-
1
-
-
84990678058
-
Simple constructions of almost k-wise independent random variables
-
(Addendum, 4 (1993), pp. 119-120.)
-
N. Alon, O. Goldreich, J. Hastad, and R. Peralta, Simple constructions of almost k-wise independent random variables, Random Structures Algorithms, 3 (1992), pp. 289-304. (Addendum, 4 (1993), pp. 119-120.)
-
(1992)
Random Structures Algorithms
, vol.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Hastad, J.3
Peralta, R.4
-
2
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
-
J. Bar-Ilan and D. Beaver, Non-cryptographic fault-tolerant computing in constant number of rounds of interaction, in Proc. of the 8th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1989, pp. 201-209.
-
Proc. of the 8th Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, 1989
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
0003619771
-
Perfect privacy for two-party protocols
-
Technical Report TR-11-89, Harvard University, Cambridge, MA
-
D. Beaver, Perfect Privacy for Two-Party Protocols, Technical Report TR-11-89, Harvard University, Cambridge, MA, 1989.
-
(1989)
-
-
Beaver, D.1
-
4
-
-
0040713388
-
Randomness in interactive proofs
-
M. Bellare, O. Goldreich, and S. Goldwasser, Randomness in interactive proofs, Comput. Complexity, 3 (1993), pp. 319-354.
-
(1993)
Comput. Complexity
, vol.3
, pp. 319-354
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
5
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988, pp. 1-10.
-
Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Comput., 13 (1984), pp. 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
84958034013
-
On the number of random bits in totally private computations
-
(Szeged 1995), Lecture Notes in Comput. Sci. 944, Springer, Berlin
-
C. Blundo, A. De-Santis, G. Persiano, and U. Vaccaro, On the number of random bits in totally private computations, in Automata, Languages and Programming (Szeged 1995), Lecture Notes in Comput. Sci. 944, Springer, Berlin, pp. 171-182.
-
Automata, Languages and Programming
, pp. 171-182
-
-
Blundo, C.1
De-Santis, A.2
Persiano, G.3
Vaccaro, U.4
-
8
-
-
0013546220
-
On the dealer's randomness required in secret sharing schemes
-
C. Blundo, A. Giorgio Gaggia, and D. R. Stinson, On the dealer's randomness required in secret sharing schemes, Des. Codes Cryptogr., 11 (1997), pp. 235-259.
-
(1997)
Des. Codes Cryptogr.
, vol.11
, pp. 235-259
-
-
Blundo, C.1
Giorgio Gaggia, A.2
Stinson, D.R.3
-
9
-
-
0008475502
-
Randomness in distribution protocols
-
C. Blundo, A. De-Santis, and U. Vaccaro, Randomness in distribution protocols, Inform. and Comput., 131 (1996), pp. 111-139.
-
(1996)
Inform. and Comput.
, vol.131
, pp. 111-139
-
-
Blundo, C.1
De-Santis, A.2
Vaccaro, U.3
-
11
-
-
0040655145
-
Bounds on tradeoffs between randomness and communication complexity
-
R. Canetti and O. Goldreich, Bounds on tradeoffs between randomness and communication complexity, Comput. Complexity, 3 (1993), pp. 141-167.
-
(1993)
Comput. Complexity
, vol.3
, pp. 141-167
-
-
Canetti, R.1
Goldreich, O.2
-
12
-
-
0011213598
-
Randomness versus fault-tolerance
-
R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosén, Randomness versus fault-tolerance, J. Cryptography, 13 (2000), pp. 107-142.
-
(2000)
J. Cryptography
, vol.13
, pp. 107-142
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosén, A.4
-
13
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditionally secure protocols, in Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988, pp. 11-19.
-
Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
14
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
16
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
B. Chor and E. Kushilevitz, A communication-privacy tradeoff for modular addition, Inform. Process. Lett., 45 (1993), pp. 205-210.
-
(1993)
Inform. Process. Lett.
