-
1
-
-
0027576476
-
Coin-flipping games immune against linear-sized coalitions
-
Apr
-
N. Alon and M. Naor. Coin-flipping games immune against linear-sized coalitions. SIAM Journal on Computing, 22(2):403-417, Apr. 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.2
, pp. 403-417
-
-
Alon, N.1
Naor, M.2
-
2
-
-
0033341167
-
Weak random sources, hitting sets, and BPP simulations
-
A. E. Andreev, A. E. F. Clementi, J. D. P. Rolim, and L. Trevisan. Weak random sources, hitting sets, and BPP simulations. SIAM Journal on Computing, 28:2103-2116, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, pp. 2103-2116
-
-
Andreev, A.E.1
Clementi, A.E.F.2
Rolim, J.D.P.3
Trevisan, L.4
-
5
-
-
0033700150
-
Perfect-information leader election with optimal resilience
-
R. B. Boppana and B. O. Narayanan. Perfect-information leader election with optimal resilience. SIAM J. Comput, 29(4):1304-1320, 2000.
-
(2000)
SIAM J. Comput
, vol.29
, Issue.4
, pp. 1304-1320
-
-
Boppana, R.B.1
Narayanan, B.O.2
-
6
-
-
0842305659
-
Towards realizing random oracles: Hash functions that hide all partial information
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In CRYPTO '97, pages 455-469, 1997.
-
(1997)
CRYPTO '97
, pp. 455-469
-
-
Canetti, R.1
-
7
-
-
46749095580
-
Cryptography from sunspots: How to use an imperfect reference string
-
R. Canetti, R. Pass, and A. Shelat. Cryptography from sunspots: How to use an imperfect reference string. In FOCS'07, pages 249-259, 2007.
-
(2007)
FOCS'07
, pp. 249-259
-
-
Canetti, R.1
Pass, R.2
Shelat, A.3
-
8
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
9
-
-
0008837570
-
Fast perfect-information leader-election protocols with linear immunity
-
J. Cooper and N. Linial. Fast perfect-information leader-election protocols with linear immunity. Combinatorica, 15(3):319-332, 1995.
-
(1995)
Combinatorica
, vol.15
, Issue.3
, pp. 319-332
-
-
Cooper, J.1
Linial, N.2
-
10
-
-
30744451262
-
On extracting private randomness over a public channel
-
Y. Dodis and R. Oliveira. On extracting private randomness over a public channel. In RANDOM 2003, pages 252-263, 2003.
-
(2003)
RANDOM 2003
, pp. 252-263
-
-
Dodis, Y.1
Oliveira, R.2
-
11
-
-
17744370165
-
On the (im)possibility of cryptography with imperfect randomness
-
Y. Dodis, S. J. Ong, M. Prabhakaran, and A. Sahai. On the (im)possibility of cryptography with imperfect randomness. In FOCS'04 pages 196-205, 2004.
-
(2004)
FOCS'04
, pp. 196-205
-
-
Dodis, Y.1
Ong, S.J.2
Prabhakaran, M.3
Sahai, A.4
-
12
-
-
0036957025
-
On the (non)universality of the one-time pad
-
Y. Dodis and J. Spencer. On the (non)universality of the one-time pad. In FOCS'02, pages 376-385, 2002.
-
(2002)
FOCS'02
, pp. 376-385
-
-
Dodis, Y.1
Spencer, J.2
-
13
-
-
0032614490
-
Noncryptographic selection protocols
-
U. Feige. Noncryptographic selection protocols. In FOCS'99, pages 142-152, 1999.
-
(1999)
FOCS'99
, pp. 142-152
-
-
Feige, U.1
-
14
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC '87, pages 218-229, 1987.
-
(1987)
STOC '87
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
38749153587
-
Fault-tolerant distributed computing in full-information networks
-
S. Goldwasser, E. Pavlov, and V. Vaikuntanathan. Fault-tolerant distributed computing in full-information networks. In FOCS, pages 15-26, 2006.
