-
1
-
-
84990678058
-
Simple constructions of almost κ-wise independent random variables
-
Addendum: 4 (1993), pp. 119-120
-
N. ALON, O. GOLDREICH, J. HÅSTAD, AND R. PERALTA, Simple constructions of almost κ-wise independent random variables, Random Structures Algorithms, 3 (1992), pp. 289-304. (Addendum: 4 (1993), pp. 119-120.)
-
(1992)
Random Structures Algorithms
, vol.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
3
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
ACM, New York
-
J. BAR-ILAN AND D. BEAVER, Non-cryptographic fault-tolerant computing in a constant number of rounds, in Proc. of 8th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1989, pp. 201-209.
-
(1989)
Proc. of 8th Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
4
-
-
0003619771
-
Perfect Privacy for Two-Party Protocols
-
Harvard University, Cambridge, MA
-
D. BEAVER, Perfect Privacy for Two-Party Protocols, Technical Report TR-11-89, Harvard University, Cambridge, MA, 1989.
-
(1989)
Technical Report TR-11-89
-
-
Beaver, D.1
-
5
-
-
0025535128
-
Randomness in interactive proofs
-
IEEE Computer Society Press, Los Alamitos, CA
-
M. BELLARE, O. GOLDREICH, AND S. GOLDWASSER, Randomness in interactive proofs, in Proc. of 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 563-571.
-
(1990)
Proc. of 31st Annual IEEE Symposium on Foundations of Computer Science
, pp. 563-571
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, New York
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proc. of 20th Annual ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 1-10.
-
(1988)
Proc. of 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Comput., 13 (1984), pp. 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
8
-
-
84948947435
-
On the dealer's randomness required in secret sharing schemes
-
Proc. of EuroCrypt94, Springer-Verlag, New York
-
C. BLUNDO, A. GIORGIO GAGGIA, AND D. R. STINSON, On the dealer's randomness required in secret sharing schemes, in Proc. of EuroCrypt94, Lecture Notes in Comput. Sci. 950, 1995, Springer-Verlag, New York, pp. 35-46.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.950
, pp. 35-46
-
-
Blundo, C.1
Giorgio Gaggia, A.2
Stinson, D.R.3
-
9
-
-
85027395928
-
Randomness in distribution protocols
-
Proc. of 21st International Colloquium on Automata, Languages and Programming, Springer-Verlag, New York
-
C. BLUNDO, A. DE-SANTIS, AND U. VACCARO, Randomness in distribution protocols, in Proc. of 21st International Colloquium on Automata, Languages and Programming, Lecture Notes in Comput. Sci. 820, 1994, Springer-Verlag, New York, pp. 568-579.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.820
, pp. 568-579
-
-
Blundo, C.1
De-Santis, A.2
Vaccaro, U.3
-
10
-
-
84958034013
-
On the number of random bits in totally private computations
-
Proc. of 22nd International Colloquium on Automata, Languages and Programming, Springer-Verlag, New York
-
C. BLUNDO, A. DE-SANTIS, G. PERSIANO, AND U. VACCARO, On the number of random bits in totally private computations, in Proc. of 22nd International Colloquium on Automata, Languages and Programming, Lecture Notes in Comput. Sci. 944, Springer-Verlag, New York, 1995, pp. 171-182.
-
(1995)
Lecture Notes in Comput. Sci.
, vol.944
, pp. 171-182
-
-
Blundo, C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
11
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM, New York
-
R. CANETTI, U. FEIGE, O. GOLDREICH, AND M. NAOR, Adaptively secure multi-party computation, in Proc. of 28th Annual ACM Symposium on Theory of Computing, ACM, New York, 1996, pp. 639-648.
-
(1996)
Proc. of 28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
12
-
-
0040655145
-
Bounds on tradeoffs between randomness and communication complexity
-
R. CANETTI AND O. GOLDREICH, Bounds on tradeoffs between randomness and communication complexity, Comput. Complexity, 3 (1993), pp. 141-167.
-
(1993)
Comput. Complexity
, vol.3
, pp. 141-167
-
-
Canetti, R.1
Goldreich, O.2
-
13
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
D. CHAUM, C. CREPEAU, AND I. DAMGARD, Multiparty unconditionally secure protocols, in Proc. of 20th Annual ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 11-19.