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
17
-
-
0029293045
-
Private computations over the integers
-
B. Chor, M. Geréb-Graus, and E. Kushilevitz, Private computations over the integers, SIAM J. Comput., 24 (1995), pp. 376-386.
-
(1995)
SIAM J. Comput.
, vol.24
, pp. 376-386
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
18
-
-
0028675686
-
On the structure of the privacy hierarchy
-
B. Chor, M. Geréb-Graus, and E. Kushilevitz, On the structure of the privacy hierarchy, J. Cryptology, 7 (1994), pp. 53-60.
-
(1994)
J. Cryptology
, vol.7
, pp. 53-60
-
-
Chor, B.1
Geréb-Graus, M.2
Kushilevitz, E.3
-
19
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen and A. Wigderson, Dispersers, deterministic amplification, and weak random sources, in Proc. of the 30th IEEE Symposium on the Foundations of Computer Science, 1989, pp. 14-19.
-
Proc. of the 30th IEEE Symposium on the Foundations of Computer Science, 1989
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
20
-
-
0001422160
-
Amortized communication complexity
-
T. Feder, E. Kushilevitz, M. Naor, and N. Nisan, Amortized communication complexity, SIAM J. Comput., 24 (1995), pp. 736-750.
-
(1995)
SIAM J. Comput.
, vol.24
, pp. 736-750
-
-
Feder, T.1
Kushilevitz, E.2
Naor, M.3
Nisan, N.4
-
22
-
-
0036588723
-
A theorem on sensitivity and applications in private computation
-
A. Gál and A. Rosén, A theorem on sensitivity and applications in private computation, SIAM J. Comput., 31 (2002), pp. 1424-1437.
-
(2002)
SIAM J. Comput.
, vol.31
, pp. 1424-1437
-
-
Gál, A.1
Rosén, A.2
-
23
-
-
0242590678
-
On the complexity of 2-output Boolean networks
-
G. Galibati and M. J. Fischer, On the complexity of 2-output Boolean networks, Theoret. Comput. Sci., 16 (1981), pp. 177-185.
-
(1981)
Theoret. Comput. Sci.
, vol.16
, pp. 177-185
-
-
Galibati, G.1
Fischer, M.J.2
-
24
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, in Proc. of the 19th Annual ACM Symposium on the Theory of Computing, 1987, pp. 218-229.
-
Proc. of the 19th Annual ACM Symposium on the Theory of Computing, 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
0003543733
-
-
Cambridge University Press, Cambridge, UK
-
G. Hardy, J. Littlewood, and G. Pólya, Inequalities, Cambridge University Press, Cambridge, UK, 1988.
-
(1988)
Inequalities
-
-
Hardy, G.1
Littlewood, J.2
Pólya, G.3
-
27
-
-
0040362362
-
Fractional covers and communication complexity
-
M. Karchmer, E. Kushilevitz, and N. Nisan, Fractional covers and communication complexity, SIAM J. Discrete Math., 8 (1995), pp. 76-92.
-
(1995)
SIAM J. Discrete Math.
, vol.8
, pp. 76-92
-
-
Karchmer, M.1
Kushilevitz, E.2
Nisan, N.3
-
28
-
-
0031339396
-
(De)randomized construction of small sample spaces in NC
-
D. Karger and D. Koller, (De)randomized construction of small sample spaces in NC, J. Comput. System Sci., 55 (1997), pp. 402-413.
-
(1997)
J. Comput. System Sci.
, vol.55
, pp. 402-413
-
-
Karger, D.1
Koller, D.2
-
29
-
-
0000062463
-
Constructing small sample spaces satisfying given constraints
-
D. Koller and N. Megiddo, Constructing small sample spaces satisfying given constraints, SIAM J. Discrete Math., 7 (1994), pp. 260-274.
-
(1994)
SIAM J. Discrete Math.
