994
1994
There are two types of GAs with difference of their representation of strings. They are the binary coded GA and the order-based… Expand
  • figure 3
  • table 1
Is this relevant?
1991
1991
The Child in Time opens with a harrowing event. Stephen Lewis,a successful author of children's books, takes his three-year-old… Expand
Is this relevant?