-
1
-
-
85068530809
-
"Two theorems on random polynomial time"
-
L. Adleman, "Two theorems on random polynomial time," FOCS, pp. 75-83, 1978.
-
(1978)
FOCS
, pp. 75-83
-
-
Adleman, L.1
-
3
-
-
0023548546
-
"Deterministic simulation in LOGSPACE"
-
M. Ajtai, J. Komlos, and E. Szemeredi, "Deterministic simulation in LOGSPACE," STOC, p. 132, 1987.
-
(1987)
STOC
, pp. 132
-
-
Ajtai, M.1
Komlos, J.2
Szemeredi, E.3
-
4
-
-
0023985196
-
"RSA/Rabin functions: Certain parts are as hard as the whole"
-
April
-
W. Alexi, B. Chor, O. Goldreich, and C. Schnorr, "RSA/Rabin functions: Certain parts are as hard as the whole," SIAM J. on Computing, vol. 17, no. 2, pp. 194-209, April 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
5
-
-
0001011699
-
"A fast and simple randomized parallel algorithm for the maximal independent set problem"
-
N. Alon, L. Babai, and A. Itai, "A fast and simple randomized parallel algorithm for the maximal independent set problem," Journal of Algorithms, vol. 7, pp. 567-583, 1986.
-
(1986)
Journal of Algorithms
, vol.7
, pp. 567-583
-
-
Alon, N.1
Babai, L.2
Itai, A.3
-
6
-
-
38249028223
-
"Explicit construction of linear sized tolerant networks"
-
N. Alon and F. R. K. Chung, "Explicit construction of linear sized tolerant networks," Discrete Math, vol. 72, pp. 15-19, 1989.
-
(1989)
Discrete Math
, vol.72
, pp. 15-19
-
-
Alon, N.1
Chung, F.R.K.2
-
8
-
-
0021522644
-
"How to generate cryptographically strong sequences of pseudo-random bits"
-
A preliminary version appears in FOCS, pp. 112-117, 1984
-
M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo-random bits," SIAM J. on Computing, vol. 13, pp. 850-864, A preliminary version appears in FOCS, 1982, pp. 112-117, 1984.
-
(1982)
SIAM J. on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
0024606088
-
"With probability one, a random oracle separates PSPACE from the polynomial-time hierarchy"
-
A preliminary version appears in STOC, pp. 21-29, 1989
-
J. Cai, "With probability one, a random oracle separates PSPACE from the polynomial-time hierarchy," J. of Computer and System Sci., vol. 38, pp. 68-85, A preliminary version appears in STOC, 1986, pp. 21-29, 1989.
-
(1986)
J. of Computer and System Sci.
, vol.38
, pp. 68-85
-
-
Cai, J.1
-
10
-
-
0002739272
-
"On the power of two-point sampling"
-
B. Chor and O. Goldreich, "On the power of two-point sampling," Journal of Complexity, vol. 5, pp. 96-106, 1989.
-
(1989)
Journal of Complexity
, vol.5
, pp. 96-106
-
-
Chor, B.1
Goldreich, O.2
-
11
-
-
0024766880
-
"Dispersers, deterministic amplification, and weak random sources"
-
A. Cohen and A. Wigderson, "Dispersers, deterministic amplification, and weak random sources," FOCS, pp. 14-19, 1989.
-
(1989)
FOCS
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
12
-
-
0021467937
-
"Storing a sparse table in O(1) worst case access time"
-
M. Fredman, J. Komlos, and E. Szemeredi, "Storing a sparse table in O(1) worst case access time," Journal of the ACM, vol. 31, pp. 538-544, 1984.
-
(1984)
Journal of the ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.1
Komlos, J.2
Szemeredi, E.3
-
13
-
-
0019694529
-
"Parity, circuits and the polynomial time hierarchy"
-
M. Furst, J. Saxe, and M. Sipser, "Parity, circuits and the polynomial time hierarchy," FOCS, pp. 260-270, 1981.
-
(1981)
FOCS
, pp. 260-270
-
-
Furst, M.1
Saxe, J.2
Sipser, M.3
-
14
-
-
0022793132
-
"How to construct random functions"
-
A preliminary version appears in FOCS, 1986
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. of ACM, vol. 33, no. 4, pp. 792-807, A preliminary version appears in FOCS, 1984., 1986.