, vol.7
, pp. 260-274
-
-
Koller, D.1
Megiddo, N.2
-
30
-
-
0031459086
-
On construction of k-wise independent random variables
-
H. Karloff and Y. Mansour, On construction of k-wise independent random variables, Combinatorica, 17 (1997), pp. 91-107.
-
(1997)
Combinatorica
, vol.17
, pp. 91-107
-
-
Karloff, H.1
Mansour, Y.2
-
32
-
-
77956759869
-
-
Cambridge University Press, Cambridge, UK
-
E. Kushilevitz and N. Nisan, Communication Complexity, Cambridge University Press, Cambridge, UK, 1997.
-
Communication Complexity
, pp. 1997
-
-
Kushilevitz, E.1
Nisan, N.2
-
33
-
-
0033725451
-
Reducibility and completeness in private computations
-
J. Kilian, E. Kushilevitz, S. Micali, and R. Ostrovsky, Reducibility and completeness in private computations, SIAM J. Comput., 29 (2000), pp. 1189-1208.
-
(2000)
SIAM J. Comput.
, vol.29
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
34
-
-
0033075133
-
Characterizing linear size circuits in terms of privacy
-
E. Kushilevitz, R. Ostrovsky, and A. Rosén, Characterizing linear size circuits in terms of privacy, J. Comput. System Sci., 58 (1999), pp. 129-136.
-
(1999)
J. Comput. System Sci.
, vol.58
, pp. 129-136
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosén, A.3
-
35
-
-
0011217520
-
A randomness-rounds tradeoff in private computation
-
E. Kushilevitz and A. Rosén, A randomness-rounds tradeoff in private computation, SIAM J. Discrete Math., 11 (1998), pp. 61-80.
-
(1998)
SIAM J. Discrete Math.
, vol.11
, pp. 61-80
-
-
Kushilevitz, E.1
Rosén, A.2
-
36
-
-
84894203891
-
A time-randomness tradeoff for oblivious routing
-
D. Krizanc, D. Peleg, and E. Upfal, A time-randomness tradeoff for oblivious routing, in Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988, pp. 93-102.
-
Proc. of the 20th Annual ACM Symposium on the Theory of Computing, 1988
, pp. 93-102
-
-
Krizanc, D.1
Peleg, D.2
Upfal, E.3
-
37
-
-
0002365530
-
Privacy and communication complexity
-
E. Kushilevitz, Privacy and communication complexity, SIAM J. Discrete Math., 5 (1992), pp. 273-284.
-
(1992)
SIAM J. Discrete Math.
, vol.5
, pp. 273-284
-
-
Kushilevitz, E.1
-
38
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor and M. Naor, Small-bias probability spaces: Efficient constructions and applications, SIAM J. Comput., 22 (1993), pp. 838-856.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
39
-
-
0000947929
-
Pseudorandom generators for space bounded computation
-
N. Nisan, Pseudorandom generators for space bounded computation, Combinatorica, 12 (1992), pp. 449-461.
-
(1992)
Combinatorica
, vol.12
, pp. 449-461
-
-
Nisan, N.1
-
40
-
-
0039865160
-
Realizing boolean function on disjoint sets of variables
-
W. Paul, Realizing Boolean function on disjoint sets of variables, Theoret. Comput. Sci., 2 (1976), pp. 383-396.
-
(1976)
Theoret. Comput. Sci.
, vol.2
, pp. 383-396
-
-
Paul, W.1
-
41
-
-
0242674589
-
Memory versus randomization in on-line algorithms
-
P. Raghavan and M. Snir, Memory versus randomization in on-line algorithms, J. Assoc. Comput. Mach., 40 (1993), pp. 421-453.
-
(1993)
J. Assoc. Comput. Mach.
, vol.40
, pp. 421-453
-
-
Raghavan, P.1
Snir, M.2
-
47
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman, Simulating BPP using a general weak random source, Algorithmica, 16 (1996), pp. 367-391.
-
(1996)
Algorithmica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
|