메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 573-582

The complexity of online memory checking

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER NETWORKS; COMPUTER SCIENCE; CRYPTOGRAPHY; INFORMATION RETRIEVAL; INFORMATION SCIENCE; PROBLEM SOLVING; SERVERS;

EID: 33748605569     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SFCS.2005.71     Document Type: Conference Paper
Times cited : (82)

References (28)
  • 1
    • 0036039958 scopus 로고    scopus 로고
    • The invasiveness of off-line memory checking
    • M. Ajtai. The Invasiveness of Off-line Memory Checking. STOC 2002: 504-513
    • STOC 2002 , pp. 504-513
    • Ajtai, M.1
  • 2
    • 84983741260 scopus 로고    scopus 로고
    • Randomized simultaneous messages: Solution of a problem of yao in communication complexity
    • L. Babai and P. G. Kimmel. Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity. IEEE Conference on Computational Complexity 1997: 239-246
    • IEEE Conference on Computational Complexity 1997 , pp. 239-246
    • Babai, L.1    Kimmel, P.G.2
  • 3
    • 0032687055 scopus 로고    scopus 로고
    • One-way functions are essential for single-server private information retrieval
    • A. Beimel, Y. Ishai, E. Kushilevitz and T. Malkin. One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98
    • STOC 1999 , pp. 89-98
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 4
    • 85024585723 scopus 로고    scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • M. Bellare, O. Goldreich and S. Goldwasser. Incremental Cryptography: The Case of Hashing and Signing. CRYPTO 1994: 216-233
    • CRYPTO 1994 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 5
    • 0345350047 scopus 로고    scopus 로고
    • Incremental cryptography and application to virus protection
    • M. Bellare, O. Goldreich and S. Goldwasser. Incremental Cryptography and Application to Virus Protection. STOC 1995: 45-56
    • STOC 1995 , pp. 45-56
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 6
    • 0031334110 scopus 로고    scopus 로고
    • Does parallel repetition lower the error in computationally sound protocols?
    • M. Bellare, R. Impagliazzo and M. Naor. Does Parallel Repetition Lower the Error in Computationally Sound Protocols? FOCS 1997: 374-383
    • FOCS 1997 , pp. 374-383
    • Bellare, M.1    Impagliazzo, R.2    Naor, M.3
  • 8
    • 34848899251 scopus 로고    scopus 로고
    • Simple PCPs with poly-log rate and query complexity
    • E. Ben-Sasson and M. Sudan. Simple PCPs with Poly-log Rate and Query Complexity STOC 2005: 266-275
    • STOC 2005 , pp. 266-275
    • Ben-Sasson, E.1    Sudan, M.2
  • 10
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • M. Blum and S. Kannan. Designing Programs that Check Their Work. Journal of the ACM 42(1): 269-291 (1995)
    • (1995) Journal of the ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 11
    • 80051636706 scopus 로고    scopus 로고
    • Single database private information retrieval implies oblivious transfer
    • G. Di-Crescenzo, T. Malkin and R. Ostrovsky. Single Database Private Information Retrieval Implies Oblivious Transfer. EUROCRYPT 2000: 122-138
    • EUROCRYPT 2000 , pp. 122-138
    • Di-Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 12
    • 33748103563 scopus 로고    scopus 로고
    • Some improvements to total degree tests
    • K. Friedl and M. Sudan. Some Improvements to Total Degree Tests. ISTCS 1995: 190-198
    • ISTCS 1995 , pp. 190-198
    • Friedl, K.1    Sudan, M.2
  • 13
    • 85013455236 scopus 로고    scopus 로고
    • Codes for interactive authentication
    • P. Gemmell and M. Naor. Codes for Interactive Authentication. CRYPTO 1993: 355-367
    • CRYPTO 1993 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 15
    • 0023547498 scopus 로고    scopus 로고
    • Towards a theory of software protection and simulation by oblivious RAMs
    • O. Goldreich. Towards a Theory of Software Protection and Simulation by Oblivious RAMs. STOC 1987: 182-194
    • STOC 1987 , pp. 182-194
    • Goldreich, O.1
  • 16
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software Protection and Simulation on Oblivious RAMs. Journal of the ACM 43(3): 431-473 (1996)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 17
    • 0036949141 scopus 로고    scopus 로고
    • Locally testable codes and PCPs of almost-linear length
    • O. Goldreich and M. Sudan. Locally Testable Codes and PCPs of Almost-Linear Length. FOCS 2002: 13-22
    • FOCS 2002 , pp. 13-22
    • Goldreich, O.1    Sudan, M.2
  • 19
    • 0024770898 scopus 로고    scopus 로고
    • One-way functions are essential for complexity based cryptography
    • R. Impagliazzo and M. Luby. One-way Functions are Essential for Complexity Based Cryptography. FOCS 1989: 230-235
    • FOCS 1989 , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 20
    • 0033720713 scopus 로고    scopus 로고
    • On the efficiency of local decoding procedures for error-correcting codes
    • J. Katz and L. Trevisan. On the Efficiency of Local Decoding Procedures for Error-Correcting Codes. STOC 2000: 80-86
    • STOC 2000 , pp. 80-86
    • Katz, J.1    Trevisan, L.2
  • 21
    • 0033434847 scopus 로고    scopus 로고
    • On randomized one-round communication complexity
    • I. Kremer, N. Nisan and D. Ron. On Randomized One-Round Communication Complexity. Computational Complexity 8(1): 21-49 (1999)
    • (1999) Computational Complexity , vol.8 , Issue.1 , pp. 21-49
    • Kremer, I.1    Nisan, N.2    Ron, D.3
  • 23
    • 0024867751 scopus 로고    scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. STOC 1989: 33-43
    • STOC 1989 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 24
    • 0029706950 scopus 로고    scopus 로고
    • Public vs. private coin flips in one round communication games
    • I. Newman and M. Szegedy. Public vs. Private Coin Flips in One Round Communication Games. STOC 1996: 561-570
    • STOC 1996 , pp. 561-570
    • Newman, I.1    Szegedy, M.2
  • 25
    • 0025154732 scopus 로고    scopus 로고
    • Efficient computation on oblivious RAMs
    • R. Ostrovsky. Efficient Computation on Oblivious RAMs. STOC 1990: 514-523
    • STOC 1990 , pp. 514-523
    • Ostrovsky, R.1
  • 26
    • 0008519096 scopus 로고    scopus 로고
    • One-way functions are essential for non-trivial zero-knowledge
    • R. Ostrovsky and A. Wigderson. One-Way Functions are Essential for Non-Trivial Zero-Knowledge. ISTCS 1993: 3-17
    • ISTCS 1993 , pp. 3-17
    • Ostrovsky, R.1    Wigderson, A.2
  • 27
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and L. Carter. New Hash Functions and Their Use in Authentication and Set Equality. JCSS 22(3): 265-279 (1981)
    • (1981) JCSS , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2
  • 28
    • 85039623622 scopus 로고    scopus 로고
    • Some complexity questions related to distributive computing
    • A. Chi-Chih Yao. Some Complexity Questions Related to Distributive Computing. STOC 1979: 209-213
    • STOC 1979 , pp. 209-213
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.