1667:
1315:). For example, if an attack succeeds in violating a security condition only with negligible probability, and the attack is repeated a polynomial number of times, the success probability of the overall attack still remains negligible.
291:
414:
2438:
2505:
751:
194:
64:
1378:
622:
155:
1580:
1467:
911:
2297:
1145:
1043:
2197:
1075:
1926:
1537:
1170:
1808:
861:
2376:
552:
1632:
1428:
1982:
1105:
942:
801:
627:
This classic definition of continuity can be transformed into the definition of negligibility in a few steps by changing parameters used in the definition. First, in the case
477:
1861:
828:
1731:
2125:
658:
2531:
2058:
1322:
functions bounding the adversary's success probability and to choose the security parameter large enough that this probability is smaller than some threshold, say 2.
503:
365:
700:
2323:
2223:
1757:
977:
451:
2032:
1003:
2589:
2002:
1652:
1487:
1298:
1278:
1258:
1235:
1215:
1195:
775:
1300:
can be any predetermined system metric and corresponding mathematical analysis would illustrate some hidden analytical behaviors of the system.
227:
2697:
2675:
2645:
2613:
2565:
1304:
1331:
381:
2739:
2389:
2444:
720:
163:
33:
2744:
1341:
557:
98:
1549:
1436:
867:
2229:
1110:
1008:
2131:
321:'s time (1680s), they were not well-defined until the late 1810s. The first reasonably rigorous definition of
1081:. This leads to the definitions of negligible functions given at the top of this article. Since the constants
1048:
2685:
1868:
1492:
1307:
is defined as polynomial running time: it has mathematical closure properties that make it tractable in the
1147:
with a constant polynomial, this shows that infinitesimal functions are a superset of negligible functions.
1764:
833:
2716:
2655:
2329:
508:
28:
2536:
2526:
1585:
1383:
334:
326:
1933:
1084:
921:
780:
456:
1815:
806:
1700:
2072:
2721:
1308:
630:
373:
306:
201:
2037:
482:
348:
2583:
663:
2667:
2693:
2671:
2641:
2637:
2628:
2609:
2571:
2561:
2521:
1319:
1161:
318:
2302:
2202:
1736:
947:
423:
2659:
2011:
1543:
1166:
982:
338:
2715:. Dept. of Computer Science & Engineering University of California at San Diego: 2002.
1240:
Nevertheless, the general notion of negligibility doesn't require that the input parameter
330:
2623:
2516:
1987:
1637:
1472:
1283:
1263:
1243:
1220:
1200:
1180:
760:
17:
1666:
2733:
2660:
712:
310:
2603:
1156:
342:
314:
1078:
305:
can find its trace back to sound models of analysis. Though the concepts of "
2575:
1303:
The reciprocal-of-polynomial formulation is used for the same reason that
1330:
One of the reasons that negligible functions are used in foundations of
1217:. Hence comes the definition at the top of the page because key length
345:
also defined as follows (with all numbers in the real number domain
286:{\displaystyle |\mu (x)|<{\frac {1}{\operatorname {poly} (x)}}.}
160:
Equivalently, we may also use the following definition. A function
1334:
cryptography is that they obey closure properties. Specifically,
333:, who wrote in 1817 the modern definition of continuity. Later
1661:
2690:
New
Generalized Functions and Multiplication of Distributions
1165:
if the probability of security failure (e.g., inverting a
2707:
Bellare, Mihir (1997). "A Note on
Negligible Functions".
