-
4
-
-
0001338853
-
BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs
-
L. BABAI, L. FORTNOW, N. NISAN & A. WIGDERSON (1993). BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs. Computational Complexity 3(4), 307-318.
-
(1993)
Computational Complexity
, vol.3
, Issue.4
, pp. 307-318
-
-
BABAI, L.1
FORTNOW, L.2
NISAN, N.3
WIGDERSON, A.4
-
5
-
-
33745511846
-
Hiding Instances in Multioracle Queries
-
7th Annual Symposium on Theoretical Aspects of Computer Science, of, Springer
-
D. BEAVER & J. FEIGENBAUM (1990). Hiding Instances in Multioracle Queries. In 7th Annual Symposium on Theoretical Aspects of Computer Science, volume 415 of LNCS, 37-48. Springer.
-
(1990)
LNCS
, vol.415
, pp. 37-48
-
-
BEAVER, D.1
FEIGENBAUM, J.2
-
9
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
M. BLUM & S. MICALI (1984). How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing 13(4), 850-864.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
BLUM, M.1
MICALI, S.2
-
10
-
-
0030165961
-
Oracles and queries that are sufficient for exact learning
-
N. H. BSHOUTY, R. CLEVE, R. GAVALDA, S. KANNAN & C. TAMON (1996). Oracles and queries that are sufficient for exact learning. Journal of Computer and System Sciences 52(3), 421-433.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.3
, pp. 421-433
-
-
BSHOUTY, N.H.1
CLEVE, R.2
GAVALDA, R.3
KANNAN, S.4
TAMON, C.5
-
12
-
-
0000560640
-
On BPP and the Polynomial-Time Hierarchy
-
R. CANETTI (1996). On BPP and the Polynomial-Time Hierarchy. Information Processing Letters 57, 237-241.
-
(1996)
Information Processing Letters
, vol.57
, pp. 237-241
-
-
CANETTI, R.1
-
13
-
-
0027684980
-
Random-Self-Reducibility of Complete Sets
-
J. FEIGENBAUM & L. FORTNOW (1993). Random-Self-Reducibility of Complete Sets. SIAM J. Comput. 22(5), 994-1005.
-
(1993)
SIAM J. Comput
, vol.22
, Issue.5
, pp. 994-1005
-
-
FEIGENBAUM, J.1
FORTNOW, L.2
-
18
-
-
0009404434
-
Threshold Computation and Cryptographic Security
-
Y. HAN, L. A. HEMASPAANDRA & T. THIERAUF (1997). Threshold Computation and Cryptographic Security. SIAM J. Comput. 26(1), 59-78.
-
(1997)
SIAM J. Comput
, vol.26
, Issue.1
, pp. 59-78
-
-
HAN, Y.1
HEMASPAANDRA, L.A.2
THIERAUF, T.3
-
23
-
-
38249043088
-
Random generation of combinatorial structures from a uniform distribution
-
M. R. JERRUM, L. G. VALIANT & V. V. VAZIRANI (1986). Random generation of combinatorial structures from a uniform distribution. Theoretical Computer Science 43(2-3), 169-188.
-
(1986)
Theoretical Computer Science
, vol.43
, Issue.2-3
, pp. 169-188
-
-
JERRUM, M.R.1
VALIANT, L.G.2
VAZIRANI, V.V.3
-
25
-
-
0036588881
-
Graph Nonisomorphism Has Subexponential Size Proofs Unless the Polynomial-Time Hierarchy Collapses
-
A. R. KLIVANS & D. VAN MELKEBEEK (2002). Graph Nonisomorphism Has Subexponential Size Proofs Unless the Polynomial-Time Hierarchy Collapses. SIAM Journal on Computing 31(5), 1501-1526.
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.5
, pp. 1501-1526
-
-
KLIVANS, A.R.1
VAN MELKEBEEK, D.2
-
28
-
-
0032356378
-
Symmetric Alternation Captures BPP
-
A. RUSSELL & R. SUNDARAM (1998). Symmetric Alternation Captures BPP. Computational Complexity 7(2), 152-162.
-
(1998)
Computational Complexity
, vol.7
, Issue.2
, pp. 152-162
-
-
RUSSELL, A.1
SUNDARAM, R.2
-
32
-
-
0142027847
-
Pseudo-Random Generators for all Hardnesses
-
C. UMANS (2003). Pseudo-Random Generators for all Hardnesses. Journal of Computer and System Sciences 67, 419-440.
-
(2003)
Journal of Computer and System Sciences
, vol.67
, pp. 419-440
-
-
UMANS, C.1
-
33
-
-
0004089708
-
Error correction for algebraic block codes
-
U.S. Patent No. 4,633,470, issued December 30
-
L. R. WELCH & E. R. BERLEKAMP (1986). Error correction for algebraic block codes. U.S. Patent No. 4,633,470, issued December 30.
-
(1986)
-
-
WELCH, L.R.1
BERLEKAMP, E.R.2
|