-
1
-
-
0002128548
-
The influence of large coalitions
-
M. Ajtai, N. Linial. The influence of large coalitions. Combinatorica, 13(2):129-145, 1993.
-
(1993)
Combinatorica
, vol.13
, Issue.2
, pp. 129-145
-
-
Ajtai, M.1
Linial, N.2
-
2
-
-
0033341167
-
Trevisan. Dispersers, deterministic amplification, and weak random sources
-
A. Andreev, A. Clementi, J. Rolim, L. Trevisan. Dispersers, deterministic amplification, and weak random sources. In SIAM J. on Comput., 28(6):2103-2116, 1999.
-
(1999)
SIAM J. on Comput.
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.1
Clementi, A.2
Rolim, J.L.3
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by public discussion. In SIAM J. on Computing, pp. 17(2):210-229, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.3
-
4
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
J. Bierbrauer, T. Johansson, G. Kabatianskii, B. Smeets. On Families of Hash Functions via Geometric Codes and Concatenation. In Proc. of CRYPTO, pp. 331-342, 1993.
-
(1993)
Proc. of CRYPTO
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
5
-
-
51249178917
-
Independent unbiased coin-flipsfrom a correclated biased source - a finite state Markov chain
-
M. Blum. Independent unbiased coin-flipsfrom a correclated biased source - a finite state Markov chain. Combinatorica, 6(2):97-108, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.2
, pp. 97-108
-
-
Blum, M.1
-
6
-
-
0018456171
-
Universal classes of hash functions
-
L. Carter and M. Wegman. Universal classes of hash functions. In JCSS, vol. 18, pp. 143-154, 1979.
-
(1979)
JCSS
, vol.18
, pp. 143-154
-
-
Carter, L.1
Wegman, M.2
-
7
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, J. Friedman, O. Goldreich, J. Håstad, S. Rudich, R. Smolensky. The Bit Extraction Problem or t-resilient Functions. In Proc. of FOCS, pp. 396-407, 1985.
-
(1985)
Proc. of FOCS
, pp. 396-407
-
-
Chor, B.1
Friedman, J.2
Goldreich, O.3
Håstad, J.4
Rudich, S.5
Smolensky, R.6
-
8
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor, O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
9
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen, A. Wigderson. Dispersers, deterministic amplification, and weak random sources. In Proc. of FOCS, pp. 14-19, 1989.
-
(1989)
Proc. of FOCS
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
10
-
-
84879512073
-
New imperfect random source with applications to coin-flipping
-
Y. Dodis. New Imperfect Random Source with Applications to Coin-Flipping. In Proc. of ICALP, pp. 297-309, 2001.
-
(2001)
Proc. of ICALP
, pp. 207-309
-
-
Dodis, Y.1
-
11
-
-
84945116168
-
On perfect and adaptive security in exposure-resilient cryptography
-
Y. Dodis, A. Sahai and A. Smith. On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In Proc. of EuroCrypt, pp. 301-324, 2001.
-
(2001)
Proc. of EuroCrypt
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
12
-
-
0012578418
-
The efficient construction of an unbiased random sequence
-
P. Elias. The Efficient Construction of an Unbiased Random Sequence. Ann. Math. Stat., 43(3):865-870, 1972.
-
(1972)
Ann. Math. Stat.
, vol.43
, Issue.3
, pp. 865-870
-
-
Elias, P.1
-
13
-
-
85024964126
-
On the bit extraction problem
-
J. Friedman. On the Bit Extraction Problem. In Proc. of FOCS, pp. 314-319, 1992.
-
(1992)
Proc. of FOCS
, pp. 314-319
-
-
Friedman, J.1
-
15
-
-
84955569997
-
Universal hash functions from exponential sums over finite fields and galois rings
-
T. Helleseth, T. Johansson. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. In proc. of CRYPTO, pp. 31-44, 1996.
-
(1996)
Proc. of CRYPTO
, pp. 31-44
-
-
Helleseth, T.1
Johansson, T.2
-
16
-
-
0002431403
-
The influence of variables on boolean functions
-
J. Kahn, G. Kalai, N. Linial. The Influence of Variables on Boolean Functions. In Proc. of 30th FOCS, pp. 68-80, 1989.
-
(1989)
Proc. of 30th FOCS
, pp. 68-80
-
-
Kahn, J.1
Kalai, G.2
Linial, N.3
-
17
-
-
0012575273
-
Almost k-wise independent sample spaces and their cryptologic applications
-
K. Kurosawa, T. Johansson and D. Stinson. Almost k-wise independent sample spaces and their cryptologic applications. In J. of Cryptology, 14:231-253, 2001.