409:{\displaystyle f:\mathbb {R} {\rightarrow }\mathbb {R} }
1678:
2447:
2392:
2332:
2305:
2232:
2205:
2134:
2075:
2040:
2014:
1990:
1936:
1871:
1818:
1767:
1739:
1703:
1640:
1588:
1552:
1495:
1475:
1439:
1386:
1344:
1286:
1266:
1246:
1223:
1203:
1183:
1113:
1087:
1051:
1011:
985:
950:
924:
870:
836:
809:
783:
763:
723:
666:
633:
560:
511:
485:
459:
426:
384:
351:
230:
166:
101:
36:
2627:
2605:Foundations of Cryptography: Volume 1, Basic Tools
2499:
2433:{\displaystyle f(n)={\frac {1}{n^{\frac {1}{n}}}}}
2432:
2370:
2317:
2291:
2217:
2191:
2119:
2052:
2026:
1996:
1976:
1920:
1855:
1802:
1751:
1725:
1646:
1626:
1574:
1531:
1481:
1461:
1422:
1372:
1292:
1272:
1252:
1229:
1209:
1189:
1139:
1099:
1069:
1037:
997:
971:
936:
905:
855:
822:
795:
769:
745:
694:
652:
616:
546:
497:
471:
445:
408:
359:
285:
188:
149:
58:
2560:. Lindell, Yehuda (Second ed.). Boca Raton.
2500:{\displaystyle f(n)={\frac {1}{x^{n(\log {n})}}}}
746:{\displaystyle \mu :\mathbb {R} \to \mathbb {R} }
189:{\displaystyle \mu :\mathbb {N} \to \mathbb {R} }
59:{\displaystyle \mu :\mathbb {N} \to \mathbb {R} }
1373:{\displaystyle f,g:\mathbb {N} \to \mathbb {R} }
617:{\displaystyle |f(x)-f(x_{0})|<\varepsilon .}
150:{\displaystyle |\mu (x)|<{\frac {1}{x^{c}}}.}
2532:Gromov's theorem on groups of polynomial growth
1575:{\displaystyle f:\mathbb {N} \to \mathbb {R} }
1462:{\displaystyle f:\mathbb {N} \to \mathbb {R} }
8:
906:{\displaystyle |\mu (x)|<\varepsilon \,.}
2658:(1993). "Section 12.1: One-way functions".
2292:{\displaystyle f(n)=1/x^{({\log {n})}^{k}}}
2588:: CS1 maint: location missing publisher (
1489:is any real polynomial, then the function
1171:cryptographically strong pseudorandom bits
1140:{\displaystyle 1/\operatorname {poly} (x)}
1038:{\displaystyle 1/\operatorname {poly} (x)}
2720:
2692:. Mathematics Studies 84, North Holland.
2666:(1st ed.). Addison Wesley. pp.
2634:Introduction to the Theory of Computation
2485:
2472:
2463:
2446:
2417:
2408:
2391:
2360:
2351:
2331:
2304:
2281:
2272:
2265:
2260:
2251:
2231:
2204:
2192:{\displaystyle f(n)=1/x^{\log {(n^{k})}}}
2177:
2169:
2162:
2153:
2133:
2107:
2103:
2094:
2074:
2039:
2013:
1989:
1956:
1935:
1903:
1870:
1838:
1817:
1791:
1787:
1766:
1738:
1714:
1702:
1639:
1607:
1587:
1568:
1567:
1560:
1559:
1551:
1494:
1474:
1455:
1454:
1447:
1446:
1438:
1385:
1366:
1365:
1358:
1357:
1343:
1285:
1265:
1245:
1222:
1202:
1182:
1117:
1112:
1086:
1050:
1015:
1010:
984:
963:
954:
949:
923:
899:
888:
871:
869:
847:
835:
814:
808:
782:
762:
739:
738:
731:
730:
722:
677:
665:
638:
632:
600:
591:
561:
559:
533:
527:
512:
510:
484:
458:
437:
425:
402:
401:
396:
392:
391:
383:
353:
352:
350:
313:" became important in mathematics during
256:
248:
231:
229:
182:
181:
174:
173:
165:
136:
127:
119:
102:
100:
52:
51:
44:
43:
35:
1318:In practice one might want to have more
1070:{\displaystyle \operatorname {poly} (x)}
2548:
1921:{\displaystyle f(n)=(\log n)^{-\log n}}
1532:{\displaystyle x\mapsto p(x)\cdot f(x)}
1312:
2581:
1803:{\displaystyle f(n)=3^{-{\sqrt {n}}}}
856:{\displaystyle x>N_{\varepsilon }}
66:such that for every positive integer
7:
2371:{\displaystyle f(n)=1/x^{\sqrt {n}}}
547:{\displaystyle |x-x_{0}|<\delta }
211: > 0 such that for all
2629:"Section 10.6.3: One-way functions"
2558:Introduction to modern cryptography
2556:Katz, Johnathan (6 November 2014).
