-
2
-
-
0002970176
-
1-formulae on finite structures
-
1-formulae on finite structures. Ann. Pure Appl. Logic, 24(1):1-48, 1983.
-
(1983)
Ann. Pure Appl. Logic
, vol.24
, Issue.1
, pp. 1-48
-
-
Ajtai, M.1
-
3
-
-
84880226003
-
A theorem on probabilistic constant depth computation
-
ACM, editor, ACM order no. 508840
-
M. Ajtai and M. Ben-Or. A theorem on probabilistic constant depth computation. In ACM, editor, Proceedings of the sixteenth annual ACM Symposium on Theory of Computing, Washington, DC, April 30-May 2, 1984, pages 471-474, 1984. ACM order no. 508840.
-
(1984)
Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing, Washington, DC, April 30-May 2, 1984
, pp. 471-474
-
-
Ajtai, M.1
Ben-Or, M.2
-
5
-
-
0002771903
-
Nondeterministic exponential time has two-prover interactive protocols
-
L. Babai, L. Fortnow, and C. Lund. Nondeterministic exponential time has two-prover interactive protocols. Comput. Complexity, 1(1):3-40, 1991.
-
(1991)
Comput. Complexity
, vol.1
, Issue.1
, pp. 3-40
-
-
Babai, L.1
Fortnow, L.2
Lund, C.3
-
6
-
-
33745511846
-
Hiding instances in multioracle queries
-
7th Annual Symposium on Theoretical Aspects of Computer Science, Rouen, France, 22-24 Feb. Springer
-
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In 7th Annual Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37-48, Rouen, France, 22-24 Feb. 1990. Springer.
-
(1990)
Lecture Notes in Computer Science
, vol.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov.
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. on Computing, 13(4):850-864, Nov. 1984.
-
(1984)
SIAM J. on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
0031221311
-
The average sensitivity of bounded-depth circuits
-
R. B. Boppana. The average sensitivity of bounded-depth circuits. Inform. Process. Lett., 63(5):257-261, 1997.
-
(1997)
Inform. Process. Lett.
, vol.63
, Issue.5
, pp. 257-261
-
-
Boppana, R.B.1
-
10
-
-
0023416467
-
One-way functions and circuit complexity
-
R. B. Boppana and J. C. Lagarias. One-way functions and circuit complexity. Inform, and Comput., 74(3):226-240, 1987.
-
(1987)
Inform, and Comput.
, vol.74
, Issue.3
, pp. 226-240
-
-
Boppana, R.B.1
Lagarias, J.C.2
-
11
-
-
84957045104
-
On the hardness of the permanent
-
Lecture Notes in Computer Science, Trier, Germany, March 4-6 Springer-Verlag. To appear
-
J.-Y. Cai, A. Pavan, and D. Sivakumar. On the hardness of the permanent. In 16th International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, Trier, Germany, March 4-6 1999. Springer-Verlag. To appear.
-
(1999)
16th International Symposium on Theoretical Aspects of Computer Science
-
-
Cai, J.-Y.1
Pavan, A.2
Sivakumar, D.3
-
13
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman. Universal classes of hash functions. J. Comput. System Sci., 18(2):143-154, 1979.
-
(1979)
J. Comput. System Sci.
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
14
-
-
0039015429
-
On the hardness of computing the permanent of random matrices
-
U. Feige and C. Lund. On the hardness of computing the permanent of random matrices. Computational Complexity, 6(2):101-132, 1996.
-
(1996)
Computational Complexity
, vol.6
, Issue.2
, pp. 101-132
-
-
Feige, U.1
Lund, C.2
-
15
-
-
0027684980
-
Random-self-reducibility of complete sets
-
Oct.
-
J. Feigenbaum and L. Fortnow. Random-self-reducibility of complete sets. SIAM J. on Computing, 22(5):994-1005, Oct. 1993.