-
(2001)
J. of Cryptology
, vol.14
, pp. 231-253
-
-
Kurosawa, K.1
Johansson, T.2
Stinson, D.3
-
18
-
-
0012523366
-
Some extremal problems arising from discrete control processes
-
D. Lichtenstein, N. Linial, M. Saks. Some Extremal Problems Arising from Discrete Control Processes. Combinatorica, 9:269-287, 1989.
-
(1989)
Combinatorica
, vol.9
, pp. 269-287
-
-
Lichtenstein, D.1
Linial, N.2
Saks, M.3
-
19
-
-
0012524233
-
On the impossibility of private key cryptography with weakly random keys
-
J. McInnes, B. Pinkas. On the Impossibility of Private Key Cryptography with Weakly Random Keys. In Proc. of CRYPTO, pp. 421-435, 1990.
-
(1990)
Proc. of CRYPTO
, pp. 421-435
-
-
McInnes, J.1
Pinkas, B.2
-
20
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
N. Nisan, A. Ta-Shma. Extracting Randomness: a survey and new constructions. In JCSS, 58(1):148-173, 1999.
-
(1999)
JCSS
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
21
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1):43-52, 1996.
-
(1996)
JCSS
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
23
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
M. Sántha, U. Vazirani. Generating Quasi-Random Sequences from Semi-Random Sources. Journal of Computer and System Sciences, 33(1): 75-87, 1986.
-
(1986)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Sántha, M.1
Vazirani, U.2
-
24
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949.
-
(1949)
Bell Systems Technical J.
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
25
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
G. J. Simmons, ed., IEEE Press
-
G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application. In "Contemporary Cryptology, the Science of Information Integrity", G. J. Simmons, ed., IEEE Press, pp. 441-497, 1992.
-
(1992)
Contemporary Cryptology, the Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
26
-
-
0003570960
-
Implementing discrete mathematics: Combinatorics and graph theory with mathematica
-
Addison-Wesley
-
S. Skiena. Implementing Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Addison-Wesley, 1990.
-
(1990)
-
-
Skiena, S.1
-
27
-
-
0000410707
-
Universal hashing and authentication codes
-
D. Stinson. Universal Hashing and Authentication Codes. In Designs, Codes and Cryptography, 4(4):369-380, 1994.
-
(1994)
Designs, Codes and Cryptography
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.1
-
28
-
-
0032624550
-
Construction of extractors using pseudorandom generators
-
L. Trevisan. Construction of Extractors Using PseudoRandom Generators. In Proc. of STOC, pp. 141-148, 1999.
-
(1999)
Proc. of STOC
, pp. 141-148
-
-
Trevisan, L.1
-
30
-
-
0004262006
-
Randomness, adversaries and computation
-
PhD Thesis, University of California, Berkeley
-
U. Vazirani. Randomness, Adversaries and Computation. PhD Thesis, University of California, Berkeley, 1986.
-
(1986)
-
-
Vazirani, U.1
-
31
-
-
51249175241
-
Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
-
U. Vazirani. Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources. Combinatorica, 7(4):375-392, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.1
-
32
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
U. Vazirani, V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. of 26th FOCS, pp. 417-428, 1985.
-
(1985)
Proc. of 26th FOCS
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
33
-
-
4243554239
-
Secret signaling systems
-
US Patent
-
G. Vernam. Secret Signaling Systems. US Patent, 1919.
-
(1919)
-
-
Vernam, G.1
-
35
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman. Simulating BPP Using a General Weak Random Source. Algorithmica, 16(4/5):367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|