1582:is not negligible, then neither is
2047:
1627:{\displaystyle x\mapsto f(x)/p(x)}
1423:{\displaystyle x\mapsto f(x)+g(x)}
1380:are negligible, then the function
647:
14:
1977:{\displaystyle f(n)=2^{-c\log n}}
1100:{\displaystyle \varepsilon >0}
937:{\displaystyle \varepsilon >0}
796:{\displaystyle \varepsilon >0}
702:, we must define the concept of "
479:, there exists a positive number
472:{\displaystyle \varepsilon >0}
1984:is not negligible, for positive
1856:{\displaystyle f(n)=n^{-\log n}}
1665:
823:{\displaystyle N_{\varepsilon }}
204:poly(·) there exists an integer
1726:{\displaystyle n\mapsto a^{-n}}
777:goes to infinity) if for every
2608:. Cambridge University Press.
2490:
2476:
2457:
2451:
2402:
2396:
2342:
2336:
2277:
2261:
2242:
2236:
2183:
2170:
2144:
2138:
2120:{\displaystyle f(n)=1/x^{n/2}}
2085:
2079:
2044:
1946:
1940:
1900:
1887:
1881:
1875:
1828:
1822:
1777:
1771:
1707:
1621:
1615:
1604:
1598:
1592:
1564:
1526:
1520:
1511:
1505:
1499:
1451:
1417:
1411:
1402:
1396:
1390:
1362:
1134:
1128:
1064:
1058:
1032:
1026:
889:
885:
879:
872:
735:
683:
670:
601:
597:
584:
575:
569:
562:
534:
513:
397:
274:
268:
249:
245:
239:
232:
178:
120:
116:
110:
103:
48:
1:
653:{\displaystyle x_{0}=\infty }
2053:{\displaystyle n\to \infty }
498:{\displaystyle \delta >0}
360:{\displaystyle \mathbb {R} }
2636:. PWS Publishing. pp.
1197:= cryptographic key length
1173:from truly random bits) is
1155:In complexity-based modern
2761:
1237:must be a natural number.
695:{\displaystyle f(x_{0})=0}
15:
1305:computational boundedness
2686:Colombeau, Jean François
2662:Computational Complexity
2602:Goldreich, Oded (2001).
1634:for any real polynomial
70:there exists an integer
16:For a similar term, see
2656:Papadimitriou, Christos
2318:{\displaystyle k\geq 1}
2218:{\displaystyle k\geq 1}
2034:, we take the limit as
1752:{\displaystyle a\geq 2}
1159:, a security scheme is
972:{\displaystyle 1/x^{c}}
446:{\displaystyle x=x_{0}}
2501:
2434:
2372:
2319:
2293:
2219:
2193:
2121:
2054:
2028:
2027:{\displaystyle n>0}
1998:
1978:
1922:
1857:
1804:
1753:
1733:is negligible for any
1727:
1648:
1628:
1576:
1533:
1483:
1463:
1424:
1374:
1294:
1274:
1254:
1231:
1211:
1191:
1177:in terms of the input
1141:
1101:
1071:
1039:
999:
998:{\displaystyle c>0}
973:
938:
907:
857:
824:
797:
771:
747:
717:A continuous function
704:infinitesimal function
696:
654:
618:
548:
499:
473:
447:
410:
361:
287:
190:
151:
60:
2740:Mathematical analysis
2709:Journal of Cryptology
2537:Non-standard calculus
2502:
2435:
2373:
2320:
2294:
2220:
2194:
2122:
2055:
2029:
1999:
1979:
1923:
1858:
1805:
1754:
1728:
1649:
1629:
1577:
1534:
1484:
1464:
1425:
1375:
1295:
1275:
1255:
1232:
1212:
1192:
1142:
1102:
1072:
1040:
1000:
974:
939:
908:
858:
