-
3
-
-
0002771903
-
Nondeterininistic exponential time has two-prover interactive protocols
-
L. Babai, L. Fortnow, and C. Lund. Nondeterininistic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3-40, 1991.
-
(1991)
Computational Complexity
, vol.1
, Issue.1
, pp. 3-40
-
-
Babai, L.1
Fortnow, L.2
Lund, C.3
-
4
-
-
0001338853
-
BPP has subexponential time simulations unless EXPTIME has publishable proofs
-
L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3(4):307-318, 1993.
-
(1993)
Computational Complexity
, vol.3
, Issue.4
, pp. 307-318
-
-
Babai, L.1
Fortnow, L.2
Nisan, N.3
Wigderson, A.4
-
6
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269-291, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
7
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, Nov. 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
8
-
-
35448998396
-
-
and, editors, Springer
-
C. Choffrut and T. Lengauer, editors. STACS 90, 7th Annual Symposium on Theoretical Aspects of Computer Science, Rouen, France, February 22-24, 1990, Proceedings, volume 415 of Lecture Notes in Computer Science. Springer, 1990.
-
(1990)
STACS 90, 7th Annual Symposium on Theoretical Aspects of Computer Science, Rouen, France, February 22-24, 1990, Proceedings, volume 415 of Lecture Notes in Computer Science
-
-
-
9
-
-
33748103563
-
Some improvements to total degree tests
-
K. Friedl and M. Sudan. Some improvements to total degree tests. In ISTCS, pages 190-198, 1995.
-
(1995)
ISTCS
, pp. 190-198
-
-
Friedl, K.1
Sudan, M.2
-
10
-
-
35448992038
-
-
O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998.
-
O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998.
-
-
-
-
11
-
-
4744337602
-
Uniform hardness versus randomness tradeoffs for Arthur-Merlin games
-
D. Gutfreund, R. Shaltiel, and A. Ta-Shma. Uniform hardness versus randomness tradeoffs for Arthur-Merlin games. Computational Complexity, 12(3-4):85-130, 2003.
-
(2003)
Computational Complexity
, vol.12
, Issue.3-4
, pp. 85-130
-
-
Gutfreund, D.1
Shaltiel, R.2
Ta-Shma, A.3
-
16
-
-
33847321516
-
Reducing the seed length in the Nisan-Wigderson generator
-
To appear in
-
R. Impagliazzo, R. Shaltiel, and A. Wigderson. Reducing the seed length in the Nisan-Wigderson generator. To appear in Combinatorica, 2006.
-
(2006)
Combinatorica
-
-
Impagliazzo, R.1
Shaltiel, R.2
Wigderson, A.3
-
20
-
-
15244352005
-
Derandomizing polynomial identity tests means proving circuit lower bounds
-
V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity, 13(1-2):1-46, 2004.
-
(2004)
Computational Complexity
, vol.13
, Issue.1-2
, pp. 1-46
-
-
Kabanets, V.1
Impagliazzo, R.2
-
21
-
-
0036588881
-
Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses
-
Oct
-
A. R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. SIAM Journal on Computing, 31(5):1501-1526, Oct. 2002.
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.5
, pp. 1501-1526
-
-
Klivans, A.R.1
van Melkebeek, D.2
-
22
-
-
35448988434
-
Efficient checking of computations
-
R. J. Lipton. Efficient checking of computations. In Choffrut and Lengauer [8], pages 207-215.
-
Choffrut and Lengauer
, vol.8
, pp. 207-215
-
-
Lipton, R.J.1
-
23
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. J. Cryptology, 17(1):27-42, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
30
-
-
0142027847
-
Pseudo-random generators for all hardnesses
-
C. Umans. Pseudo-random generators for all hardnesses. Journal of Computer and System Sciences, 67:419-440, 2003.
-
(2003)
Journal of Computer and System Sciences
, vol.67
, pp. 419-440
-
-
Umans, C.1
-
31
-
-
26944474386
-
Reconstructive dispersers and hitting set generators
-
C. Umans. Reconstructive dispersers and hitting set generators. In APPROX-RANDOM, pages 460-471, 2005.
-
(2005)
APPROX-RANDOM
, pp. 460-471
-
-
Umans, C.1
-
32
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptology, 17(1):43-77, 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
|