-
1
-
-
0004109958
-
Structure and importance of the logspace-mod class
-
G. Buntrock, C. Damm, U. Hertrampf, and C. Meinel. Structure and importance of the logspace-mod class. Math. Systems Theory, 25:223-237, 1992.
-
(1992)
Math. Systems Theory
, vol.25
, pp. 223-237
-
-
Buntrock, G.1
Damm, C.2
Hertrampf, U.3
Meinel, C.4
-
2
-
-
0021388907
-
On computing the determinant in small parallel time using a small number of processors
-
S. J. Berkowitz. On computing the determinant in small parallel time using a small number of processors. Inform. Process. Lett., 18:147-150, 1984.
-
(1984)
Inform. Process. Lett.
, vol.18
, pp. 147-150
-
-
Berkowitz, S.J.1
-
4
-
-
0040304685
-
Lower bounds for monotone span programs
-
A. Beimel, A. Gál, and M. Paterson. Lower bounds for monotone span programs. Computational Complexity, 6(1):29-45, 1997.
-
(1997)
Computational Complexity
, vol.6
, Issue.1
, pp. 29-45
-
-
Beimel, A.1
Gál, A.2
Paterson, M.3
-
5
-
-
0040113669
-
Superpolynomial lower bounds for monotone span programs
-
L. Babai, A. Gál, and A. Wigderson. Superpolynomial lower bounds for monotone span programs. Combinatorica, 19(3):301-319, 1999.
-
(1999)
Combinatorica
, vol.19
, Issue.3
, pp. 301-319
-
-
Babai, L.1
Gál, A.2
Wigderson, A.3
-
6
-
-
0033350254
-
Random CNF's are hard for the polynomial calculus
-
E. Ben-Sasson and R. Impagliazzo. Random CNF's are Hard for the Polynomial Calculus. In 40th FOCS, pages 415-421, 1999.
-
(1999)
40th FOCS
, pp. 415-421
-
-
Ben-Sasson, E.1
Impagliazzo, R.2
-
9
-
-
84968516134
-
On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines
-
L. Blum, M. Shub, and S. Smale. On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines. Bulletin of the AMS (new series), 21, (1);1-46, 1989.
-
(1989)
Bulletin of the AMS (New Series)
, vol.21
, Issue.1
, pp. 1-46
-
-
Blum, L.1
Shub, M.2
Smale, S.3
-
10
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
In B. Preneel, editor; Springer
-
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 316-334. Springer, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000, Volume 1807 of LNCS
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
11
-
-
0344362295
-
On relations between counting communication complexity classes
-
To appear. Prelimenary version: STACS '92
-
C. Damm, M. Krause, C. Meinel, and S. Waack. On relations between counting communication complexity classes. J. of Computer and System Sciences, 2003. To appear. Prelimenary version: STACS '92.
-
(2003)
J. of Computer and System Sciences
-
-
Damm, C.1
Krause, M.2
Meinel, C.3
Waack, S.4
-
12
-
-
0031623892
-
A characterization of span program size and improved lower bounds for monotone span programs
-
A. Gál. A characterization of span program size and improved lower bounds for monotone span programs. In 30th STOC, pages 429-437, 1998.
-
(1998)
30th STOC
, pp. 429-437
-
-
Gál, A.1
-
14
-
-
0023543848
-
Secret sharing schemes realizing general access structure
-
Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1):15-20, 1993
-
M. Ito, A. Saito, and T. Nishizeki Secret sharing schemes realizing general access structure. In Proc. of the IEEE Global Telecommunication Conf., Globecom 87, pages 99-102, 1987 Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1):15-20, 1993.
-
(1987)
Proc. of the IEEE Global Telecommunication Conf., Globecom 87
, pp. 99-102
-
-
Ito, M.1
Saito, A.2
Nishizeki, T.3
-
18
-
-
84939715814
-
Las vegas is better than determinism in vlsi and distributed computing
-
K. Mehlhorn and E. M. Schmidt Las vegas is better than determinism in vlsi and distributed computing. In Proc. of the 14th STOC, pages 330-337, 1982.
-
(1982)
Proc. of the 14th STOC
, pp. 330-337
-
-
Mehlhorn, K.1
Schmidt, E.M.2
-
19
-
-
51249173165
-
A fast parallel algorithm to compute the rank of a matrix over an arbitrary field
-
K. Mulmuley A fast parallel algorithm to compute the rank of a matrix over an arbitrary field. Combinatorica, 7:101-104, 1987.
-
(1987)
Combinatorica
, vol.7
, pp. 101-104
-
-
Mulmuley, K.1
-
20
-
-
84957653598
-
Distributed pseudo-random functions and KDCs
-
M. Naor, B. Pinkas, and O. Reingold Distributed pseudo-random functions and KDCs. LNCS, 1592:327-337, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 327-337
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
22
-
-
0011933971
-
Applications of matrix methods to the theory of lower bounds in computational complexity
-
A. A. Razborov. Applications of matrix methods to the theory of lower bounds in computational complexity. Combinatorica, 10(1):81-93, 1990.
-
(1990)
Combinatorica
, vol.10
, Issue.1
, pp. 81-93
-
-
Razborov, A.A.1
-
23
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
0003038453
-
An introduction to shared secret and/or shared control and their application
-
In G. J. Simmons, editor; IEEE Press
-
G. J. Simmons. An introduction to shared secret and/or shared control and their application. In G. J. Simmons, editor, Contemporary Cryptology, The Science of Information Integrity, pages 441-497 IEEE Press, 1992.
-
(1992)
Contemporary Cryptology, The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
25
-
-
0023570259
-
Algebraic methods in the theory of lower bounds for boolean circuit complexity
-
R. Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. In Proceedings of the 19th STOC, pages 77-82, 1987.
-
(1987)
Proceedings of the 19th STOC
, pp. 77-82
-
-
Smolensky, R.1
-
26
-
-
0000708528
-
An explication of secret sharing schemes
-
D. R. Stinson An explication of secret sharing schemes. Designs, Codes and Cryptography, 2:357-390, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
|