-
1
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
November
-
Manuel Blum and Silvio Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, November 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
2
-
-
33644586323
-
Sublinear approximation of euclidean minimum spanning tree
-
A. Czumaj, F. Ergun, L. Fortnow, A. Magen, I. Newman, R. Rubinfeld, and C. Sohler. Sublinear approximation of euclidean minimum spanning tree. SIAM Journal on Computing, 35(1):91-109, 2005.
-
(2005)
SIAM Journal on Computing
, vol.35
, Issue.1
, pp. 91-109
-
-
Czumaj, A.1
Ergun, F.2
Fortnow, L.3
Magen, A.4
Newman, I.5
Rubinfeld, R.6
Sohler, C.7
-
3
-
-
34748902860
-
Bounded error probabilistic finite state automata
-
P. Pardalos, J. Reif, and J.Rolim, editors, Kluwer
-
A. Condon. Bounded error probabilistic finite state automata. In P. Pardalos, J. Reif, and J.Rolim, editors, Handbook on Randomized Computing, Volume II, pages 509-532. Kluwer, 2001.
-
(2001)
Handbook on Randomized Computing
, vol.2
, pp. 509-532
-
-
Condon, A.1
-
4
-
-
84879514989
-
Approximating the minimum spanning tree weight in sublinear time
-
B. Chazelle, R. Rubinfeld, and L. Trevisan. Approximating the minimum spanning tree weight in sublinear time. In Proceedings of the 28th International Colloquium on Automata, Languages, and Programming, pages 190-200, 2001.
-
(2001)
Proceedings of the 28th International Colloquium on Automata, Languages, and Programming
, pp. 190-200
-
-
Chazelle, B.1
Rubinfeld, R.2
Trevisan, L.3
-
6
-
-
24144491457
-
Fast Monte-Carlo algorithms for matrices I: Approximating matrix multiplication
-
Technical Report YALE/DCS/TR-1269, Yale University
-
P. Drineas, R. Kannan, and M. W. Mahoney. Fast Monte-Carlo algorithms for matrices I: Approximating matrix multiplication. Technical Report YALE/DCS/TR-1269, Yale University, 2004.
-
(2004)
-
-
Drineas, P.1
Kannan, R.2
Mahoney, M.W.3
-
7
-
-
34748833458
-
-
O. Goldreich. A sample of samplers: a computational perspective on sampling, May 1997. ECCC Technical report TR97-020, available at http://www.eccc.uni-trier.de/eccc.
-
O. Goldreich. A sample of samplers: a computational perspective on sampling, May 1997. ECCC Technical report TR97-020, available at http://www.eccc.uni-trier.de/eccc.
-
-
-
-
8
-
-
34247488433
-
Learning polynomials with queries - the highly noisy case
-
Technical Report TR98-060, Electronic Colloquium on Computational Complexity
-
O. Goldreich, R. Rubinfeld, and M. Sudan. Learning polynomials with queries - the highly noisy case. Technical Report TR98-060, Electronic Colloquium on Computational Complexity, 1998. http://www.eccc.uni-trier.de/eccc.
-
(1998)
-
-
Goldreich, O.1
Rubinfeld, R.2
Sudan, M.3
-
9
-
-
84959060458
-
Derandomization that is rarely wrong from short advice that is typically good
-
O. Goldreich and A. Wigderson. Derandomization that is rarely wrong from short advice that is typically good. In RANDOM 2002, pages 209-223, 2002.
-
(2002)
RANDOM 2002
, pp. 209-223
-
-
Goldreich, O.1
Wigderson, A.2
-
10
-
-
0345253860
-
pseudorandom generator from any one-way function
-
A, :1364-1396, A preliminary version appeared in 21rst STOC
-
Johan Hâstad, Russell Impagliazzo, Leonid Levin, and Michael Luby. A pseudorandom generator from any one-way function. SICOMP, 28(4):1364-1396, 1999. A preliminary version appeared in 21rst STOC, 1989.
-
(1989)
SICOMP
, vol.28
, Issue.4
-
-
Hâstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
11
-
-
34748885525
-
Hardness as randomness: A survey of universal derandomization. Technical Report
-
cs.CC/0304040
-
R. Impagliazzo. Hardness as randomness: a survey of universal derandomization. Technical Report CoRR cs.CC/0304040, 2003.
-
(2003)
CoRR
-
-
Impagliazzo, R.1
-
14
-
-
0041918981
-
Derandomization: A brief overview
-
Also available as ECCC 8-2002
-
Valentine Kabanets. Derandomization: a brief overview. Bulletin of the EATCS, 76:88-103, 2002. Also available as ECCC 8-2002.
-
(2002)
Bulletin of the EATCS
, vol.76
, pp. 88-103
-
-
Kabanets, V.1
-
15
-
-
15244352005
-
Derandomizing polynomial identity tests means proving circuit lower bounds
-
V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity, 13(1-2):1-46, 2004.
-
(2004)
Computational Complexity
, vol.13
, Issue.1-2
, pp. 1-46
-
-
Kabanets, V.1
Impagliazzo, R.2
-
16
-
-
29144466613
-
Derandomizing complexity classes
-
P Pardalos, J. Reif, and J.Rolim, editors, Kluwer Academic Publishers
-
Peter Bro Miltersen. Derandomizing complexity classes. In P Pardalos, J. Reif, and J.Rolim, editors, Handbook of Randomized Computing. Kluwer Academic Publishers, 2001.
-
(2001)
Handbook of Randomized Computing
-
-
Bro Miltersen, P.1
-
17
-
-
0000947929
-
Pseudorandom bits for space-bounded computation
-
N. Nisan. Pseudorandom bits for space-bounded computation. Combinatorica, 12(4):449-461, 1992.
-
(1992)
Combinatorica
, vol.12
, Issue.4
, pp. 449-461
-
-
Nisan, N.1
-
19
-
-
50549176920
-
Probabilistic automata
-
Michael O. Rabin. Probabilistic automata. Information and Control, 6(3):230-245, 1963.
-
(1963)
Information and Control
, vol.6
, Issue.3
, pp. 230-245
-
-
Rabin, M.O.1
-
20
-
-
0029720399
-
Randomization and derandomization in space-bounded computation
-
Michael E. Saks. Randomization and derandomization in space-bounded computation. In IEEE Conference on Computational Complexity, pages 128-149, 1996.
-
(1996)
IEEE Conference on Computational Complexity
, pp. 128-149
-
-
Saks, M.E.1
-
21
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860-879, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
23
-
-
26444474834
-
Simple extractors via constructions of cryptographic pseudo-random generators
-
Proceedings of the 32nd International Colloquium on Automata, Languages, and Programming, Springer-Verlag
-
M. Zimand. Simple extractors via constructions of cryptographic pseudo-random generators. In Proceedings of the 32nd International Colloquium on Automata, Languages, and Programming, Lecture Notes in Computer Science 3580, pages 115-127. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 115-127
-
-
Zimand, M.1
|