-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
IEEE Computer Society Press, Los Alamitos, CA
-
N. ALON, O. GOLDREICH, J. HÅSTAD, AND R. PERALTA, Simple constructions of almost k-wise independent random variables, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 544-553; also in Random Structures Algorithms, 3 (1992), pp. 289-304; also see addendum in 4 (1993), pp. 119-120.
-
(1990)
Proc. 31st Annual IEEE Symposium on Foundations of Computer Science
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
2
-
-
84990678058
-
-
also see addendum in 4 (1993), pp. 119-120
-
N. ALON, O. GOLDREICH, J. HÅSTAD, AND R. PERALTA, Simple constructions of almost k-wise independent random variables, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 544-553; also in Random Structures Algorithms, 3 (1992), pp. 289-304; also see addendum in 4 (1993), pp. 119-120.
-
(1992)
Random Structures Algorithms
, vol.3
, pp. 289-304
-
-
-
3
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
ACM, New York
-
J. BAR-ILAN AND D. BEAVER, Non-cryptographic fault-tolerant computing in a constant number of rounds, in Proc. 8th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1989, pp. 201-209.
-
(1989)
Proc. 8th Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
5
-
-
84979502594
-
Security with low communication overhead
-
Advances in Cryptology, Lecture Notes in Computer Science 537, Springer-Verlag, New York
-
D. BEAVER, J. FEIGENBAUM, J. KILIAN, AND P. ROGAWAY, Security with low communication overhead, in Advances in Cryptology, Proc. Crypto '90, Lecture Notes in Computer Science 537, Springer-Verlag, New York, 1991, pp. 62-76.
-
(1991)
Proc. Crypto '90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
6
-
-
0025535128
-
Randomness in interactive proofs
-
IEEE Computer Society Press, Los Alamitos, CA
-
M. BELLARE, O. GOLDREICH, AND S. GOLDWASSER, Randomness in interactive proofs, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 563-571.
-
(1990)
Proc. 31st Annual IEEE Symposium on Foundations of Computer Science
, pp. 563-571
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
7
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM, New York
-
M. BEN-OR, S. GOLDWASSER, AND A. WIGDERSON, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proc. 20th Annual ACM Symposium on the Theory of Computing, ACM, New York, 1988, pp. 1-10.
-
(1988)
Proc. 20th Annual ACM Symposium on the Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0020248370
-
How to generate cryptographically strong sequences of pseudo-random bits
-
IEEE Computer Society Press, Los Alamitos, CA
-
M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, in Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 112-117; also in SIAM J. Comput., 13 (1984), pp. 850-864.
-
(1982)
Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science
, pp. 112-117
-
-
Blum, M.1
Micali, S.2
-
9
-
-
0021522644
-
-
M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, in Proc. 22nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 112-117; also in SIAM J. Comput., 13 (1984), pp. 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
-
10
-
-
84948947435
-
On the dealer's randomness required in secret sharing schemes
-
Lecture Notes in Computer Science 950, Springer-Verlag, New York
-
C. BLUNDO, A. GIORGIO GAGGIA, AND D. R. STINSON, On the dealer's randomness required in secret sharing schemes, in Proc. EuroCrypt94, Lecture Notes in Computer Science 950, Springer-Verlag, New York, 1995, pp. 35-46.
-
(1995)
Proc. EuroCrypt94
, pp. 35-46
-
-
Blundo, C.1
Giorgio Gaggia, A.2
Stinson, D.R.3
-
11
-
-
85027395928
-
Randomness in distribution protocols
-
Lecture Notes in Computer Science 820, Springer-Verlag, New York
-
C. BLUNDO, A. DE-SANTIS, AND U. VACCARO, Randomness in distribution protocols, in Proc. 21st Annual Intl. Collegium on Automata, Languages, and Programming, Lecture Notes in Computer Science 820, Springer-Verlag, New York, 1994, pp. 568-579.