-
(1988)
Proc. of 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
15
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
B. CHOR AND E. KUSHILEVITZ, A communication-privacy tradeoff for modular addition, Inform. Process. Lett., 45 (1993), pp. 205-210.
-
(1993)
Inform. Process. Lett.
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
16
-
-
0029293045
-
Private computations over the integers
-
B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, Private computations over the integers, SIAM J. Comput., 24 (1995), pp. 376-386.
-
(1995)
SIAM J. Comput.
, vol.24
, pp. 376-386
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
17
-
-
0028675686
-
On the structure of the privacy hierarchy
-
B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, On the structure of the privacy hierarchy, J. Cryptology, 7 (1994), pp. 53-60.
-
(1994)
J. Cryptology
, vol.7
, pp. 53-60
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
18
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
19
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
IEEE Computer Society Press, Los Alamitos, CA
-
A. COHEN AND A. WIGDERSON, Dispersers, deterministic amplification, and weak random sources, in Proc. of 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 14-19.
-
(1989)
Proc. of 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
20
-
-
0026985378
-
Communication complexity of secure computation
-
ACM, New York
-
M. FRANKLIN AND M. YUNG, Communication complexity of secure computation, in Proc. of 24th Annual ACM Symposium on Theory of Computing, ACM, New York, 1992, pp. 699-710.
-
(1992)
Proc. of 24th Annual ACM Symposium on Theory of Computing
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
21
-
-
0023545076
-
How to play any mental game
-
ACM, New York
-
O. GOLDREICH, S. MICALI, AND A. WIGDERSON, How to play any mental game, in Proc. of 19th Annual ACM Symposium on Theory of Computing, ACM, New York, 1987, pp. 218-229.
-
(1987)
Proc. of 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0024771884
-
How to recycle random bits
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. IMPAGLIAZZO AND D. ZUCKERMAN, How to recycle random bits, in Proc. of 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 248-253.
-
(1989)
Proc. of 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
23
-
-
0005334452
-
(De)randomized construction of small samples spaces in NC
-
IEEE Computer Society Press, Los Alamitos, CA
-
D. KARGER AND D. KOLLER, (De)randomized construction of small samples spaces in NC, in Proc. of 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1994, pp. 252-263.
-
(1994)
Proc. of 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 252-263
-
-
Karger, D.1
Koller, D.2
-
24
-
-
0028060850
-
Derandomization through approximation: An NC algorithm for minimum cuts
-
ACM, New York
-
D. KARGER AND R. MOTWANI, Derandomization through approximation: An NC algorithm for minimum cuts, in Proc. of 26th Annual ACM Symposium on Theory of Computing, ACM, New York, 1994, pp. 497-506.
-
(1994)
Proc. of 26th Annual ACM Symposium on Theory of Computing
, pp. 497-506
-
-
Karger, D.1
Motwani, R.2
-
25
-
-
0028044344
-
On construction of κ-wise independent random variables
-
ACM, New York
-
H. KARLOFF AND Y. MANSOUR, On construction of κ-wise independent random variables, in Proc. of 26th Annual ACM Symposium on Theory of Computing, ACM, New York, 1994, pp. 564-573.
-
(1994)
Proc. of 26th Annual ACM Symposium on Theory of Computing
, pp. 564-573
-
-
Karloff, H.1
Mansour, Y.2
-
26
-
-
0002918554
-
The complexity of non-uniform random number generation
-
J. Traub, ed., Academic Press, New York
-
D. E. KNUTH AND A. C. YAO, The complexity of non-uniform random number generation, in Algorithms and Complexity, J. Traub, ed., Academic Press, New York, 1976, pp. 357-428.
-
(1976)
Algorithms and Complexity
, pp. 357-428
-
-
Knuth, D.E.1
Yao, A.C.2
-
27
-
-
0000062463
-
Constructing small sample spaces satisfying given constraints
-
D. KOLLER AND N. MEGIDDO, Constructing small sample spaces satisfying given constraints, SIAM J. Discrete Math., 7 (1994), pp. 260-274.
-
(1994)
SIAM J. Discrete Math.
, vol.7
, pp. 260-274
-
-
Koller, D.1
Megiddo, N.2
-
28
-
-
84894203891
-
A time-randomness tradeoff for oblivious routing
-
ACM, New York
-
D. KRIZANC, D. PELEG, AND E. UPFAL, A time-randomness tradeoff for oblivious routing, in Proc. of 20th Annual ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 93-102.
