메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 691-700

Deterministic extractors for small-space sources

Author keywords

Pseudorandomness; Randomness Extractors

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; MATHEMATICAL MODELS; POLYNOMIALS; RANDOM PROCESSES;

EID: 33748100350     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1132516.1132613     Document Type: Conference Paper
Times cited : (41)

References (36)
  • 1
    • 17744376438 scopus 로고    scopus 로고
    • Extracting randomness using few independent sources
    • B. Barak, R. Impagliazzo, and A. Wigderson, Extracting randomness using few independent sources. In 45th FOCS, pages 384-393, 2004.
    • (2004) 45th FOCS , pp. 384-393
    • Barak, B.1    Impagliazzo, R.2    Wigderson, A.3
  • 2
    • 34848820045 scopus 로고    scopus 로고
    • Simulating independence: New constructions of condensers, ramsey graphs, dispersers, and extractors
    • B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson. Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors, In 37th STOC, pages 1-10, 2005.
    • (2005) 37th STOC , pp. 1-10
    • Barak, B.1    Kindler, G.2    Shaltiel, R.3    Sudakov, B.4    Wigderson, A.5
  • 3
    • 0002897287 scopus 로고
    • Collective coin flipping
    • S. Micali, editor, Academic Press, New York
    • M. Ben-Or and N. Linial. Collective coin flipping. In S. Micali, editor, Randomness and Computation, pages 91-115, Academic Press, New York, 1990.
    • (1990) Randomness and Computation , pp. 91-115
    • Ben-Or, M.1    Linial, N.2
  • 4
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Apr.
    • C. H. Bennett, G. Brassard, and J. Robert. Privacy amplification by public discussion, SICOMP, 17(2):210-229, Apr. 1988.
    • (1988) SICOMP , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.3
  • 5
    • 51249178917 scopus 로고
    • Independent unbiased coin flips from a correlated biased source: A finite Markov chain
    • M. Blum. Independent unbiased coin flips from a correlated biased source: a finite Markov chain. Combinatorica, 6(2):97-108, 1986.
    • (1986) Combinatorica , vol.6 , Issue.2 , pp. 97-108
    • Blum, M.1
  • 6
    • 33746365070 scopus 로고    scopus 로고
    • More on the sum-product phenomenon in prime fields and its applications
    • J. Bourgain. More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory, 1:1-32, 2005.
    • (2005) International Journal of Number Theory , vol.1 , pp. 1-32
    • Bourgain, J.1
  • 7
    • 85009383363 scopus 로고    scopus 로고
    • Estimates for the number of sums and products and for exponential sums in fields of prime order
    • To appear
    • J. Bourgain, A. Glibichuk, and S. Konyagin. Estimates for the number of sums and products and for exponential sums in fields of prime order. J. London Math. Soc., 2005. To appear.
    • (2005) J. London Math. Soc.
    • Bourgain, J.1    Glibichuk, A.2    Konyagin, S.3
  • 8
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000. Springer-Verlag, May
    • R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 453-469. Springer-Verlag, May 2000.
    • (2000) LNCS , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 10
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SICOMP, 17(2):230-261, 1988.
    • (1988) SICOMP , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 0024766880 scopus 로고
    • Dispersers, deterministic amplification, and weak random sources
    • A. Cohen and A. Wigderson. Dispersers, deterministic amplification, and weak random sources. In 30th FOCS, pages 14-19, 1989.
    • (1989) 30th FOCS , pp. 14-19
    • Cohen, A.1    Wigderson, A.2
  • 12
    • 0001632788 scopus 로고
    • On the order of magnitude of the difference between consecutive prime numbers
    • H. Cramer. On the order of magnitude of the difference between consecutive prime numbers. Acta Arithmetica, pages 23-46, 1937.
    • (1937) Acta Arithmetica , pp. 23-46
    • Cramer, H.1
  • 15
    • 17744384984 scopus 로고    scopus 로고
    • Deterministic extractors for bit-fixing sources by obtaining an independent seed
    • A. Gabizon, R. Raz, and R. Shaltiel. Deterministic extractors for bit-fixing sources by obtaining an independent seed. In 45th FOCS, pages 394-403, 2004.
    • (2004) 45th FOCS , pp. 394-403
    • Gabizon, A.1    Raz, R.2    Shaltiel, R.3
  • 17
    • 0344981502 scopus 로고    scopus 로고
    • Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