-
(1994)
Proc. 21st Annual Intl. Collegium on Automata, Languages, and Programming
, pp. 568-579
-
-
Blundo, C.1
De-Santis, A.2
Vaccaro, U.3
-
12
-
-
84958034013
-
On the number of random bits in totally private computations
-
Lecture Notes in Computer Science 944, Springer-Verlag, New York
-
C. BLUNDO, A. DE-SANTIS, G. PERSIANO, AND U. VACCARO, On the number of random bits in totally private computations, in Proc. 22nd Annual Intl. Collegium on Automata, Languages, and Programming, Lecture Notes in Computer Science 944, Springer-Verlag, New York, 1995, pp. 171-182.
-
(1995)
Proc. 22nd Annual Intl. Collegium on Automata, Languages, and Programming
, pp. 171-182
-
-
Blundo, C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
13
-
-
11744322555
-
Bounds on tradeoffs between randomness and communication complexity
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. CANETTI AND O. GOLDREICH, Bounds on tradeoffs between randomness and communication complexity, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 35-44; also in Comput. Complexity, 3 (1993), pp. 141-167.
-
(1990)
Proc. 31st Annual IEEE Symposium on Foundations of Computer Science
, pp. 35-44
-
-
Canetti, R.1
Goldreich, O.2
-
14
-
-
0040655145
-
-
R. CANETTI AND O. GOLDREICH, Bounds on tradeoffs between randomness and communication complexity, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 35-44; also in Comput. Complexity, 3 (1993), pp. 141-167.
-
(1993)
Comput. Complexity
, vol.3
, pp. 141-167
-
-
-
15
-
-
0030652586
-
Randomness vs. faulttolerance
-
ACM, New York
-
R. CANETTI, E. KUSHILEVITZ, R. OSTROVSKY, AND A. ROSEN, Randomness vs. faulttolerance, in Proc. 16th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1997, pp.
-
(1997)
Proc. 16th Annual ACM Symposium on Principles of Distributed Computing
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
16
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
ACM, New York
-
D. CHAUM, C. CREPEAU, AND I. DAMGARD, Multiparty unconditionally secure protocols, in Proc. 20th Annual ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 11-19.
-
(1988)
Proc. 20th Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
17
-
-
0024860209
-
A zero-one law for boolean privacy
-
ACM, New York
-
B. CHOR AND E. KUSHILEVITZ, A zero-one law for boolean privacy, in Proc. 21st Annual ACM Symposium on Theory of Computing, ACM, New York, 1989, pp. 62-72; also in SIAM J. Discrete Math., 4 (1991), pp. 36-47.
-
(1989)
Proc. 21st Annual ACM Symposium on Theory of Computing
, pp. 62-72
-
-
Chor, B.1
Kushilevitz, E.2
-
18
-
-
0024860209
-
-
B. CHOR AND E. KUSHILEVITZ, A zero-one law for boolean privacy, in Proc. 21st Annual ACM Symposium on Theory of Computing, ACM, New York, 1989, pp. 62-72; also in SIAM J. Discrete Math., 4 (1991), pp. 36-47.
-
(1991)
SIAM J. Discrete Math.
, vol.4
, pp. 36-47
-
-
-
19
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
B. CHOR AND E. KUSHILEVITZ, A communication-privacy tradeoff for modular addition, Inform. Process. Lett., 45 (1993), pp. 205-210.
-
(1993)
Inform. Process. Lett.
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
20
-
-
0025794546
-
Private computations over the integers
-
IEEE Computer Society Press, Los Alamitos, CA
-
B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, Private computations over the integers, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 335-344; also in SIAM J. Comput., 24 (1995), pp. 376-386.
-
(1990)
Proc. 31st Annual IEEE Symposium on Foundations of Computer Science
, pp. 335-344
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
21
-
-
0029293045
-
-
B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, Private computations over the integers, in Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1990, pp. 335-344; also in SIAM J. Comput., 24 (1995), pp. 376-386.
-
(1995)
SIAM J. Comput.
, vol.24
, pp. 376-386
-
-
-
22
-
-
0028675686
-
On the structure of the privacy hierarchy
-
B. CHOR, M. GERÉB-GRAUS, AND E. KUSHILEVITZ, On the structure of the privacy hierarchy, J. Cryptology, 7 (1994), pp. 53-60.