-
(1984)
J. of ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
0024868772
-
"A hard-core predicate for any one-way function"
-
O. Goldreich and L. Levin, "A hard-core predicate for any one-way function," STOC, pp. 25-32, 1989.
-
(1989)
STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
16
-
-
0021409284
-
"Probabilistic encryption"
-
A preliminary version appears in STOC, pp. 365-377., 1984
-
S. Goldwasser and S. Micali, "Probabilistic encryption," J. of Computer and System Sci., vol. 28, pp. 270-299, A preliminary version appears in STOC, 1982, pp. 365-377., 1984.
-
(1982)
J. of Computer and System Sci
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
17
-
-
0040597467
-
"Private coins vs public coins in interactive proof systems"
-
S. Goldwasser and M. Sipser, "Private coins vs public coins in interactive proof systems," STOC, pp. 59-68, 1986.
-
(1986)
STOC
, pp. 59-68
-
-
Goldwasser, S.1
Sipser, M.2
-
18
-
-
0003883054
-
Computational limitations for small depth circuits
-
Ph.D. thesis, MIT press
-
J. Håstad, Computational limitations for small depth circuits. Ph.D. thesis, 1986. MIT press.
-
(1986)
-
-
Håstad, J.1
-
19
-
-
0345253860
-
"A pseudo-random generator from any one-way function"
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, "A pseudo-random generator from any one-way function," SIAM Journal on Computing, vol. 28, no. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
21
-
-
0024866111
-
"A pseudo-random generator from any one-way function"
-
R. Impagliazzo, L. Levin, and M. Luby, "A pseudo-random generator from any one-way function," STOC, pp. 12-24, 1989.
-
(1989)
STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
22
-
-
0024771884
-
"How to recycle random bits"
-
R. Impagliazzo and D. Zuckerman, "How to recycle random bits," FOCS, pp. 248-253, 1990.
-
(1990)
FOCS
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
23
-
-
0003027047
-
"Monte-carlo algorithms for the planar multiterminal network reliability problem"
-
R. Karp and M. Luby, "Monte-carlo algorithms for the planar multiterminal network reliability problem," J. of Complexity, vol. 1, pp. 45-64, 1985.
-
(1985)
J. of Complexity
, vol.1
, pp. 45-64
-
-
Karp, R.1
Luby, M.2
-
24
-
-
0001202403
-
"Monte-carlo approximation algorithms for enumeration problems"
-
R. Karp, M. Luby, and N. Madras, "Monte-carlo approximation algorithms for enumeration problems," J. of Algorithms, vol. 10, no. 3, pp. 429-448, 1989.
-
(1989)
J. of Algorithms
, vol.10
, Issue.3
, pp. 429-448
-
-
Karp, R.1
Luby, M.2
Madras, N.3
-
25
-
-
85035142822
-
"Expanders, randomness, or time versus space"
-
R. Karp, N. Pippenger, and M. Sipser, "Expanders, randomness, or time versus space," First Annual Conference on Structure in Complexity Theory, pp. 325-329, 1986.
-
(1986)
First Annual Conference on Structure in Complexity Theory
, pp. 325-329
-
-
Karp, R.1
Pippenger, N.2
Sipser, M.3
-
26
-
-
33745486292
-
"Approximating the number of solutions to a GF[2] formula"
-
March
-
M. Karpinski and M. Luby, "Approximating the number of solutions to a GF[2] formula," Journal of Algorithms, vol. 14, no. 2, pp. 280-287, March 1993.
-
(1993)
Journal of Algorithms
, vol.14
, Issue.2
, pp. 280-287
-
-
Karpinski, M.1
Luby, M.2
-
27
-
-
0002284975
-
"Explicit expanders and the ramanujan conjectures"
-
A. Lubotzky, R. Phillips, and P. Sarnak, "Explicit expanders and the ramanujan conjectures," STOC, pp. 240-246,
-
STOC
, pp. 240-246
-
-
Lubotzky, A.1
Phillips, R.2
Sarnak, P.3
-
28
-
-
0000848816
-
"Ramanujan graphs"
-
1986
-
(See also: A. Lubotzky, R. Phillips, P. Sarnak. "Ramanujan graphs," Combinatorica, vol. 8, 1988, pp. 261-277)., 1986.
