-
1
-
-
0003415652
-
-
Addison-Wesley, Reading, MA
-
A. AHO, J. HOPCROFT, AND J. D. ULLMAN, Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, MA, 1974.
-
(1974)
Design and Analysis of Computer Algorithms
-
-
Aho, A.1
Hopcroft, J.2
Ullman, J.D.3
-
3
-
-
0001011699
-
A fast and simple randomized algorithm for the maximal independent set problem
-
N. ALON, L. BABAI, AND A. ITAI, A fast and simple randomized algorithm for the maximal independent set problem, J. Algorithms, 7 (1987), pp. 567-583.
-
(1987)
J. Algorithms
, vol.7
, pp. 567-583
-
-
Alon, N.1
Babai, L.2
Itai, A.3
-
6
-
-
0018456171
-
Universal classes of hash functions
-
J. L. CARTER AND M. N. WEGMAN, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
-
(1979)
J. Comput. System Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
7
-
-
0002739272
-
On the power of two-point based sampling
-
B. CHOR AND O. GOLDREICH, On the power of two-point based sampling, J. Complexity, 5 (1989), pp. 96-106.
-
(1989)
J. Complexity
, vol.5
, pp. 96-106
-
-
Chor, B.1
Goldreich, O.2
-
8
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
Portland, OR
-
B. CHOR, O. GOLDREICH, J. HASTAD, J. FRIEDMAN, S. RUDICH, AND R. SMOLENSKY, The bit extraction problem or t-resilient functions, in Proceedings 26th IEEE Symposium on Foundations of Computer Science, Portland, OR, 1985, pp. 396-407.
-
(1985)
Proceedings 26th IEEE Symposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
9
-
-
0028483725
-
Dynamic perfect hashing: Upper and lower bounds
-
M. DIETZFELBINGER, A. KARLIN, K. MEHLHORN, F. MEYER AUF DER HEIDE, H. ROHNERT, AND R. E. TARJAN, Dynamic perfect hashing: Upper and lower bounds, SIAM J. Comput., 23 (1994), pp. 738-761.
-
(1994)
SIAM J. Comput.
, vol.23
, pp. 738-761
-
-
Dietzfelbinger, M.1
Karlin, A.2
Mehlhorn, K.3
Meyer Auf Der Heide, F.4
Rohnert, H.5
Tarjan, R.E.6
-
10
-
-
0024766726
-
Planning and learning in permutation groups
-
Research Triangle Park, NC
-
A. FIAT, S. MOSES, A. SHAMIR, I. SHIMSHONI, AND G. TARDOS, Planning and learning in permutation groups, in Proceedings 30th IEEE Symposium on Foundations of Computer Science, Research Triangle Park, NC, 1989, pp. 274-279.
-
(1989)
Proceedings 30th IEEE Symposium on Foundations of Computer Science
, pp. 274-279
-
-
Fiat, A.1
Moses, S.2
Shamir, A.3
Shimshoni, I.4
Tardos, G.5
-
11
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M. L. FREDMAN, J. KOMLÓS, AND E. SZEMERÉDI, Storing a sparse table with O(1) worst case access time, J. ACM, 31 (1984), pp. 538-544.
-
(1984)
J. ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
12
-
-
0019038335
-
A cryptanalytic time memory trade-off
-
M. E. HELLMAN, A cryptanalytic time memory trade-off, IEEE Trans. Inform. Theory, 26 (1980), pp. 401-406.
-
(1980)
IEEE Trans. Inform. Theory
, vol.26
, pp. 401-406
-
-
Hellman, M.E.1
-
13
-
-
85034653229
-
Drainage and the DES, summary
-
Plenum Press, New York
-
M. E. HELLMAN AND J. M. REYNERI, Drainage and the DES, summary, in Advances in Cryptology-Proceedings of Crypto '82, Plenum Press, New York, 1982, pp. 129-131.
-
(1982)
Advances in Cryptology-Proceedings of Crypto '82
, pp. 129-131
-
-
Hellman, M.E.1
Reyneri, J.M.2
-
14
-
-
0022807929
-
A simple parallel algorithm for the maximal independent set problem
-
M. LUBY, A simple parallel algorithm for the maximal independent set problem, SIAM J. Comput., 15 (1986), pp. 1036-1053.
-
(1986)
SIAM J. Comput.
, vol.15
, pp. 1036-1053
-
-
Luby, M.1
-
15
-
-
0018019325
-
Hiding information and signatures in trapdoor functions
-
R. C. MERKLE AND M. E. HELLMAN, Hiding information and signatures in trapdoor functions, IEEE Trans. Inform. Theory, 24 (1978), pp. 525-530.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
16
-
-
84919085619
-
An improved algorithm for computing logarithms over GF[p] and its cryptographic significance
-
S. C. POHLIG AND M. E. HELLMAN, An improved algorithm for computing logarithms over GF[p] and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), pp. 106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
17
-
-
0001539550
-
n/4) algorithm for certain NP-complete problems
-
n/4) algorithm for certain NP-complete problems, SIAM J. Comput., 10 (1981), pp. 456-464.
-
(1981)
SIAM J. Comput.
, vol.10
, pp. 456-464
-
-
Schroeppel, R.1
Shamir, A.2
-
19
-
-
0024768554
-
On universal classes of fast high performance hash functions, their time-space tradeoff and their applications
-
Research Triangle Park, NC
-
A. SIEGEL, On universal classes of fast high performance hash functions, their time-space tradeoff and their applications, in Proceedings 30th IEEE Symposium on Foundations of Computer Science, Research Triangle Park, NC, 1989, pp. 20-25.
-
(1989)
Proceedings 30th IEEE Symposium on Foundations of Computer Science
, pp. 20-25
-
-
Siegel, A.1
|