-
1
-
-
0001338853
-
BPP has subexponential time simulations unless EXPTIME has publishable proofs
-
L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3:307-318, 1993.
-
(1993)
Computational Complexity
, vol.3
, pp. 307-318
-
-
Babai, L.1
Fortnow, L.2
Nisan, N.3
Wigderson, A.4
-
3
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In 20th STOC, pages 1-10, 1988.
-
(1988)
20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
4
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput., 13(4):850-864, 1984.
-
(1984)
SIAM J. Comput.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
84958034013
-
On the number of random bits in totally private computation
-
C. Blundo, A. D. Santis, G. Persiano, and U. Vaccaro. On the number of random bits in totally private computation. In 22nd ICALP, pages 171-182, 1995.
-
(1995)
22nd ICALP
, pp. 171-182
-
-
Blundo, C.1
Santis, A.D.2
Persiano, G.3
Vaccaro, U.4
-
6
-
-
0011213598
-
Randomness versus fault-tolerance
-
R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosen. Randomness versus fault-tolerance. Journal of Cryptology, 13(1):107-142, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 107-142
-
-
Canetti, R.1
Kushilevitz, E.2
Ostrovsky, R.3
Rosen, A.4
-
7
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In 20th STOC, pages 11-19, 1988.
-
(1988)
20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
8
-
-
0037769916
-
Lower bounds on the amount of randomness in private computation
-
A. Gal and A. Rosen. Lower bounds on the amount of randomness in private computation. In 35th STOC, pages 659-666, 2003.
-
(2003)
35th STOC
, pp. 659-666
-
-
Gal, A.1
Rosen, A.2
-
9
-
-
0026170859
-
Compression and ranking
-
A. V. Goldberg and M. Sipser. Compression and ranking. SIAM J. Comput., 20(3):524-536, 1991.
-
(1991)
SIAM J. Comput.
, vol.20
, Issue.3
, pp. 524-536
-
-
Goldberg, A.V.1
Sipser, M.2
-
11
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. Levin. A hard-core predicate for all one-way functions. In 21st STOC, pages 25-32, 1989.
-
(1989)
21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
14
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
16
-
-
33749556115
-
On the compressibility of NP instances and cryptographic applications
-
D. Harnik and M. Naor. On the compressibility of NP instances and cryptographic applications. ECCC, 2006.
-
(2006)
ECCC
-
-
Harnik, D.1
Naor, M.2
-
17
-
-
68549105769
-
Pseudorandom generators from one-way functions: A simple construction for any hardness
-
T. Holenstein. Pseudorandom generators from one-way functions: A simple construction for any hardness. In TCC '06, 2006.
-
(2006)
TCC '06
-
-
Holenstein, T.1
-
18
-
-
0029516814
-
Hard-core distributions for somewhat hard problems
-
R. Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th FOCS, pages 538-545, 1995.
-
(1995)
36th FOCS
, pp. 538-545
-
-
Impagliazzo, R.1
-
19
-
-
23844442856
-
In search of an easy witness: Exponential time vs. probabilistic polynomial time
-
R. Impagliazzo, V. Kabanets, and A. Wigderson. In search of an easy witness: Exponential time vs. probabilistic polynomial time. J. Comput. Syst. Sci., 65(4):672-694, 2002.
-
(2002)
J. Comput. Syst. Sci.
, vol.65
, Issue.4
, pp. 672-694
-
-
Impagliazzo, R.1
Kabanets, V.2
Wigderson, A.3
-
21
-
-
0030706544
-
P = BPP if e requires exponential circuits: Derandomizing the XOR lemma
-
R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In 29th STOC, pages 220-229, 1997.
-
(1997)
29th STOC
, pp. 220-229
-
-
Impagliazzo, R.1
Wigderson, A.2
-
22
-
-
33748114725
-
On the hardness of information-theoretic multiparty computation
-
Y. Ishai and E. Kushilevitz. On the hardness of information-theoretic multiparty computation. In EUROCRYPT '04, pages 439-455, 2004.