    • J. Kamp and D. Zuckerman. Deterministic extractors for bit-fixing sources and exposure-resilient cryptography, In 44th FOCS, pages 92-101, 2003.
    • (2003) 44th FOCS , pp. 92-101
    • Kamp, J.1    Zuckerman, D.2
  • 19
    • 33646844308 scopus 로고    scopus 로고
    • Generalized strong extractors and deterministic privacy amplification
    • N. Smart, editor, Cryptography and Coding 2005. Springer-Verlag, Dec.
    • R. Koenig and U. Maurer, Generalized strong extractors and deterministic privacy amplification. In N. Smart, editor, Cryptography and Coding 2005, volume 3796 of LNCS, pages 322-339. Springer-Verlag, Dec. 2005.
    • (2005) LNCS , vol.3796 , pp. 322-339
    • Koenig, R.1    Maurer, U.2
  • 20
    • 0012523366 scopus 로고
    • Some extremal problems arising from discrete control processes
    • D. Lichtenstein, N. Linial, and M. Saks. Some extremal problems arising from discrete control processes. Combinatorial, 9(3):269-287, 1989.
    • (1989) Combinatorial , vol.9 , Issue.3 , pp. 269-287
    • Lichtenstein, D.1    Linial, N.2    Saks, M.3
  • 21
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, Springer-Verlag, Aug.
    • U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 307-321, Springer-Verlag, Aug. 1997.
    • (1997) LNCS , vol.1294 , pp. 307-321
    • Maurer, U.1    Wolf, S.2
  • 22
    • 0033075850 scopus 로고    scopus 로고
    • Extracting randomness: A survey and new constructions
    • N. Nisan and A. Ta-Shma. Extracting randomness: A survey and new constructions. JCSS, 58:148-173, 1999.
    • (1999) JCSS , vol.58 , pp. 148-173
    • Nisan, N.1    Ta-Shma, A.2
  • 23
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan and D. Zuckerman, Randomness is linear in space. JCSS, 52(1):43-52, 1996.
    • (1996) JCSS , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 24
    • 33748105465 scopus 로고    scopus 로고
    • Extractors for a constant number of polynomially small min-entropy independent sources
    • A. Rao. Extractors for a constant number of polynomially small min-entropy independent sources. In 38th STOC, 2006.
    • (2006) 38th STOC
    • Rao, A.1
  • 25
    • 34848882226 scopus 로고    scopus 로고
    • Extractors with weak random seeds
    • R. Raz. Extractors with weak random seeds. In 37th STOC, pages 11-20, 2005.
    • (2005) 37th STOC , pp. 11-20
    • Raz, R.1
  • 26
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. JCSS, 33:75-87, 1986.
    • (1986) JCSS , vol.33 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 28
    • 33748108797 scopus 로고    scopus 로고
    • How to get more mileage from randomness extractors
    • ECCC
    • R. Shaltiel. How to get more mileage from randomness extractors. Technical Report TR05-145, ECCC, 2005.
    • (2005) Technical Report TR05-145
    • Shaltiel, R.1
  • 29
    • 0029703427 scopus 로고    scopus 로고
    • On extracting randomness from weak random sources
    • A. Ta-Shma. On extracting randomness from weak random sources. In 28th STOC, pages 276-285, 1996.
    • (1996) 28th STOC , pp. 276-285
    • Ta-Shma, A.1
  • 30
    • 0034505540 scopus 로고    scopus 로고
    • Extracting randomness from samplable distributions
    • L. Trevisan and S. P. Vadhan. Extracting randomness from samplable distributions. In 41st FOCS, pages 32-42, 2000.
    • (2000) 41st FOCS , pp. 32-42
    • Trevisan, L.1    Vadhan, S.P.2
  • 32
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
    • U. V. Vazirani, Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources. Combinatorica, 7(4):375-392, 1987.
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.V.1
  • 33
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • U. V. Vazirani and V. V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In 26th FOCS, pages 417-428, 1985.
    • (1985) 26th FOCS , pp. 417-428
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 35
    • 0040707391 scopus 로고    scopus 로고
    • Expanders that beat the eigenvalue bound: Explicit construction and applications
    • A. Wigderson and D. Zuckerman, Expanders that beat the eigenvalue bound: Explicit construction and applications. Combinatorica, 19(1):125-138, 1999.
    • (1999) Combinatorica , vol.19 , Issue.1 , pp. 125-138
    • Wigderson, A.1    Zuckerman, D.2
  • 36
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • D. Zuckerman, Simulating BPP using a general weak random source. Algorithmica, 16:367-391, 1996.
    • (1996) Algorithmica , vol.16 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.