-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
[ADR], June
-
[ADR] Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668-1680, June 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
2
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
[AR], 15-19 August 1999, Volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
[AR] Yonatan Aumann and Michael O. Rabin. Information theoretically secure communication in the limited storage space model. In Advances in Cryptology - CRYPTO '99, 15-19 August 1999, pages 65-79. Volume 1666 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
3
-
-
0003430191
-
-
[ASE]. Wiley-Interscience Series in Discrete Mathematics and Optimization. Wiley, New York
-
[ASE] Noga Alon, Joel H. Spencer, and Paul Erdös. The Probabilistic Method. Wiley-Interscience Series in Discrete Mathematics and Optimization. Wiley, New York, 1992.
-
(1992)
The Probabilistic Method
-
-
Alon, N.1
Spencer, J.H.2
Erdös, P.3
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
[BBR]. Special issue on cryptography
-
[BBR] Charles H. Bennett, Gilles Brassard, and Jean-Marc Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988. Special issue on cryptography.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
0040713388
-
Randomness in interactive proofs
-
[BGG]
-
[BGG] Mihir Beliare, Oded Goldreich, and Shafi Goldwasser. Randomness in interactive proofs. Computational Complexity, 3(4):319-354, 1993.
-
(1993)
Computational Complexity
, vol.3
, Issue.4
, pp. 319-354
-
-
Beliare, M.1
Goldreich, O.2
Goldwasser, S.3
-
6
-
-
33749228136
-
Randomness-efficient oblivious sampling
-
[BR], Santa Fe, NM, 20-22 November
-
[BR] Mihir Bellare and John Rompel. Randomness-efficient oblivious sampling. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, 20-22 November 1994, pages 276-287.
-
(1994)
Proceedings of the 35th Annual Symposium on Foundations of Computer Science
, pp. 276-287
-
-
Bellare, M.1
Rompel, J.2
-
7
-
-
0036292773
-
Streaming computation of combinatorial objects
-
[BRST], Montreal, 21-24 May 2002, IEEE Computer Society Press, Los Alamitos, CA
-
[BRST] Ziv Bar-Yossef, Omer Reingold, Ronen Shaltiel, and Luca Trevisan. Streaming computation of combinatorial objects. In Proceedings of the Seventeenth Annual IEEE Conference on Computational Complexity, Montreal, 21-24 May 2002, pages 165-174. IEEE Computer Society Press, Los Alamitos, CA, 2002.
-
(2002)
Proceedings of the Seventeenth Annual IEEE Conference on Computational Complexity
, pp. 165-174
-
-
Bar-Yossef, Z.1
Reingold, O.2
Shaltiel, R.3
Trevisan, L.4
-
8
-
-
35248891000
-
Forward-security in private-key cryptography
-
[BY]. In M. Joye, editor, Volume 2612 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
[BY] Mihir Bellare and Bennet Yee. Forward-security in private-key cryptography. In M. Joye, editor, Topics in Cryptology - CT-RSA 03, pages 1-18. Volume 2612 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2003.
-
(2003)
Topics in Cryptology - CT-RSA 03
, pp. 1-18
-
-
Bellare, M.1
Yee, B.2
-
9
-
-
0029220110
-
Lower bounds for sampling algorithms for estimating the average
-
[CEG], January
-
[CEG] Ran Canetti, Guy Even, and Oded Goldreich. Lower bounds for sampling algorithms for estimating the average. Information Processing Letters, 53(1):17-25, January 1995.
-
(1995)
Information Processing Letters
, vol.53
, Issue.1
, pp. 17-25
-
-
Canetti, R.1
Even, G.2
Goldreich, O.3
-
10
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
[CG1], April
-
[CG1] Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
11
-
-
0002739272
-
On the power of two-point based sampling
-
[CG2]
-
[CG2] Benny Chor and Oded Goldreich. On the power of two-point based sampling. Journal of Complexity, 5(1):96-106, 1989.
-
(1989)
Journal of Complexity
, vol.5
, Issue.1
, pp. 96-106
-
-
Chor, B.1
Goldreich, O.2
-
12
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
[CM]. In Burton S. Kaliski Jr., editor, Volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
[CM] Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burton S. Kaliski Jr., editor, Advances in Cryptotogy - CRYPTO '97, pages 292-306. Volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1997.