-
(1994)
J. Cryptology
, vol.7
, pp. 53-60
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
23
-
-
0022183152
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
IEEE Computer Society Press, Los Alamitos, CA
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 429-442; also in SIAM J. Comput., 17 (1988), 230-261.
-
(1985)
Proc. 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 429-442
-
-
Chor, B.1
Goldreich, O.2
-
24
-
-
0023985259
-
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 429-442; also in SIAM J. Comput., 17 (1988), 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
-
25
-
-
0024766880
-
Dispersere, deterministic amplification, and weak random sources
-
IEEE Computer Society Press, Los Alamitos, CA
-
A. COHEN AND A. WIGDERSON, Dispersere, deterministic amplification, and weak random sources, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 14-19.
-
(1989)
Proc. 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
26
-
-
0026985378
-
Communication complexity of secure computation
-
ACM, New York
-
M. FRANKLIN AND M. YUNG, Communication complexity of secure computation, in Proc. 24th Annual ACM Symposium on Theory of Computing, ACM, New York, 1992, pp. 699-710.
-
(1992)
Proc. 24th Annual ACM Symposium on Theory of Computing
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
27
-
-
0024771884
-
How to recycle random bits
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. IMPAGLIAZZO AND D. ZUCKERMAN, How to recycle random bits, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 248-253.
-
(1989)
Proc. 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
28
-
-
0005334452
-
(De)randomized construction of small sample spaces in NC
-
IEEE Computer Society Press, Los Alamitos, CA
-
D. KARGER AND D. KOLLER, (De)randomized construction of small sample spaces in NC, in Proc. 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1994, pp. 252-263.
-
(1994)
Proc. 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 252-263
-
-
Karger, D.1
Koller, D.2
-
29
-
-
0027274447
-
Constructing small sample spaces satisfying given constraints
-
ACM, New York
-
D. KOLLER AND N. MEGIDDO, Constructing small sample spaces satisfying given constraints, in Proc. 25th Annual ACM Symposium on Theory of Computing, ACM, New York, 1993, pp. 268-277.
-
(1993)
Proc. 25th Annual ACM Symposium on Theory of Computing
, pp. 268-277
-
-
Koller, D.1
Megiddo, N.2
-
30
-
-
0028044344
-
On construction of k-wise independent random variables
-
ACM, New York
-
H. KARLOFF AND Y. MANSOUR, On construction of k-wise independent random variables, in Proc. 26th Annual ACM Symposium on Theory of Computing, ACM, New York, 1993, pp. 564-573.
-
(1993)
Proc. 26th Annual ACM Symposium on Theory of Computing
, pp. 564-573
-
-
Karloff, H.1
Mansour, Y.2
-
31
-
-
84894203891
-
A time-randomness tradeoff for oblivious routing
-
ACM, New York
-
D. KRIZANC, D. PELEG, AND E. UPFAL, A time-randomness tradeoff for oblivious routing, in Proc. 20th Annual ACM Symposium on Theory of Computing, ACM, New York, 1988, pp. 93-102.
-
(1988)
Proc. 20th Annual ACM Symposium on Theory of Computing
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
32
-
-
0024768184
-
Privacy and communication complexity
-
IEEE Computer Society Press, Los Alamitos, CA
-
E. KUSHILEVITZ, Privacy and communication complexity, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 416-421; also in SIAM J. Discrete Math., 5 (1992), pp. 273-284.
-
(1989)
Proc. 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 416-421
-
-
Kushilevitz, E.1
-
33
-
-
0024768184
-
-
E. KUSHILEVITZ, Privacy and communication complexity, in Proc. 30th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1989, pp. 416-421; also in SIAM J. Discrete Math., 5 (1992), pp. 273-284.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, pp. 273-284
-
-
-
34
-
-
0029700751
-
Randomness in private computations
-
ACM, New York
-
E. KUSHILEVITZ AND Y. MANSOUR, Randomness in private computations, in Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1996, pp. 181-190; also in SIAM J. Discrete Math., 10 (1997), pp. 647-661.