-
(1988)
Combinatorica
, vol.8
, pp. 261-277
-
-
Lubotzky, A.1
Phillips, R.2
Sarnak, P.3
-
29
-
-
0022807929
-
"A simple parallel algorithm for the maximal independent set problem"
-
November
-
M. Luby, "A simple parallel algorithm for the maximal independent set problem," SIAM J. on Computing, vol. 15, no. 4, pp. 1036-1053, November 1986.
-
(1986)
SIAM J. on Computing
, vol.15
, Issue.4
, pp. 1036-1053
-
-
Luby, M.1
-
30
-
-
0024045909
-
"Explicit group-theoretical constructions of combinatorial schemes and their application to the design of expanders and superconcentrators"
-
(in Russian). (English translation in vol. 24, 1988, pp. 39-46)
-
G. Margulis, "Explicit group-theoretical constructions of combinatorial schemes and their application to the design of expanders and superconcentrators," Problemy Peredachi Informatsii, vol. 24, pp. 51-60, (in Russian). (English translation in Problems of Information Transmission, vol. 24, 1988, pp. 39-46)., 1988.
-
(1988)
Problemy Peredachi Informatsii (Problems of Information Transmission)
, vol.24
, pp. 51-60
-
-
Margulis, G.1
-
31
-
-
0008827213
-
"Pseudorandom bits for constant depth circuits"
-
N. Nisan, "Pseudorandom bits for constant depth circuits," Combinatorica, vol. 1, pp. 63-70, 1991.
-
(1991)
Combinatorica
, vol.1
, pp. 63-70
-
-
Nisan, N.1
-
32
-
-
0026966106
-
"RL⊆SC"
-
N. Nisan, "RL⊆SC," STOC, pp. 619-623, 1992.
-
(1992)
STOC
, pp. 619-623
-
-
Nisan, N.1
-
33
-
-
0028516244
-
"Hardness vs. randomness"
-
N. Nisan and A. Wigderson, "Hardness vs. randomness," J. of Comp. Sci. and Sys., vol. 49, no. 2, pp. 149-167, 1994.
-
(1994)
J. of Comp. Sci. and Sys.
, vol.49
, Issue.2
, pp. 149-167
-
-
Nisan, N.1
Wigderson, A.2
-
34
-
-
0027208504
-
"More deterministic simulation in logspace"
-
N. Nisan and D. Zuckerman, "More deterministic simulation in logspace," STOC, pp. 235-244, 1993.
-
(1993)
STOC
, pp. 235-244
-
-
Nisan, N.1
Zuckerman, D.2
-
37
-
-
0020931594
-
"A complexity theoretic approach to randomness"
-
M. Sipser, "A complexity theoretic approach to randomness," STOC, pp. 330-335, 1983.
-
(1983)
STOC
, pp. 330-335
-
-
Sipser, M.1
-
38
-
-
0004276049
-
Introduction to the theory of computation
-
PWS Publishing
-
M. Sipser, Introduction to the theory of computation. PWS Publishing, 1997.
-
(1997)
-
-
Sipser, M.1
-
39
-
-
49249151236
-
"The complexity of computing the permanent"
-
L. Valiant, "The complexity of computing the permanent," Theoretical Computer Science, no. 8, pp. 189-201, 1979.
-
(1979)
Theoretical Computer Science
, Issue.8
, pp. 189-201
-
-
Valiant, L.1
-
40
-
-
0022911518
-
"NP is as easy as detecting unique solutions"
-
L. Valiant and V. Vazirani, "NP is as easy as detecting unique solutions," Theoretical Computer Science, vol. 47, pp. 85-93, 1986.
-
(1986)
Theoretical Computer Science
, vol.47
, pp. 85-93
-
-
Valiant, L.1
Vazirani, V.2
-
41
-
-
0019572642
-
"New hash functions and their use in authentication and set equality"
-
M. Wegman and J. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, vol. 22, no. 3, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
-
42
-
-
0020301290
-
"Theory and applications of trapdoor functions"
-
A. Yao, "Theory and applications of trapdoor functions," FOCS, pp. 80-91, 1982.
-
(1982)
FOCS
, pp. 80-91
-
-
Yao, A.1
-
43
-
-
0022201594
-
"Separating the polynomial-time hierarchy by oracles"
-
A. Yao, "Separating the polynomial-time hierarchy by oracles," FOCS, pp. 1-10, 1985.
-
(1985)
FOCS
, pp. 1-10
-
-
Yao, A.1
|