-
(1993)
SIAM J. on Computing
, vol.22
, Issue.5
, pp. 994-1005
-
-
Feigenbaum, J.1
Fortnow, L.2
-
16
-
-
0002127588
-
Parity, circuits, and the polynomial-time hierarchy
-
April
-
M. L. Furst, J. B. Saxe, and M. Sipser. Parity, circuits, and the polynomial-time hierarchy. Mathematical Systems Theory, 17(1):13-27, April 1984.
-
(1984)
Mathematical Systems Theory
, vol.17
, Issue.1
, pp. 13-27
-
-
Furst, M.L.1
Saxe, J.B.2
Sipser, M.3
-
17
-
-
0034496969
-
Lower bounds on the efficiency of generic cryptographic constructions
-
IEEE Comput. Soc. Press, Los Alamitos, CA
-
R. Gennaro and L. Trevisan. Lower bounds on the efficiency of generic cryptographic constructions. In 41st Annual Symposium on Foundations of Computer Science (Redondo Beach, CA, 2000), pages 305-313. IEEE Comput. Soc. Press, Los Alamitos, CA, 2000.
-
(2000)
41st Annual Symposium on Foundations of Computer Science (Redondo Beach, CA, 2000)
, pp. 305-313
-
-
Gennaro, R.1
Trevisan, L.2
-
18
-
-
27644489812
-
Complexity bounds on general hard-core predicates
-
M. Goldmann, M. Näslund, and A. Russell. Complexity bounds on general hard-core predicates. J. Cryptology, 14(3):177-195, 2001.
-
(2001)
J. Cryptology
, vol.14
, Issue.3
, pp. 177-195
-
-
Goldmann, M.1
Näslund, M.2
Russell, A.3
-
20
-
-
0022793132
-
How to construct random functions
-
Oct.
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, Oct. 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
21
-
-
0027797493
-
On the existence of pseudorandom generators
-
O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM J. Comput., 22(6): 1163-1175, 1993.
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
22
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In ACM [1], pages 25-32.
-
ACM
, Issue.1
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
23
-
-
2442638659
-
On Yao's XOR lemma
-
Electronic Colloquium on Computational Complexity, March
-
O. Goldreich, N. Nisan, and A. Wigderson. On Yao's XOR lemma. Technical Report TR95-050, Electronic Colloquium on Computational Complexity, March 1995. http://www.eccc.uni-trier.de/eccc.
-
(1995)
Technical Report
, vol.TR95-050
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
25
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
electronic
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396 (electronic), 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
26
-
-
4544286907
-
Using nondeterminism to amplify hardness
-
Chicago, IL, 13-15 June
-
A. Healy, S. Vadhan, and E. Viola, Using nondeterminism to amplify hardness. In Proceedings of the Thirty-Six Annual ACM Symposium on the Theory of Computing, pages 192-201, Chicago, IL, 13-15 June 2004.
-
(2004)
Proceedings of the Thirty-six Annual ACM Symposium on the Theory of Computing
, pp. 192-201
-
-
Healy, A.1
Vadhan, S.2
Viola, E.3
-
27
-
-
27644434337
-
-
Invited to, STOC Special Issue
-
Invited to SIAM Journal of Computing, STOC Special Issue.
-
SIAM Journal of Computing
-
-
-
30
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In ACM [1], pages 44-61.
-
ACM
, Issue.1
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
31
-
-
0024765829
-
Lower bounds for pseudorandom number generators
-
Research Triangle Park, North Carolina, 30 Oct.-1 Nov. IEEE
-
M. Kharitonov, A. V. Goldberg, and M. Yung. Lower bounds for pseudorandom number generators. In 30th Annual Symposium on Foundations of Computer Science, pages 242-247, Research Triangle Park, North Carolina, 30 Oct.-1 Nov. 1989. IEEE.
