-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
N. Alou, O. Goldreich, J. Hastad, and R. Peralta, “Simple constructions of almost k-wise independent random variables”, Proc. of 31st FOCS, 1990, pp. 544–553.
-
(1990)
Proc. of 31St FOCS
, pp. 544-553
-
-
Alou, N.1
Goldreich, O.2
Hastad, J.3
Peralta, R.4
-
2
-
-
0024940038
-
Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds
-
J. Bar-Ilan, and D. Beaver, “Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds”, Proc. of 8th PODC, 1989, pp. 201–209.
-
(1989)
Proc. of 8Th PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
5
-
-
0025535128
-
Randomness in Interactive Proofs
-
M. Bellare, O. Goldreich, and S. Goldwasser, “Randomness in Interactive Proofs”, Proc. of 31st FOCS, 1990, pp. 563–571.
-
(1990)
Proc. of 31St FOCS
, pp. 563-571
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-or, S. Goldwasser, and A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, Proc. of 20th STOC, 1988, pp. 1–10.
-
(1988)
Proc. of 20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits
-
M. Blum, and S. Micali “How to Generate Cryptographically Strong Sequences Of Pseudo-Random Bits”, FOCS 82 and SIAM J. on Computing, Vol 13, 1984, pp. 850–864.
-
(1984)
FOCS 82 and SIAM J. on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
10
-
-
0040655145
-
Bounds on Tradeoffs between Randomness and Communication Complexity
-
R. Canetti, and O. Goldreich, “Bounds on Tradeoffs between Randomness and Communication Complexity”, FOCS 90 and Computational Complexity Vol. 3, (1993), 141–167.
-
(1993)
FOCS 90 and Computational Complexity
, vol.3
, pp. 141-167
-
-
Canetti, R.1
Goldreich, O.2
-
11
-
-
84898947315
-
Multiparty Unconditionally Secure Protocols
-
D. Chaum, C. Crepeau, and I. Damgard, “Multiparty Unconditionally Secure Protocols”, Proc. of 20th STOC, 1988, pp. 11–19.
-
(1988)
Proc. of 20Th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
12
-
-
0002738457
-
A Zero-One Law for Boolean Privacy”, STOC 89 and SIAM
-
B. Chor, and E. Kushilevitz, “A Zero-One Law for Boolean Privacy”, STOC 89 and SIAM J. Disc. Math. Vol. 4, (1991), 36–47.
-
(1991)
J. Disc. Math
, vol.4
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
13
-
-
0040655149
-
A Communication-Privacy Tradeoff for Modular Addition
-
B. Chor, and E. Kushilevitz, “A Communication-Privacy Tradeoff for Modular Addition”, Information Processing Letters, Vol. 45, 1993, pp. 205–210.
-
(1993)
Information Processing Letters
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
14
-
-
0025794546
-
Private Computations Over the Integers
-
B. Chor, M. Geréb-Graus, and E. Kushilevitz, “Private Computations Over the Integers”, Proc. of 31st FOCS, 1990, pp. 335–344.
-
(1990)
Proc. of 31St FOCS
, pp. 335-344
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
15
-
-
0028675686
-
On the Structure of the Privacy Hierarchy
-
B. Chor, M. Geréb-Graus, and E. Kushilevitz, “On the Structure of the Privacy Hierarchy”, Journal of Cryptology, Vol. 7, No. 1, 1994, pp. 53–60.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 53-60
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
16
-
-
0023985259
-
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
-
B. Chor, and O. Goldreich, “Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity”, FOCS 85 and SIAM J. Computing Vol. 17, (1988), 230–261.
-
(1988)
FOCS 85 and SIAM J. Computing
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
17
-
-
0024766880
-
Dispersers, Deterministic Amplification, and Weak Random Sources
-
A. Cohen, and A. Wigderson, “Dispersers, Deterministic Amplification, and Weak Random Sources”, Proc. of 30th FOCS, 1989, pp. 14–19.
