Bruce M. Kapron

Orcid: 0000-0002-3295-543X

Affiliations:
  • University of Victoria, Canada


According to our database1, Bruce M. Kapron authored at least 66 papers between 1987 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Computational Complexity of Equilibria with Strategic Constraints.
Proceedings of the SOFSEM 2025: Theory and Practice of Computer Science, 2025

On The Computational Complexity of Games with Uncertainty.
Proceedings of the Algorithms and Complexity - 14th International Conference, 2025

2024
The Computational Complexity of Variational Inequalities and Applications in Game Theory.
CoRR, 2024

On Separation Logic, Computational Independence, and Pseudorandomness (Extended Version).
CoRR, 2024

Declassification Policy for Program Complexity Analysis.
Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 2024

On Separation Logic, Computational Independence, and Pseudorandomness.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

On the Computational Complexity of Quasi-Variational Inequalities and Multi-Leader-Follower Games.
Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, 2024

2023
Linicrypt in the Ideal Cipher Model.
Proceedings of the Provable and Practical Security, 2023

Preimage Awareness in Linicrypt.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Cook's Berkeley Notes.
Proceedings of the Logic, 2023

Introduction.
Proceedings of the Logic, 2023

2022
Complete and tractable machine-independent characterizations of second-order polytime.
Proceedings of the Foundations of Software Science and Computation Structures, 2022

2020
MMH* with arbitrary modulus is always almost-universal.
CoRR, 2020

A tier-based typed programming language characterizing Feasible Functionals.
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020

2019
Higher-order Complexity Theory and its Applications (NII Shonan Meeting 151).
NII Shonan Meet. Rep., 2019

A generalization of Schönemann's theorem via a graph theoretic method.
Discret. Math., 2019

Type-two Iteration with Bounded Query Revision.
Proceedings of the Proceedings Third Joint Workshop on Developments in Implicit Computational complExity and Foundational & Practical Aspects of Resource Analysis, 2019

2018
Anonymization and De-anonymization of Social Network Data.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes.
Des. Codes Cryptogr., 2018

Type-two polynomial-time and restricted lookahead.
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, 2018

2017
A Survey of Classes of Primitive Recursive Functions.
Electron. Colloquium Comput. Complex., 2017

Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
The Cayley Graphs Associated With Some Quasi-Perfect Lee Codes Are Ramanujan Graphs.
IEEE Trans. Inf. Theory, 2016

MMH<sup>⁎</sup> with arbitrary modulus is always almost-universal.
Inf. Process. Lett., 2016

Simultaneous Secrecy and Reliability Amplification for a General Channel Model.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

On a variant of multilinear modular hashing with applications to authentication and secrecy codes.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Semantically Non-preserving Transformations for Antivirus Evaluation.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Stability of certainty and opinion in influence networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
A framework for non-interactive instance-dependent commitment schemes (NIC).
Theor. Comput. Sci., 2015

Restricted linear congruences.
IACR Cryptol. ePrint Arch., 2015

On an almost-universal hash function family with applications to authentication and secrecy codes.
IACR Cryptol. ePrint Arch., 2015

Dynamic graph connectivity with improved worst case update time and sublinear space.
CoRR, 2015

Restricted linear congruences and an authenticated encryption scheme.
CoRR, 2015

On almost-universal multilinear modular hashing with composite moduli.
CoRR, 2015

Gambling, Computational Information and Encryption Security.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Anonymization and De-anonymization of Social Network Data.
Encyclopedia of Social Network Analysis and Mining, 2014

2013
Complexity of social network anonymization.
Soc. Netw. Anal. Min., 2013

Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes.
Soc. Netw. Anal. Min., 2013

Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Dynamic graph connectivity in polylogarithmic worst case time.
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013

2011
Social Network Anonymization via Edge Addition.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

k-Anonymization of Social Networks by Vertex Addition.
Proceedings of the ADBIS 2011, 2011

2010
On the Equality of Probabilistic Terms.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2010

Computational indistinguishability logic.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
Fast asynchronous byzantine agreement and leader election with full information.
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2008

2007
A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC).
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

2006
Lower bound for scalable Byzantine Agreement.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

2003
Erratum to "Zero-one laws for modal logic" [Ann. Pure Appl. Logic 69 (1994) 157-193].
Ann. Pure Appl. Log., 2003

The modal logic of the countable random frame.
Arch. Math. Log., 2003

Logics for Reasoning about Cryptographic Constructions.
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003

2001
On characterizations of the basic feasible functionals (Part I).
J. Funct. Program., 2001

2000
Resource-Bounded Continuity and Sequentiality for Type-Two Functionals.
Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science, 2000

1999
A note on negative tagging for least fixed-point formulae.
RAIRO Theor. Informatics Appl., 1999

Feasibly Continuous Type-Two Functionals.
Comput. Complex., 1999

1996
A New Characterization of Type-2 Feasibility.
SIAM J. Comput., 1996

A modal mu-calculus and a proof system for value passing processes.
Proceedings of the First International Workshop on Verification of Infinite State Systems, 1996

1994
The Parameterized Complexity of Some Problems in Logic and Linguistics.
Proceedings of the Logical Foundations of Computer Science, Third International Symposium, 1994

1993
Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution.
Proceedings of the STACS 93, 1993

Parallel computable higher type functionals (Extended Abstract)
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993

1992
Zero-One Laws for Modal Logic
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

1991
Feasible computation in higher types.
PhD thesis, 1991

A New Characterization of Mehlhorn's Polynomial Time Functionals (Extended Abstract)
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991

1989
Characterizations of the Basic Feasible Functionals of Finite Type (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

1987
Modal Sequents and Definability.
J. Symb. Log., 1987


  Loading...