Bruce M. Kapron
ScholarGPS® ID: 22916689058765
Affiliation History
Discipline
Computer Science
Top Specialties
Logic | Social Network | Social Network Analysis | Cryptography | Conflict Resolution | Information Theory | Number Theory
Metrics Summary
Publication Count
63
Predicted Citations
1,168
Predicted h-index
18
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
Preimage Awareness in Linicrypt (conference) 2023 IEEE 36th Computer Security Foundations Symposium (CSF) (2023) Dubrovnik, Croatia |
Authentication of variable length messages in quantum key distribution (journal article) EPJ Quantum Technology, volume 9, issue 1 (2022). |
Logical Methods in Computer Science, volume Volume 18, Issue 1 (2022). |
Complete and tractable machine-independent characterizations of second-order polytime (book chapter) In Foundations of Software Science and Computation Structures Springer International Publishing (2022) |
LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science (2020) Saarbrücken Germany |
Type-two polynomial-time and restricted lookahead (journal article) Theoretical Computer Science, volume 813 (2020). |
A generalization of Schönemann’s theorem via a graph theoretic method (journal article) Discrete Mathematics, volume 342, issue 11, pages 3057-3061 (2019). |
Type-two Iteration with Bounded Query Revision (journal article) Electronic Proceedings in Theoretical Computer Science, volume 298 (2019). |
Unweighted linear congruences with distinct coordinates and the Varshamov–Tenengolts codes (journal article) Designs, Codes and Cryptography, volume 86, issue 9, pages 1893-1904 (2018). |
Type-two polynomial-time and restricted lookahead (conference) LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science (2018) Oxford United Kingdom |
On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes (journal article) International Journal of Foundations of Computer Science, volume 29, issue 03, pages 357-375 (2018). |
Anonymization and De-anonymization of Social Network Data (book chapter) In Encyclopedia of Social Network Analysis and Mining Springer New York (2018) |
Anonymization and De-anonymization of Social Network Data (book chapter) In Encyclopedia of Social Network Analysis and Mining Springer New York (2018) |
Journal of Cryptology, volume 30, issue 4, pages 1187-1237 (2017). |
Restricted linear congruences (journal article) Journal of Number Theory, volume 171 (2017). |
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions (book chapter) In Advances in Cryptology – EUROCRYPT 2017 Springer International Publishing (2017) |
Semantically Non-preserving Transformations for Antivirus Evaluation (book chapter) In Foundations and Practice of Security Springer International Publishing (2017) |
On a restricted linear congruence (journal article) International Journal of Number Theory, volume 12, issue 08, pages 2167-2171 (2016). |
The Cayley Graphs Associated With Some Quasi-Perfect Lee Codes Are Ramanujan Graphs (journal article) IEEE Transactions on Information Theory, volume 62, issue 11, pages 6355-6358 (2016). |
Counting surface-kernel epimorphisms from a co-compact Fuchsian group to a cyclic group with motivations from string theory and QFT (journal article) Nuclear Physics B, volume 910 (2016). |