Scheme theory

Results: 835



#Item
241Mathematical logic / Recursion / Lambda calculus / Factorial / Scheme / Function / Primitive recursive function / Fixed-point combinator / Mathematics / Computability theory / Computer programming

Terminology: Denoted and Expressed Values A denoted value is the meaning of a variable An expressed value is the result of an expression Terminology: Denoted and Expressed Values First-order functions

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2009-02-04 16:35:18
242Procedural programming languages / Cross-platform software / Lisp / Lisp programming language / Scheme / Regular expression / C / ALGOL 68 / SQL / Software engineering / Computing / Programming language theory

4.Syntax This section presents an informal syntax for Joule. For a formal syntax, see Appendix B. Syntactic abstraction, the set of techniques for extending the Joule syntax, is discussed but not specified in this docum

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:55
243Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
244Cryptographic protocols / Probabilistic complexity theory / Complexity classes / Interactive proof system / Proof of knowledge / Zero-knowledge proof / IP / Soundness / Commitment scheme / Theoretical computer science / Applied mathematics / Computational complexity theory

Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li HongDa†1 , Feng DengGuo2 , Li Bao1 , Xu HaiXia1 1 State Key Lab of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-15 09:42:20
245Transformation languages / Macro programming languages / Dylan programming language / Hygienic macro / Meta-programming / Scheme programming language / Macro / Lambda calculus / Model theory / Computing / Software engineering / Computer programming

A Theory of Hygienic Macros David Herman and Mitchell Wand College of Computer and Information Science Northeastern University Boston, MA 02115 {dherman,wand}@ccs.neu.edu

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2007-10-15 14:26:08
246Lambda calculus / Constraint programming / Type theory / Theoretical computer science / Scheme / Lambda / System F / Local consistency / Constraint logic programming / Programming language theory / Software engineering / Computer science

Higher-Order and Symbolic Computation, 18, 245–269, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands.  Selectors Make Set-Based Analysis Too Hard PHILIPPE MEUNIER

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2005-11-28 16:38:29
247Commutative algebra / Ideals / IP / Commitment scheme / Principal ideal / Ln / XTR / Algebraic number field / Class number formula / Abstract algebra / Algebra / Algebraic number theory

Journal de Th´eorie des Nombres de Bordeaux), 293–307 Cryptography based on number fields with large regulator par Johannes BUCHMANN, Markus MAURER

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:06
248Programming language theory / Standardization / Scheme Requests for Implementation / Scheme programming language / Scheme

DRAFT Scheme Standardization Charter Participants of the 2002 Scheme workshop in Pittsburgh formed a “strategy” committee to determine a process and direction for future Scheme standards. The committee members are Al

Add to Reading List

Source URL: www.schemeworkshop.org

Language: English - Date: 2011-08-12 16:48:24
249Mathematics / Multilinear algebra / Cryptography / Finite fields / Decision Linear assumption / Boneh/Franklin scheme / Group theory / Bilinear map / Decisional Diffie–Hellman assumption / Algebra / Computational hardness assumptions / Abstract algebra

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
250RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
UPDATE