-
(1997)
Advances in Cryptotogy - CRYPTO '97
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
13
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
[DM], this issue
-
[DM] Stefan Dziembowski and Ueli Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, this issue, pp. 5-26.
-
Journal of Cryptology
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
14
-
-
84937431717
-
Hyper-encryption and everlasting security (extended abstract)
-
[DR], 14-16 March 2002, Volume 2285 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
[DR] Yan Zong Ding and Michael O. Rabin. Hyper-encryption and everlasting security (extended abstract). In STACS 2002 - 19th Annual Symposium on Theoretical Aspects of Computer Science, 14-16 March 2002, pages 1-26. Volume 2285 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
-
(2002)
STACS 2002 - 19th Annual Symposium on Theoretical Aspects of Computer Science
, pp. 1-26
-
-
Ding, Y.Z.1
Rabin, M.O.2
-
15
-
-
4344576266
-
Concentration of measure for randomized algorithms: Techniques and analysis
-
[DS]. In S. Rajasekaran et al., editor, Volume I, chapter 3, Kluwer, Dordrecht
-
[DS] Devdatt Dubhashi and Sandeep Sen. Concentration of measure for randomized algorithms: techniques and analysis. In S. Rajasekaran et al., editor, Handbook of Randomized Computing, Volume I, chapter 3, pages 35-100. Kluwer, Dordrecht, 2001.
-
(2001)
Handbook of Randomized Computing
, pp. 35-100
-
-
Dubhashi, D.1
Sen, S.2
-
16
-
-
0000646152
-
A Chernoff bound for random walks on expander graphs
-
[G1] electronic
-
[G1] David Gillman. A Chernoff bound for random walks on expander graphs. SIAM Journal on Computing, 27(4): 1203-1220 (electronic), 1998.
-
(1998)
SIAM Journal on Computing
, vol.27
, Issue.4
, pp. 1203-1220
-
-
Gillman, D.1
-
17
-
-
0003205419
-
A sample of samplers: A computational perspective on sampling
-
[G2], Electronic Colloquium on Computational Complexity, May
-
[G2] Oded Goldreich. A Sample of Samplers: A Computational Perspective on Sampling. Technical Report TR97-020, Electronic Colloquium on Computational Complexity, May 1997.
-
(1997)
Technical Report
, vol.TR97-020
-
-
Goldreich, O.1
-
18
-
-
0000871697
-
Explicit constructions of linear-sized superconcentrators
-
[GG], June
-
[GG] Ofer Gabber and Zvi Galil. Explicit constructions of linear-sized superconcentrators. Journal of Computer and System Sciences, 22(3):407-420, June 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 407-420
-
-
Gabber, O.1
Galil, Z.2
-
19
-
-
0031504510
-
Tiny families of functions with random properties: A quality-size trade-off for hashing
-
[GW]
-
[GW] Oded Goldreich and Avi Wigderson. Tiny families of functions with random properties: a quality-size trade-off for hashing. Random Structures & Algorithms, 11(4):315-343, 1997.
-
(1997)
Random Structures & Algorithms
, vol.11
, Issue.4
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
20
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
[HILL] (electronic)
-
[HILL] Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4): 1364-1396 (electronic), 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
21
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
[L], this issue
-
[L] Chi-Jen Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, this issue, pp. 27-42.
-
Journal of Cryptology
, pp. 27-42
-
-
Lu, C.-J.1
-
22
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
[LRVW], San Diego, CA, June
-
[LRVW] Chi-Jen Lu, Omer Reingold, Salil Vadhan, and Avi Wigderson. Extractors: Optimal up to constant factors. In Proceedings of the 35th ACM Symposium on Theory of Computing, San Diego, CA, June 2003, pages 602-611.
-
(2003)
Proceedings of the 35th ACM Symposium on Theory of Computing
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
23
-
-
0000789645
-
Explicit constructions of expanders
-
[M1]
-
[M1] G. A. Margulis. Explicit constructions of expanders. Problemy Peredči Informacii, 9(4):71-80, 1973.
-
(1973)
Problemy Peredči Informacii
, vol.9
, Issue.4
, pp. 71-80
-
-
Margulis, G.A.1
-
24
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
[M2]
-
[M2] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
25
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
[M3]
-
[M3] Ueli M. Maurer. Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3):733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
26
-
-
0000947929
-
Pseudorandom generators for space-bounded computation
-
[N]
-
[N] Noam Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449-461, 1992.