-
(2006)
FOCS
, pp. 15-26
-
-
Goldwasser, S.1
Pavlov, E.2
Vaikuntanathan, V.3
-
16
-
-
33646397282
-
Distributed computing with imperfect randomness
-
DISC 2005, Proceedings, of, Springer
-
S. Goldwasser, M. Sudan, and V. Vaikuntanathan. Distributed computing with imperfect randomness. In DISC 2005, Proceedings, volume 3724 of Lecture Notes in Computer Science, pages 288-302. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3724
, pp. 288-302
-
-
Goldwasser, S.1
Sudan, M.2
Vaikuntanathan, V.3
-
17
-
-
57949113684
-
Fast asynchronous Byzantine agreement and leader election with full information
-
B. Kapron, D. Kempe, V. King, J. Saia, and V. Sanwalani. Fast asynchronous Byzantine agreement and leader election with full information. In SODA'08, pages 1038-1047, 2008.
-
(2008)
SODA'08
, pp. 1038-1047
-
-
Kapron, B.1
Kempe, D.2
King, V.3
Saia, J.4
Sanwalani, V.5
-
18
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
U. M. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In CRYPTO '97, pages 307-321, 1997.
-
(1997)
CRYPTO '97
, pp. 307-321
-
-
Maurer, U.M.1
Wolf, S.2
-
19
-
-
0012524233
-
On the impossibility of private key cryptography with weakly random keys
-
J. L. Mclnnes and B. Pinkas. On the impossibility of private key cryptography with weakly random keys. In CRYPTO '90, pages 421-435, 1990.
-
(1990)
CRYPTO '90
, pp. 421-435
-
-
Mclnnes, J.L.1
Pinkas, B.2
-
21
-
-
0028062297
-
Simple and efficient leader election in the full information model
-
R. Ostrovsky, S. Rajagopalan, and U. Vazirani. Simple and efficient leader election in the full information model. In STOC'94, pages 234-242, 1994.
-
(1994)
STOC'94
, pp. 234-242
-
-
Ostrovsky, R.1
Rajagopalan, S.2
Vazirani, U.3
-
22
-
-
33748105465
-
Extractors for a constant number of polynomially small min-entropy independent sources
-
A. Rao. Extractors for a constant number of polynomially small min-entropy independent sources. In STOC'06, 2006.
-
(2006)
STOC'06
-
-
Rao, A.1
-
23
-
-
0035733591
-
Perfect information leader election in log* n+O (1) rounds
-
A. Russell and D. Zuckerman. Perfect information leader election in log* n+O (1) rounds. Journal of Computer and System Sciences, 63(4):612-626, 2001.
-
(2001)
Journal of Computer and System Sciences
, vol.63
, Issue.4
, pp. 612-626
-
-
Russell, A.1
Zuckerman, D.2
-
24
-
-
0000827336
-
A robust noncryptographic protocol for collective coin flipping
-
May
-
M. Saks. A robust noncryptographic protocol for collective coin flipping. SIAM Journal on Discrete Mathematics, 2(2):240-244, May 1989.
-
(1989)
SIAM Journal on Discrete Mathematics
, vol.2
, Issue.2
, pp. 240-244
-
-
Saks, M.1
-
25
-
-
0031654488
-
Explicit OR-dispersers with polylog degree
-
M. Saks, A. Srinivasan, and S. Zhou. Explicit OR-dispersers with polylog degree. Journal of the ACM, 45:123-154, 1998.
-
(1998)
Journal of the ACM
, vol.45
, pp. 123-154
-
-
Saks, M.1
Srinivasan, A.2
Zhou, S.3
-
26
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
U. V. Vazirani and V. V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In FOCS'85, pages 417-428, 1985.
-
(1985)
FOCS'85
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
27
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16:367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
-
28
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
D. Zuckerman. Randomness-optimal oblivious sampling. Random Structures and Algorithms, 11:345-367, 1997.
-
(1997)
Random Structures and Algorithms
, vol.11
, pp. 345-367
-
-
Zuckerman, D.1
|