-
(1996)
Proc. 15th Annual ACM Symposium on Principles of Distributed Computing
, pp. 181-190
-
-
Kushilevitz, E.1
Mansour, Y.2
-
35
-
-
0011180890
-
-
E. KUSHILEVITZ AND Y. MANSOUR, Randomness in private computations, in Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1996, pp. 181-190; also in SIAM J. Discrete Math., 10 (1997), pp. 647-661.
-
(1997)
SIAM J. Discrete Math.
, vol.10
, pp. 647-661
-
-
-
36
-
-
84968329589
-
Reducibility and completeness in multi-party private computations
-
IEEE Computer Society Press, Los Alamitos, CA
-
E. KUSHILEVITZ, S. MICALI, AND R. OSTROVSKY, Reducibility and completeness in multi-party private computations, in Proc. 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1994, pp. 478-489.
-
(1994)
Proc. 35th Annual IEEE Symposium on Foundations of Computer Science
, pp. 478-489
-
-
Kushilevitz, E.1
Micali, S.2
Ostrovsky, R.3
-
37
-
-
0029712050
-
Characterizing linear size circuits in terms of privacy
-
ACM, New York
-
E. KUSHILEVITZ, R. OSTROVSKY, AND A. ROSEN, Characterizing linear size circuits in terms of privacy, in Proc. 28th Annual ACM Symposium on Theory of Computing, ACM, New York, 1996, pp. 541-550.
-
(1996)
Proc. 28th Annual ACM Symposium on Theory of Computing
, pp. 541-550
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosen, A.3
-
38
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
ACM, New York
-
J. NAOR AND M. NAOR, Small-bias probability spaces: Efficient constructions and applications, in Proc. 22nd Annual ACM Symposium on Theory of Computing, ACM, New York; also in SIAM J. Comput., 22 (1993), pp. 838-856.
-
Proc. 22nd Annual ACM Symposium on Theory of Computing
-
-
Naor, J.1
Naor, M.2
-
39
-
-
0027641832
-
-
J. NAOR AND M. NAOR, Small-bias probability spaces: Efficient constructions and applications, in Proc. 22nd Annual ACM Symposium on Theory of Computing, ACM, New York; also in SIAM J. Comput., 22 (1993), pp. 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 838-856
-
-
-
40
-
-
0025152619
-
Pseudorandom generator for space bounded computation
-
ACM, New York
-
N. NISAN, Pseudorandom generator for space bounded computation, in Proc. 22nd Annual ACM Symposium on Theory of Computing, ACM, New York, 1990, pp. 204-212.
-
(1990)
Proc. 22nd Annual ACM Symposium on Theory of Computing
, pp. 204-212
-
-
Nisan, N.1
-
41
-
-
85029615997
-
Memory vs. randomization in on-line algorithms
-
Lecture Notes in Computer Science 372, Springer-Verlag, Berlin
-
P. RAGHAVAN AND M. SNIR, Memory vs. randomization in on-line algorithms, in Proc. 16th Annual Intl. Collegium on Automata, Languages, and Programming, Lecture Notes in Computer Science 372, Springer-Verlag, Berlin, 1989, pp. 687-703.
-
(1989)
Proc. 16th Annual Intl. Collegium on Automata, Languages, and Programming
, pp. 687-703
-
-
Raghavan, P.1
Snir, M.2
-
43
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
IEEE Computer Society Press, Los Alamitos, CA
-
U. VAZIRANI AND V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 417-428.
-
(1985)
Proc. 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
44
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE Computer Society Press, Los Alamitos, CA
-
A. C. YAO, Theory and applications of trapdoor functions, in Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1982, pp. 80-91.
-
(1982)
Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
45
-
-
0026372370
-
Simulating BPP using a general weak random source
-
IEEE Computer Society Press, Los Alamitos, CA
-
D. ZUCKERMAN, Simulating BPP using a general weak random source, in Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1991, pp. 79-89.
-
(1991)
Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science
, pp. 79-89
-
-
Zuckerman, D.1
|