-
1
-
-
0002006572
-
Two lower bounds for branching programs
-
M. Ajtai, L. Babai, P. Hajnal, J. Komlos, P. Pudlak. Two lower bounds for branching programs. In Proceedings of the eighteenth annual ACM symposium on Theory of computing, 30-38, 1986.
-
(1986)
Proceedings of the Eighteenth Annual ACM Symposium on Theory of Computing
, pp. 30-38
-
-
Ajtai, M.1
Babai, L.2
Hajnal, P.3
Komlos, J.4
Pudlak, P.5
-
3
-
-
0033341167
-
Dispersere, deterministic amplification, and weak random sources
-
A. Andreev, A. Clementi, J. Rolim, L. Trevisan. Dispersere, deterministic amplification, and weak random sources. In SIAM J. on Comput., 28(6):2103-2116, 1999.
-
(1999)
SIAM J. on Comput.
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.1
Clementi, A.2
Rolim, J.3
Trevisan, L.4
-
4
-
-
0029405656
-
Generalized Privacy Amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, U. Maurer. Generalized Privacy Amplification. In IEEE Transaction on Information Theory, vol. 41, no. 6, pp. 1915-1923, 1995
-
(1995)
IEEE Transaction on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
5
-
-
84950117252
-
How to reduce your enemy's information
-
Proc. of CRYPTO '85, Springer-Verlag
-
C. H. Bennett, G. Brassard, and J.-M. Robert. How to reduce your enemy's information. In Proc. of CRYPTO '85, Lecture Notes in Computer Science, vol. 218, pp. 468-476, Springer-Verlag, 1986.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 468-476
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
6
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor, O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
7
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen, A. Wigderson. Dispersers, deterministic amplification, and weak random sources. In Proc. of FOCS, pp. 14-19, 1989.
-
(1989)
Proc. of FOCS
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
9
-
-
17744372748
-
On the (Non-)Universality of the One-Time Pad
-
Y. Dodis, J. Spencer. On the (Non-)Universality of the One-Time Pad. In Proc. of FOCS, 2002.
-
(2002)
Proc. of FOCS
-
-
Dodis, Y.1
Spencer, J.2
-
12
-
-
84958670019
-
Privacy Amplification Secure Against Active Adversaries
-
Proc. of CRYPTO, Springer-Verlag
-
U. Maurer and S. Wolf. Privacy Amplification Secure Against Active Adversaries. In Proc. of CRYPTO, Lecture Notes in Computer Science, Springer-Verlag, vol. 1294, pp. 307-321, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
13
-
-
0012524233
-
On the Impossibility of Private Key Cryptography with Weakly Random Keys
-
J. McInnes, B. Pinkas. On the Impossibility of Private Key Cryptography with Weakly Random Keys. In Proc. of CRYPTO, pp. 421-435, 1990.
-
(1990)
Proc. of CRYPTO
, pp. 421-435
-
-
McInnes, J.1
Pinkas, B.2
-
14
-
-
0033075850
-
Extracting Randomness: A survey and new constructions
-
N. Nisan, A. Ta-Shma. Extracting Randomness: a survey and new constructions. In JCSS, 58(1):148-173, 1999.
-
(1999)
JCSS
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
15
-
-
0030086632
-
Randomness is Linear in Space
-
N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1):43-52, 1996.
-
(1996)
JCSS
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
17
-
-
0021469810
-
Generating Quasi-Random Sequences from Semi-Random Sources
-
M. Sántha, U. Vazirani. Generating Quasi-Random Sequences from Semi-Random Sources. Journal of Computer and System Sciences, 33(1):75-87, 1986.
-
(1986)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Sántha, M.1
Vazirani, U.2
-
18
-
-
0012579059
-
Recent developments in Explicit Constructions of Extractors
-
R. Shaltiel. Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS, 77:67-95, 2002.
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
19
-
-
0035175916
-
Simple extractors for all min-entropies and a new pseudo-random generator
-
IEEE Computer Society
-
R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In Proceedings of FOCS 2001, pp.648-657, IEEE Computer Society, 2001.
-
(2001)
Proceedings of FOCS 2001
, pp. 648-657
-
-
Shaltiel, R.1
Umans, C.2
-
20
-
-
0024019629
-
Expanders, Randomness or Time versus Space
-
M. Sipser. Expanders, Randomness or Time versus Space. In Journal of Computer and Systems Sciences 36, pp. 379-383, 1988.
-
(1988)
Journal of Computer and Systems Sciences
, vol.36
, pp. 379-383
-
-
Sipser, M.1
-
21
-
-
0002956996
-
Bounds for Dispersere, Extractors, and Depth-Two Superconcentrators
-
A. Ta-Shma and J. Radhakrishnan. Bounds for Dispersere, Extractors, and Depth-Two Superconcentrators. In SIAM Journal on Discrete Mathematics, 13(1):2-24, 2000.
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, Issue.1
, pp. 2-24
-
-
Ta-Shma, A.1
Radhakrishnan, J.2
-
22
-
-
0032624550
-
Construction of Extractors Using PseudoRandom Generators
-
L. Trevisan. Construction of Extractors Using PseudoRandom Generators. In Proc. of STOC, pp. 141-148, 1999.
-
(1999)
Proc. of STOC
, pp. 141-148
-
-
Trevisan, L.1
-
23
-
-
0344839054
-
Extracting Randomness from Samplable Distributions
-
L. Trevisan, S. Vadhan. Extracting Randomness from Samplable Distributions. In Proc. of FOCS, 2000.
-
(2000)
Proc. of FOCS
-
-
Trevisan, L.1
Vadhan, S.2
-
25
-
-
51249175241
-
Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources
-
U. Vazirani. Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources. Combinatorial, 7(4):375-392, 1987.
-
(1987)
Combinatorial
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.1
-
26
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
U. Vazirani, V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. of 26th FOCS, pp. 417-428, 1985.
-
(1985)
Proc. of 26th FOCS
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
28
-
-
0001023343
-
Simulating BPP Using a General Weak Random Source
-
D. Zuckerman. Simulating BPP Using a General Weak Random Source. Algorithmica, 16(4/5):367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|