-
(1989)
Proc. of 30Th FOCS
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
18
-
-
0026985378
-
Communication complexity of secure computation
-
M. Franklin, and M. Yung, “Communication complexity of secure computation”, Proc. of 24th STOC, 1992, pp. 699–710.
-
(1992)
Proc. of 24Th STOC
, pp. 699-710
-
-
Franklin, M.1
Yung, M.2
-
20
-
-
0027274447
-
Constructing Small Sample Spaces Satisfying Given Constraints
-
D. Koller, and N. Megiddo, “Constructing Small Sample Spaces Satisfying Given Constraints”, Proc. of 25th STOC, 1993, pp. 268–277.
-
(1993)
Proc. of 25Th STOC
, pp. 268-277
-
-
Koller, D.1
Megiddo, N.2
-
21
-
-
84894203891
-
A Time-Randomness Tradeoff for Oblivious Routing
-
D. Krizanc, D. Peleg, and E. Upfal, “A Time-Randomness Tradeoff for Oblivious Routing”, Proc. of 20th STOC, 1988, pp. 93–102.
-
(1988)
Proc. of 20Th STOC
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
22
-
-
0002365530
-
Privacy and Communication Complexity
-
May
-
E. Kushilevitz, “Privacy and Communication Complexity”, FOCS 89, and SIAM Jour. on Disc. Math., Vol. 5, No. 2, May 1992, pp. 273–284.
-
(1992)
FOCS 89, and SIAM Jour. on Disc. Math
, vol.5
, Issue.2
, pp. 273-284
-
-
Kushilevitz, E.1
-
23
-
-
0027641832
-
Small-Bias Probability Spaces: Efficient Constructions and Applications
-
J. Naor, and M. Naor, “Small-Bias Probability Spaces: Efficient Constructions and Applications”, STOC 90, and SIAM J. on Computing, Vol 22, No. 4, 1993, pp. 838–856.
-
(1993)
STOC 90, and SIAM J. on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
24
-
-
0025152619
-
Pseudorandom Generator for Space Bounded Computation
-
N. Nisan, “Pseudorandom Generator for Space Bounded Computation”, Proc. of 22nd STOC, 1990, pp. 204–212.
-
(1990)
Proc. of 22Nd STOC
, pp. 204-212
-
-
Nisan, N.1
-
25
-
-
85029615997
-
Memory vs. Randomization in On-Line Algorithms
-
P. Raghavan, and M. Snir, “Memory vs. Randomization in On-Line Algorithms”, Proc. of 16th ICALP, 1989, pp. 687–703.
-
(1989)
Proc. of 16Th ICALP
, pp. 687-703
-
-
Raghavan, P.1
Snir, M.2
-
26
-
-
0026977180
-
Sample Spaces Uniform on Neighborhoods
-
L. J. Schulman, “Sample Spaces Uniform on Neighborhoods”, Proc. of 24th STOC, 1992, pp. 17–25.
-
(1992)
Proc. of 24Th STOC
, pp. 17-25
-
-
Schulman, L.J.1
-
27
-
-
0022252339
-
Random Polynomial Time is Equal to Slightly-Random Polynomial Time
-
U. Vazirani, and V. Vazirani, “Random Polynomial Time is Equal to Slightly-Random Polynomial Time”, Proc. of 26th FOCS, 1985, pp. 417–428.
-
(1985)
Proc. of 26Th FOCS
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
28
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
A. C. Yao, “Theory and Applications of Trapdoor Functions” Proc. of 23rd FOCS, 1982, pp. 80–91.
-
(1982)
Proc. of 23Rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
-
29
-
-
0026372370
-
Simulating BPP Using a General Weak Random Source
-
D. Zuckerman, “Simulating BPP Using a General Weak Random Source” Proc. of 32nd FOCS, 1991, pp. 79–89.
-
(1991)
Proc. of 32Nd FOCS
, pp. 79-89
-
-
Zuckerman, D.1
|