825:
798:
772:
748:
697:
655:
619:
549:
500:
474:
448:
411:
362:
327:mathematical analysis
288:
191:
152:
61:
2445:
2390:
2330:
2303:
2230:
2203:
2132:
2073:
2038:
2012:
1988:
1934:
1869:
1816:
1765:
1737:
1701:
1638:
1586:
1550:
1493:
1473:
1437:
1384:
1342:
1332:complexity-theoretic
1284:
1264:
1244:
1221:
1201:
1181:
1111:
1107:can be expressed as
1085:
1049:
1009:
983:
948:
922:
868:
834:
807:
781:
761:
721:
664:
631:
558:
509:
483:
457:
424:
382:
349:
228:
164:
99:
34:
2527:Nonstandard numbers
1313:#Closure properties
1151:Use in cryptography
374:Continuous function
202:positive polynomial
25:negligible function
2745:Types of functions
2497:
2430:
2368:
2315:
2289:
2215:
2189:
2117:
2050:
2024:
1994:
1974:
1918:
1853:
1800:
1749:
1723:
1677:. You can help by
1644:
1624:
1572:
1529:
1479:
1469:is negligible and
1459:
1420:
1370:
1326:Closure properties
1290:
1270:
1260:is the key length
1250:
1227:
1207:
1187:
1137:
1097:
1067:
1035:
995:
969:
934:
903:
853:
830:such that for all
820:
793:
767:
743:
692:
650:
614:
544:
495:
469:
443:
406:
357:
283:
186:
147:
79:such that for all
56:
23:In mathematics, a
2522:Colombeau algebra
2495:
2428:
2425:
2365:
1997:{\displaystyle c}
1796:
1695:
1694:
1647:{\displaystyle p}
1482:{\displaystyle p}
1293:{\displaystyle x}
1273:{\displaystyle n}
1253:{\displaystyle x}
1230:{\displaystyle n}
1210:{\displaystyle n}
1190:{\displaystyle x}
1169:, distinguishing
944:by the functions
918:Next, we replace
770:{\displaystyle x}
278:
142:
2752:
2726:
2724:
2703:
2681:
2665:
2651:
2631:
2619:
2594:
2593:
2587:
2579:
2553:
2506:
2504:
2503:
2498:
2496:
2494:
2493:
2489:
2464:
2439:
2437:
2436:
2431:
2429:
2427:
2426:
2418:
2409:
2377:
2375:
2374:
2369:
2367:
2366:
2361:
2355:
2324:
2322:
2321:
2316:
2298:
2296:
2295:
2290:
2288:
2287:
2286:
2285:
2280:
2276:
2255:
2224:
2222:
2221:
2216:
2198:
2196:
2195:
2190:
2188:
2187:
2186:
2182:
2181:
2157:
2126:
2124:
2123:
2118:
2116:
2115:
2111:
2098:
2059:
2057:
2056:
2051:
2033:
2031:
2030:
2025:
2003:
2001:
2000:
1995:
1983:
1981:
1980:
1975:
1973:
1972:
1927:
1925:
1924:
1919:
1917:
1916:
1862:
1860:
1859:
1854:
1852:
1851:
1809:
1807:
1806:
1801:
1799:
1798:
1797:
1792:
1758:
1756:
1755:
1750:
1732:
1730:
1729:
1724:
1722:
1721:
1690:
1687:
1669:
1662:
1653:
1651:
1650:
1645:
1633:
1631:
1630:
1625:
1611:
1581:
1579:
1578:
1573:
1571:
1563:
1538:
1536:
1535:
1530:
1488:
1486:
1485:
1480:
1468:
1466:
1465:
1460:
1458:
1450:
1429:
1427:
1426:
1421:
1379:
1377:
1376:
1371:
1369:
1361:
1299:
1297:
1296:
1291:
1279:
1277:
1276:
1271:
1259:
1257:
1256:
1251:
1236:
1234:
1233:
1228:
1216:
1214:
1213:
1208:
1196:
1194:
1193:
1188:
1167:one-way function
1146:
1144:
1143:
1138:
1121:
1106:
1104:
1103:
1098:
1076:
1074:
1073:
1068:
1044:
1042:
1041:
1036:
1019:
1004:
1002:
1001:
996:
978:
976:
975:
970:
968:
967:
958:
943:
941:
940:
935:
912:
910:
909:
904:
892:
875:
862:
860:
859:
854:
852:
851:
829:
827:
826:
821:
819:
818:
802:
800:
799:
794:
776:
774:
773:
768:
752:
750:
749:
744:
742:
734:
701:
699:
698:
693:
682:
681:
659:
657:
656:
651:
643:
642:
623:
621:
620:
615:
604:
596:
595:
565:
553:
551:
550:
545:
537:
532:
531:
516:
504:
502:
501:
496:
478:
476:
475:
470:
452:
450:
449:
444:
442:
441:
415:
413:
412:
407:
405:
400:
395:
366:
364:
363:
358:
356:
292:
290:
289:
284:
279:
277:
257:
252:
235:
215: >
195:
193:
192:
187:
185:
177:
156:
154:
153:
148:
143:
141:
140:
128:
123:
106:
83: >
65:
63:
62:
57:
55:
47:
2760:
2759:
2755:
2754:
2753:
2751:
2750:
2749:
2730:
2729:
2706:
2700:
2684:
2678:
2654:
2648:
2624:Sipser, Michael
2622:
2616:
2601:
2598:
2597:
2580:
2568:
2555:
2554:
2550:
2545:
2513:
2468:
2443:
2442:
2413:
2388:
2387:
2382:Non-negligible:
2356:
2328:
2327:
2301:
2300:
2264:
2256:
2228:
2227:
2201:
2200:
2173:
2158:
2130:
2129:
2099:
2071:
2070:
2036:
2035:
2010:
2009:
1986:
1985:
1952:
1932:
1931:
1899:
1867:
1866:
1834:
1814:
1813:
1783:
1763:
1762:
1735:
1734:
1710:
1699:
1698:
1691:
1685:
1682:
1675:needs expansion
1660:
1636:
1635:
1584:
1583:
1548:
1547:
1491:
1490:
1471:
1470:
1435:
1434:
1382:
1381:
1340:
1339:
1328:
1282:
1281:
1262:
1261:
1242:
1241:
1219:
1218:
1199:
1198:
1179:
1178:
1162:provably secure
1153:
1109:
1108:
1083:
1082:
1047:
1046:
1007:
1006:
981:
980:
959:
946:
945:
920:
919:
866:
865:
843:
832:
831:
810:
805:
804:
779:
778:
759:
758:
719:
718:
673:
662:
661:
634:
629:
628:
587:
556:
555:
523:
507:
506:
481:
480:
455:
454:
433:
422:
421:
380:
379:
347:
346:
331:Bernard Bolzano
301:The concept of
299:
261:
226:
225:
221:
210:
200:, if for every
162:
161:
132:
97:
96:
91:
78:
32:
31:
21:
12:
11:
5:
2758:
2756:
2748:
2747:
2742:
2732:
2731:
2728:
2727:
2722:10.1.1.43.7900
2704:
2698:
2682:
2676:
2652:
2646:
2620:
2614:
2596:
2595:
2566:
2547:
2546:
2544:
2541:
2540:
2539:
2534:
2529:
2524:
2519:
2517:Negligible set
2512:
2509:
2508:
2507:
2492:
2488:
2484:
2481:
2478:
2475:
2471:
2467:
2462:
2459:
2456:
2453:
2450:
2440:
2424:
2421:
2416:
2412:
2407:
2404:
2401:
2398:
2395:
2379:
2378:
2364:
2359:
2354:
2350:
2347:
2344:
2341:
2338:
2335:
2325:
2314:
2311:
2308:
2284:
2279:
2275:
2271:
2268:
2263:
2259:
2254:
2250:
2247:
2244:
2241:
2238:
2235:
2225:
2214:
2211:
2208:
2185:
2180:
2176:
2172:
2168:
2165:
2161:
2156:
2152:
2149:
2146:
2143:
2140:
2137:
2127:
2114:
2110:
2106:
2102:
2097:
2093:
2090:
2087:
2084:
2081:
2078:
2049:
2046:
2043:
2023:
2020:
2017:
2006:
2005:
1993:
1971:
1968:
1965:
1962:
1959:
1955:
1951:
1948:
1945:
1942:
1939:
1929:
1928:is negligible.
1915:
1912:
1909:
1906:
1902:
1898:
1895:
1892:
1889:
1886:
1883:
1880:
1877:
1874:
1864:
1863:is negligible.
1850:
1847:
1844:
1841:
1837:
1833:
1830:
1827:
1824:
1821:
1811:
1810:is negligible.
1795:
1790:
1786:
1782:
1779:
1776:
1773:
1770:
1760:
1748:
1745:
1742:
1720:
1717:
1713:
1709:
1706:
1693:
1692:
1672:
1670:
1659:
1656:
1643:
1623:
1620:
1617:
1614:
1610:
1606:
1603:
1600:
1597:
1594:
1591:
1570:
1566:
1562:
1558:
1555:
1541:
1540:
1539:is negligible.
1528:
1525:
1522:
1519:
1516:
1513:
1510:
1507:
1504:
1501:
1498:
1478:
1457:
1453:
1449:
1445:
1442:
1431:
1430:is negligible.
1419:
1416:
1413:
1410:
1407:
1404:
1401:
1398:
1395:
1392:
1389:
1368:
1364:
1360:
1356:
1353:
1350:
1347:
1327:
1324:
1289:
1269:
1249:
1226:
1206:
1186:
1152:
1149:
1136:
1133:
1130:
1127:
1124:
1120:
1116:
1096:
1093:
1090:
1077:is a positive
1066:
1063:
1060:
1057:
1054:
1034:
1031:
1028:
1025:
1022:
1018:
1014:
994:
991:
988:
966:
962:
957:
953:
933:
930:
927:
916:
915:
914:
913:
902:
898:
895:
891:
887:
884:
881:
878:
874:
850:
846:
842:
839:
817:
813:
792:
789:
786:
766:
741:
737:
733:
729:
726:
691:
688:
685:
680:
676:
672:
669:
649:
646:
641:
637:
625:
624:
613:
610:
607:
603:
599:
594:
590:
586:
583:
580:
577:
574:
571:
568:
564:
543:
540:
536:
530:
526:
522:
519:
515:
494:
491:
488:
468:
465:
462:
440:
436:
432:
429:
404:
399:
394:
390:
387:
355:
298:
295:
294:
293:
282:
276:
273:
270:
267:
264:
260:
255:
251:
247:
244:
241:
238:
234:
219:
208:
184:
180:
176:
172:
169:
158:
157:
146:
139:
135:
131:
126:
122:
118:
115:
112:
109:
105:
87:
74:
54:
50:
46:
42:
39:
18:negligible set
13:
10:
9:
6:
4:
3:
2:
2757:
2746:
2743:
2741:
2738:
2737:
2735:
2723:
2718:
2714:
2710:
2705:
2701:
2699:0-444-86830-5
2695:
2691:
2687:
2683:
2679:
2677:0-201-53082-1
2673:
2669:
2664:
2663:
2657:
2653:
2649:
2647:0-534-94728-X
2643:
2639:
2635:
2630:
2625:
2621:
2617:
2615:0-521-79172-3
2611:
2607:
2606:
2600:
2599:
2591:
2585:
2577:
2573:
2569:
2567:9781466570269
2563:
2559:
2552:
2549:
2542:
2538:
2535:
2533:
2530:
2528:
2525:
2523:
2520:
2518:
2515:
2514:
2510:
2486:
2482:
2479:
2473:
2469:
2465:
2460:
2454:
2448:
2441:
2422:
2419:
2414:
2410:
2405:
2399:
2393:
2386:
2385:
2384:
2383:
2362:
2357:
2352:
2348:
2345:
2339:
2333:
2326:
2312:
2309:
2306:
2282:
2273:
2269:
2266:
2257:
2252:
2248:
2245:
2239:
2233:
2226:
2212:
2209:
2206:
2178:
2174:
2166:
2163:
2159:
2154:
2150:
2147:
2141:
2135:
2128:
2112:
2108:
2104:
2100:
2095:
2091:
2088:
2082:
2076:
2069:
2068:
2067:
2065:
2061:
2041:
2021:
2018:
2015:
1991:
1969:
1966:
1963:
1960:
1957:
1953:
1949:
1943:
1937:
1930:
1913:
1910:
1907:
1904:
1896:
1893:
1890:
1884:
1878:
1872:
1865:
1848:
1845:
1842:
1839:
1835:
1831:
1825:
1819:
1812:
1793:
1788:
1784:
1780:
1774:
1768:
1761:
1746:
1743:
1740:
1718:
1715:
1711:
1704:
1697:
1696:
1689:
1680:
1676:
1673:This section
1671:
1668:
1664:
1663:
1657:
1655:
1641:
1618:
1612:
1608:
1601:
1595:
1589:
1556:
1553:
1545:
1523:
1517:
1514:
1508:
1502:
1496:
1476:
1443:
1440:
1432:
1414:
1408:
1405:
1399:
1393:
1387:
1354:
1351:
1348:
1345:
1337:
1336:
1335:
1333:
1325:
1323:
1321:
1316:
1314:
1311:setting (see
1310:
1306:
1301:
1287:
1267:
1247:
1238:
1224:
1204:
1184:
1176:
1172:
1168:
1164:
1163:
1158:
1150:
1148:
1131:
1125:
1122:
1118:
1114:
1094:
1091:
1088:
1080:
1061:
1055:
1052:
1029:
1023:
1020:
1016:
1012:
992:
989:
986:
964:
960:
955:
951:
931:
928:
925:
900:
896:
893:
882:
876:
864:
863:
848:
844:
840:
837:
815:
811:
803:there exists
790:
787:
784:
764:
756:
755:infinitesimal
727:
724:
716:
714:
713:Infinitesimal
709:
708:
707:
705:
689:
686:
678:
674:
667:
644:
639:
635:
611:
608:
605:
592:
588:
581:
578:
572:
566:
541:
538:
528:
524:
520:
517:
492:
489:
486:
466:
463:
460:
453:if for every
438:
434:
430:
427:
419:
388:
385:
377:
375:
370:
369:
368:
344:
340:
336:
332:
328:
324:
320:
316:
312:
311:infinitesimal
308:
304:
303:negligibility
296:
280:
271:
265:
262:
258:
253:
242:
236:
224:
223:
222:
218:
214:
207:
203:
199:
170:
167:
144:
137:
133:
129:
124:
113:
107:
95:
94:
93:
90:
86:
82:
77:
73:
69:
40:
37:
30:
26:
19:
2712:
2708:
2689:
2661:
2633:
2604:
2557:
2551:
2381:
2380:
2063:
2062:
2007:
1683:
1679:adding to it
1674:
1542:
1329:
1317:
1302:
1239:
1174:
1160:
1157:cryptography
1154:
917:
754:
710:
703:
626:
417:
371:
322:
302:
300:
216:
212:
205:
197:
159:
88:
84:
80:
75:
71:
67:
24:
22:
1280:. Indeed,
378:A function
339:Weierstrass
329:was due to
2734:Categories
2543:References
2064:Negligible
1686:March 2018
1544:Conversely
1309:asymptotic
1175:negligible
1079:polynomial
505:such that
418:continuous
323:continuity
307:continuity
198:negligible
2717:CiteSeerX
2584:cite book
2576:893721520
2483:
2310:≥
2270:
2210:≥
2167:
2048:∞
2045:→
1967:
1958:−
1911:
1905:−
1894:
1846:
1840:−
1789:−
1744:≥
1716:−
1708:↦
1593:↦
1565:→
1515:⋅
1500:↦
1452:→
1391:↦
1363:→
1126:
1089:ε
1056:
1024:
926:ε
897:ε
877:μ
849:ε
816:ε
785:ε
736:→
725:μ
648:∞
609:ε
579:−
542:δ
521:−
487:δ
461:ε
398:→
266:
237:μ
179:→
168:μ
108:μ
49:→
38:μ
2688:(1984).
2626:(1997).
2511:See also
1658:Examples
1320:concrete
554:implies
29:function
2638:374–376
2008:Assume
319:Leibniz
309:" and "
297:History
2719:
2696:
2674:
2670:–298.