-
(2004)
EUROCRYPT '04
, pp. 439-455
-
-
Ishai, Y.1
Kushilevitz, E.2
-
23
-
-
24144497043
-
Sufficient conditions for collision-resistant hashing
-
Y. Ishai, E. Kushilevitz, and R. Ostrovsky. Sufficient conditions for collision-resistant hashing. In TCC '05, pages 445-456, 2005.
-
(2005)
TCC '05
, pp. 445-456
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
-
25
-
-
0038107689
-
Derandomizing polynomial identity tests means proving circuit lower bounds
-
V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. In 35th STOC, pages 355-364, 2003.
-
(2003)
35th STOC
, pp. 355-364
-
-
Kabanets, V.1
Impagliazzo, R.2
-
26
-
-
0032631765
-
Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses
-
A. R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. In 31st STOC, pages 659-667, 1999.
-
(1999)
31st STOC
, pp. 659-667
-
-
Klivans, A.R.1
Van Melkebeek, D.2
-
27
-
-
0002918554
-
The complexity of nonuniform random number generation
-
ed. J. Traub
-
D. E. Knuth and A. C. Yao. The complexity of nonuniform random number generation. Algorithms and Complexity, ed. J. Traub, pages 357-428, 1976.
-
(1976)
Algorithms and Complexity
, pp. 357-428
-
-
Knuth, D.E.1
Yao, A.C.2
-
29
-
-
0029712050
-
Characterizing linear size circuits in terms of privacy
-
E. Kushilevitz, R. Ostrovsky, and A. Rosen. Characterizing linear size circuits in terms of privacy. In 28th STOC, pages 541-550, 1996.
-
(1996)
28th STOC
, pp. 541-550
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rosen, A.3
-
30
-
-
0027627287
-
Constant depth circuits, Fourier transform and learnability
-
N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, Fourier transform and learnability. Journal of the ACM, 40(3):607-620, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.3
, pp. 607-620
-
-
Linial, N.1
Mansour, Y.2
Nisan, N.3
-
31
-
-
0000947929
-
Pseudorandom generators for space-bounded computation
-
N. Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449-461, 1992.
-
(1992)
Combinatorica
, vol.12
, Issue.4
, pp. 449-461
-
-
Nisan, N.1
-
33
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, 1996.
-
(1996)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
34
-
-
0035175916
-
Simple extractors for all min-entropies and a new pseudo-random generator
-
R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In 42nd FOCS, pages 648-657, 2001.
-
(2001)
42nd FOCS
, pp. 648-657
-
-
Shaltiel, R.1
Umans, C.2
-
35
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
D. R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In EUROCRYPT '98, pages 334-345, 1998.
-
(1998)
EUROCRYPT '98
, pp. 334-345
-
-
Simon, D.R.1
-
36
-
-
0036040280
-
Algorithmic derandomization via complexity theory
-
D. Sivakumar. Algorithmic derandomization via complexity theory. In 34th STOC, pages 619-626, 2002.
-
(2002)
34th STOC
, pp. 619-626
-
-
Sivakumar, D.1
-
37
-
-
0035276434
-
Pseudorandom generators without the XOR Lemma
-
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR Lemma. J. Comput. Syst. Sci., 62(2):236-266, 2001.
-
(2001)
J. Comput. Syst. Sci.
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
38
-
-
0036039959
-
Pseudo-random generators for all hardnesses
-
C. Umans. Pseudo-random generators for all hardnesses. In 34th STOC, pages 627-634, 2001.
-
(2001)
34th STOC
, pp. 627-634
-
-
Umans, C.1
-
39
-
-
0020301290
-
Theory and applications of trapdoor functions
-
A. Yao. Theory and applications of trapdoor functions. In 23rd FOCS, pages 80-91, 1982.
-
(1982)
23rd FOCS
, pp. 80-91
-
-
Yao, A.1
|