-
(1988)
Proc. of 20th Annual ACM Symposium on Theory of Computing
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
29
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
IEEE Computer Society Press, Los Alamitos, CA
-
E. KUSHILEVITZ, S. MICALI, AND R. OSTROVSKY, Reducibility and completeness in multi-party private computations, in Proc. of 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1994, pp. 478-489.
-
(1994)
Proc. of 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
30
-
-
0029712050
-
Characterizing linear size circuits in terms of privacy
-
ACM, New York
-
E. KUSHILEVITZ, R. OSTROVSKY, AND A. ROSÉN, Characterizing linear size circuits in terms of privacy, in Proc. of 28th Annual ACM Symposium on Theory of Computing, ACM, New York, 1996, pp. 541-550.
-
(1996)
Proc. of 28th Annual ACM Symposium on Theory of Computing
, pp. 541-550
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosén, A.3
-
31
-
-
0002365530
-
Privacy and communication complexity
-
E. KUSHILEVITZ, Privacy and communication complexity, SIAM J. Discrete Math., 5 (1992), pp. 273-284.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, pp. 273-284
-
-
Kushilevitz, E.1
-
32
-
-
0040655150
-
A randomness-rounds tradeoff in private computation, advances in cryptology
-
Proc. of Crypto '94, Y. Desmedt, ed., Springer-Verlag, New York
-
E. KUSHILEVITZ AND A. ROSÉN, A randomness-rounds tradeoff in private computation, advances in cryptology, in Proc. of Crypto '94, Y. Desmedt, ed., Lecture Notes in Comput. Sci. 839, Springer-Verlag, New York, 1994, pp. 397-410; SIAM J. Discrete Math., 11 (1998), to appear.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.839
, pp. 397-410
-
-
Kushilevitz, E.1
Rosén, A.2
-
33
-
-
0040655150
-
-
to appear
-
E. KUSHILEVITZ AND A. ROSÉN, A randomness-rounds tradeoff in private computation, advances in cryptology, in Proc. of Crypto '94, Y. Desmedt, ed., Lecture Notes in Comput. Sci. 839, Springer-Verlag, New York, 1994, pp. 397-410; SIAM J. Discrete Math., 11 (1998), to appear.
-
(1998)
SIAM J. Discrete Math.
, vol.11
-
-
-
34
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. NAOR AND M. NAOR, Small-bias probability spaces: Efficient constructions and applications, SIAM J. Comput., 22 (1993), pp. 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
36
-
-
85029615997
-
Memory vs. randomization in on-line algorithms
-
Proc. of 16th International Colloquium on Automata, Languages and Programming, Springer-Verlag, New York
-
P. RAGHAVAN AND M. SNIR, Memory vs. randomization in on-line algorithms, in Proc. of 16th International Colloquium on Automata, Languages and Programming, Lecture Notes in Comput. Sci. 372, Springer-Verlag, New York, 1989, pp. 687-703.
-
(1989)
Lecture Notes in Comput. Sci.
, vol.372
, pp. 687-703
-
-
Raghavan, P.1
Snir, M.2
-
38
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
IEEE Computer Society Press, Los Alamitos, CA
-
U. VAZIRANI AND V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in Proc. of 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 417-428.
-
(1985)
Proc. of 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
39
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE Computer Society Press, Los Alamitos, CA
-
A. C. YAO, Theory and applications of trapdoor functions, in Proc. of 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 80-91.
-
(1982)
Proc. of 23rd Annual IEEE Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
40
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society Press, Los Alamitos, CA
-
A. C. YAO, How to generate and exchange secrets, in Proc. of 27th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1986, pp. 162-167.
-
(1986)
Proc. of 27th Annual IEEE Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
-
41
-
-
0026372370
-
Simulating BPP using a general weak random source
-
IEEE Computer Society Press, Los Alamitos, CA
-
D. ZUCKERMAN, Simulating BPP using a general weak random source, in Proc. of 32nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1991, pp. 79-89.
-
(1991)
Proc. of 32nd Annual IEEE Symposium on Foundations of Computer Science
, pp. 79-89
-
-
Zuckerman, D.1
|