Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,055,569 papers from all fields of science
Search
Sign In
Create Free Account
Forking lemma
The forking lemma is any of a number of related lemmas in cryptography research. The lemma states that if an adversary (typically a probabilistic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Cryptography
Digital signature
Discrete logarithm
Eurocrypt
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The Local Forking Lemma and its Application to Deterministic Encryption
M. Bellare
,
Wei Dai
,
Lucy Li
IACR Cryptology ePrint Archive
2019
Corpus ID: 202670314
We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting…
Expand
Highly Cited
2019
Highly Cited
2019
On the Security of Two-Round Multi-Signatures
Manu Drijvers
,
Kasra Edalatnejad
,
+4 authors
Igors Stepanovs
IEEE Symposium on Security and Privacy
2019
Corpus ID: 85547736
A multi-signature scheme allows a group of signers to collaboratively sign a message, creating a single signature that convinces…
Expand
2013
2013
Forking and JSJ decompositions in the free group
Chloé Perin
,
R. Sklinos
2013
Corpus ID: 53625084
We give a description of the model theoretic relation of forking independence in terms of the notion of JSJ decompositions in non…
Expand
Highly Cited
2011
Highly Cited
2011
To Fork or Not to Fork: Fork Motivations in SourceForge Projects
Linus Nyman
,
T. Mikkonen
International Conference on Open Source Systems
2011
Corpus ID: 12553715
A project fork occurs when software developers take a copy of source code from one software package and use it to begin an…
Expand
Highly Cited
2011
Highly Cited
2011
Towards the ideal on-chip fabric for 1-to-many and many-to-1 communication
T. Krishna
,
L. Peh
,
Bradford M. Beckmann
,
S. Reinhardt
Micro
2011
Corpus ID: 13169297
The prevalence of multicore architectures has accentuated the need for scalable cache coherence solutions. Many of the proposed…
Expand
Highly Cited
2008
Highly Cited
2008
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Ali Bagherzandi
,
J. Cheon
,
Stanislaw Jarecki
Conference on Computer and Communications…
2008
Corpus ID: 7602439
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the…
Expand
Highly Cited
2006
Highly Cited
2006
Multi-signatures in the plain public-Key model and a general forking lemma
M. Bellare
,
G. Neven
Conference on Computer and Communications…
2006
Corpus ID: 6587961
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many…
Expand
Highly Cited
2006
Highly Cited
2006
Properties and consequences of Thorn-independence
A. Onshuus
Journal of Symbolic Logic (JSL)
2006
Corpus ID: 5751067
Abstract We develop a new notion of independence (ϸ-independence, read “thorn”-independence) that arises from a family of ranks…
Expand
Highly Cited
2000
Highly Cited
2000
A Multi-population Approach to Dynamic Optimization Problems
J. Branke
,
T. Kaußler
,
C.G.K. Smidt
,
H. Schmeck
2000
Corpus ID: 6601823
Time-dependent optimization problems pose a new challenge to evolutionary algorithms, since they not only require a search for…
Expand
1982
1982
Dimension theory and homogeneity for elementary extensions of a model
A. Pillay
Journal of Symbolic Logic (JSL)
1982
Corpus ID: 11153398
We take a fixed countable model M0, and we look at the structure of and number of its countable elementary extensions (up to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE