-
1
-
-
84950117252
-
How to reduce your enemy's information (extended abstract)
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Bennett, C.H., Brassard, G., Robert, J.-M.: How to reduce your enemy's information (extended abstract). In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 468-476. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 468-476
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
2
-
-
70450232823
-
Survey: Network applications of bloom filters: A survey
-
Broder, A.Z., Mitzenmacher, M.: Survey: Network applications of bloom filters: A survey. Internet Mathematics 1(4) (2003)
-
(2003)
Internet Mathematics
, vol.1
, Issue.4
-
-
Broder, A.Z.1
Mitzenmacher, M.2
-
3
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230-261 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
6
-
-
0024866111
-
Pseudo-random generation from oneway functions (extended abstracts)
-
Seattle, Washington, May 15-17
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from oneway functions (extended abstracts). In: Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15-17, 1989, pp. 12-24 (1989)
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
7
-
-
0003294665
-
The art of computer programming
-
Addison-Wesley Longman Publishing Co, Inc, Boston
-
Knuth, D.E.: The art of computer programming. Sorting and Searching, vol. 3. Addison-Wesley Longman Publishing Co., Inc, Boston (1998)
-
(1998)
Sorting and Searching
, vol.3
-
-
Knuth, D.E.1
-
8
-
-
49049116151
-
-
Mitzenmacher, M., Vadhan, S.: Why simple hash functions work: Exploiting the entropy in a data stream. In: Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2008), January 20-22, 2008, pp. 746-755 (2008)
-
Mitzenmacher, M., Vadhan, S.: Why simple hash functions work: Exploiting the entropy in a data stream. In: Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2008), January 20-22, 2008, pp. 746-755 (2008)
-
-
-
-
10
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
Nisan, N., Ta-Shma, A.: Extracting randomness: A survey and new constructions. J. Comput. Syst. Sci. 58(1), 148-173 (1999)
-
(1999)
J. Comput. Syst. Sci
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
12
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
electronic
-
Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Discrete Mathematics 13(1), 2-24 (2000) (electronic)
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
13
-
-
51849154542
-
A note on the statistical difference of small direct products
-
Technical Report BUCS-TR-2004-032, Boston University Computer Science Department
-
Reyzin, L.: A note on the statistical difference of small direct products. Technical Report BUCS-TR-2004-032, Boston University Computer Science Department (2004)
-
(2004)
-
-
Reyzin, L.1
-
14
-
-
51849085457
-
-
Shaltiel, R.: Recent developments in extractors. In: Paun, G., Rozenberg, G., Salomaa, A. (eds.) Current Trends in Theoretical Computer Science. Algorithms and Complexity, 1. World Scientific, Singapore (2004)
-
Shaltiel, R.: Recent developments in extractors. In: Paun, G., Rozenberg, G., Salomaa, A. (eds.) Current Trends in Theoretical Computer Science. Algorithms and Complexity, vol. 1. World Scientific, Singapore (2004)
-
-
-
-
15
-
-
51849147757
-
The unified theory of pseudorandomness
-
September
-
Vadhan, S.: The unified theory of pseudorandomness. SIGACT News 38(3) (September 2007)
-
(2007)
SIGACT News
, vol.38
, Issue.3
-
-
Vadhan, S.1
-
16
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367-391 (1996)
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|