-
(1989)
30th Annual Symposium on Foundations of Computer Science
, pp. 242-247
-
-
Kharitonov, M.1
Goldberg, A.V.2
Yung, M.3
-
32
-
-
51249173191
-
One way functions and pseudorandom generators
-
L. A. Levin. One way functions and pseudorandom generators. Combinatorica, 7(4):357-363, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.A.1
-
33
-
-
0027627287
-
Constant depth circuits, Fourier transform, and learnability
-
N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, Fourier transform, and learnability. J. Assoc. Comput. Mach., 40(3):607-620, 1993.
-
(1993)
J. Assoc. Comput. Mach.
, vol.40
, Issue.3
, pp. 607-620
-
-
Linial, N.1
Mansour, Y.2
Nisan, N.3
-
35
-
-
0025106672
-
The computational complexity of universal hashing
-
New York, NY 10036, USA, ACM Press
-
Y. Mansour, N. Nisan, and P. Tiwari. The computational complexity of universal hashing. In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (May 14-16 1990: Baltimore, MD, USA), pages 235-243, New York, NY 10036, USA, 1990. ACM Press.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing (May 14-16 1990: Baltimore, MD, USA)
, pp. 235-243
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
38
-
-
0008827213
-
Pseudorandom bits for constant depth circuits
-
N. Nisan. Pseudorandom bits for constant depth circuits. Combinatorica, 11(1):63-70, 1991.
-
(1991)
Combinatorica
, vol.11
, Issue.1
, pp. 63-70
-
-
Nisan, N.1
-
40
-
-
0030086632
-
Randomness is linear in space
-
Feb.
-
N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, Feb. 19%.
-
(1991)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
41
-
-
84939385846
-
Efficient parallel pseudo-random number generation
-
H. C. Williams, editor, Advances in Cryptology - CRYPTO '85, Springer-Verlag, 1986, 18-22 Aug.
-
J. H. Reif and J. D. Tygar. Efficient parallel pseudo-random number generation. In H. C. Williams, editor, Advances in Cryptology - CRYPTO '85, volume 218 of Lecture Notes in Computer Science, pages 433-446. Springer-Verlag, 1986, 18-22 Aug. 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 433-446
-
-
Reif, J.H.1
Tygar, J.D.2
-
42
-
-
27644582039
-
Notions of reducibility between cryptographic primitives
-
Springer-Verlag
-
O. Reingold, L. Trevisan, and S. Vadhan. Notions of reducibility between cryptographic primitives. In Proceedings of the 1st Theory of Cryptography Conference (Feb 19-21, 2004: Cambridge, MA. USA). Springer-Verlag, 2004.
-
(2004)
Proceedings of the 1st Theory of Cryptography Conference (Feb 19-21, 2004: Cambridge, MA. USA)
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
-
43
-
-
0035276434
-
Pseudorandom generators without the XOR lemma
-
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. J. Comput. System Sci., 62(2):236-266, 2001.
-
(2001)
J. Comput. System Sci.
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
46
-
-
15244355932
-
The complexity of constructing pseudorandom generators from hard functions
-
E. Viola. The complexity of constructing pseudorandom generators from hard functions. Comput. Complexity, 13(3-4):147-188, 2004.
-
(2004)
Comput. Complexity
, vol.13
, Issue.3-4
, pp. 147-188
-
-
Viola, E.1
-
47
-
-
0020301290
-
Theory and applications of trapdoor functions
-
Chicago, Illinois, 3-5 Nov. IEEE
-
A. C. Yao. Theory and applications of trapdoor functions (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 80-91, Chicago, Illinois, 3-5 Nov. 1982. IEEE.
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
48
-
-
0028607854
-
Space lower-bounds for pseudorandom-generators
-
IEEE Computer Soc., Los Alamitos, CA
-
X. Yu and M. Yung. Space lower-bounds for pseudorandom-generators. In Ninth Annual Structure in Complexity Theory Conference, pages 186-197. IEEE Computer Soc., Los Alamitos, CA, 1994.
-
(1994)
Ninth Annual Structure in Complexity Theory Conference
, pp. 186-197
-
-
Yu, X.1
Yung, M.2
|