-
(1992)
Combinatorica
, vol.12
, Issue.4
, pp. 449-461
-
-
Nisan, N.1
-
27
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
[NT]
-
[NT] Noam Nisan and Amnon Ta-Shma. Extracting randomness: a survey and new constructions. Journal of Computer and System Sciences, 58(1):148-173, 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
29
-
-
4344563885
-
-
[R]. Personal communication, December
-
[R] Michael O. Rabin. Personal communication, December 2001.
-
(2001)
-
-
Rabin, M.O.1
-
30
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
[RT] (electronic)
-
[RT] Jaikumar Radhakrishnan and Amnon Ta-Shma. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Discrete Mathematics, 13(1):2-24 (electronic), 2000.
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
31
-
-
0038309373
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
[RRV]
-
[RRV] Ran Raz, Omer Reingold, and Salil Vadhan. Extracting all the randomness and reducing the error in Trevisan's extractors. Journal of Computer and System Sciences, 65(1):97-128, 2002.
-
(2002)
Journal of Computer and System Sciences
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
32
-
-
0034503771
-
Extracting randomness via repeated condensing
-
[RSW], Redondo Beach, CA, 12-14 November
-
[RSW] Omer Reingold, Ronen Shaltiel, and Avi Wigderson. Extracting randomness via repeated condensing. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science, Redondo Beach, CA, 12-14 November 2000, pages 22-31.
-
(2000)
Proceedings of the 41st Annual Symposium on Foundations of Computer Science
, pp. 22-31
-
-
Reingold, O.1
Shaltiel, R.2
Wigderson, A.3
-
33
-
-
0034503724
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors
-
[RVW]
-
[RVW] Omer Reingold, Salil Vadhan, and Avi Wigderson. Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science, pages 3-13, 2000.
-
(2000)
Proceedings of the 41st Annual Symposium on Foundations of Computer Science
, pp. 3-13
-
-
Reingold, O.1
Vadhan, S.2
Wigderson, A.3
-
35
-
-
84890522850
-
Communication theory of secrecy systems
-
[S2]
-
[S2] Claude E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
36
-
-
0031654488
-
Explicit OR-dispersers with polylogarithmic degree
-
[SSZ], January
-
[SSZ] Michael Saks, Aravind Srinivasan, and Shiyu Zhou. Explicit OR-dispersers with polylogarithmic degree. Journal of the ACM, 45(1): 123-154, January 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.1
, pp. 123-154
-
-
Saks, M.1
Srinivasan, A.2
Zhou, S.3
-
38
-
-
0036435072
-
Almost optimal dispersers
-
[T1]
-
[T1] Amnon Ta-Shma. Almost optimal dispersers. Combinatorica, 22(1):123-145, 2002.
-
(2002)
Combinatorica
, vol.22
, Issue.1
, pp. 123-145
-
-
Ta-Shma, A.1
-
39
-
-
0005314594
-
Extractors and pseudorandom generators
-
[T2], July
-
[T2] Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4): 860-879, July 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
41
-
-
0037972079
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
[V1]
-
[V1] Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002/162, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.162
-
-
Vadhan, S.P.1
-
42
-
-
35248849411
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
[V2]. In Dan Boneh, editor, 17-21 August 2003, Volume 2729 of Lecture Notes in Computer Science. Springer-Verlag, Berlin
-
[V2] Salil P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. In Dan Boneh, editor, Advances in Cryptology - CRYPTO '03, 17-21 August 2003, pages 61-77. Volume 2729 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2003.
-
(2003)
Advances in Cryptology - CRYPTO '03
, pp. 61-77
-
-
Vadhan, S.P.1
-
43
-
-
0001023343
-
Simulating BPP using a general weak random source
-
[Z1], October/November
-
[Z1] David Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, October/November 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
-
44
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
[Z2]
-
[Z2] David Zuckerman. Randomness-optimal oblivious sampling. Random Structures & Algorithms, 11(4):345-367, 1997.
-
(1997)
Random Structures & Algorithms
, vol.11
, Issue.4
, pp. 345-367
-
-
Zuckerman, D.1
|