2644:
2612:
2574:
2564:
1045:where
1005:or by
979:where
335:Cauchy
315:Newton
1546:, if
660:with
343:Heine
27:is a
2694:ISBN
2672:ISBN
2642:ISBN
2610:ISBN
2590:link
2572:OCLC
2562:ISBN
2299:for
2199:for
2019:>
1123:poly
1092:>
1053:poly
1021:poly
990:>
929:>
894:<
841:>
788:>
757:(as
606:<
539:<
490:>
464:>
341:and
317:and
263:poly
254:<
220:poly
209:poly
125:<
2668:279
2480:log
2267:log
2164:log
1964:log
1908:log
1891:log
1843:log
1681:.
1433:If
1338:If
753:is
706:":
420:at
416:is
367:):
325:in
196:is
2736::
2713:15
2711:.
2640:.
2632:.
2586:}}
2582:{{
2570:.
2066::
2060::
1654:.
337:,
92:,
2725:.
2702:.
2680:.
2650:.
2618:.
2592:)
2578:.
2491:)
2487:n
2477:(
2474:n
2470:x
2466:1
2461:=
2458:)
2455:n
2452:(
2449:f
2423:n
2420:1
2415:n
2411:1
2406:=
2403:)
2400:n
2397:(
2394:f
2363:n
2358:x
2353:/
2349:1
2346:=
2343:)
2340:n
2337:(
2334:f
2313:1
2307:k
2283:k
2278:)
2274:n
2262:(
2258:x
2253:/
2249:1
2246:=
2243:)
2240:n
2237:(
2234:f
2213:1
2207:k
2184:)
2179:k
2175:n
2171:(
2160:x
2155:/
2151:1
2148:=
2145:)
2142:n
2139:(
2136:f
2113:2
2109:/
2105:n
2101:x
2096:/
2092:1
2089:=
2086:)
2083:n
2080:(
2077:f
2042:n
2022:0
2016:n
2004:.
1992:c
1970:n
1961:c
1954:2
1950:=
1947:)
1944:n
1941:(
1938:f
1914:n
1901:)
1897:n
1888:(
1885:=
1882:)
1879:n
1876:(
1873:f
1849:n
1836:n
1832:=
1829:)
1826:n
1823:(
1820:f
1794:n
1785:3
1781:=
1778:)
1775:n
1772:(
1769:f
1759:.
1747:2
1741:a
1719:n
1712:a
1705:n
1688:)
1684:(
1642:p
1622:)
1619:x
1616:(
1613:p
1609:/
1605:)
1602:x
1599:(
1596:f
1590:x
1569:R
1561:N
1557::
1554:f
1527:)
1524:x
1521:(
1518:f
1512:)
1509:x
1506:(
1503:p
1497:x
1477:p
1456:R
1448:N
1444::
1441:f
1418:)
1415:x
1412:(
1409:g
1406:+
1403:)
1400:x
1397:(
1394:f
1388:x
1367:R
1359:N
1355::
1352:g
1349:,
1346:f
1288:x
1268:n
1248:x
1225:n
1205:n
1185:x
1135:)
1132:x
1129:(
1119:/
1115:1
1095:0
1065:)
1062:x
1059:(
1033:)
1030:x
1027:(
1017:/
1013:1
993:0
987:c
965:c
961:x
956:/
952:1
932:0
901:.
890:|
886:)
883:x
880:(
873:|
845:N
838:x
812:N
791:0
765:x
740:R
732:R
728::
715:)
711:(
690:0
687:=
684:)
679:0
675:x
671:(
668:f
645:=
640:0
636:x
612:.
602:|
598:)
593:0
589:x
585:(
582:f
576:)
573:x
570:(
567:f
563:|
535:|
529:0
525:x
518:x
514:|
493:0
467:0
439:0
435:x
431:=
428:x
403:R
393:R
389::
386:f
376:)
372:(
354:R
281:.
275:)
272:x
269:(
259:1
250:|
246:)
243:x
240:(
233:|
217:N
213:x
206:N
183:R
175:N
171::
145:.
138:c
134:x
130:1
121:|
117:)
114:x
111:(
104:|
89:c
85:N
81:x
76:c
72:N
68:c
53:R
45:N
41::
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.