-
1
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich, "Unbiased bits from sources of weak randomness and probabilistic communication complexity," SIAM Journal on Computing, vol. 17, no. 2, pp. 230-261, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
2
-
-
17744376438
-
Extracting randomness using few independent sources
-
B. Barak, R. Impagliazzo, and A. Wigderson, "Extracting randomness using few independent sources," in Proc. of 45th FOCS, 2004, pp. 384-393.
-
(2004)
Proc. of 45th FOCS
, pp. 384-393
-
-
Barak, B.1
Impagliazzo, R.2
Wigderson, A.3
-
3
-
-
34848820045
-
Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors
-
B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson, "Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors," in Proc. of 37th STOC, 2005, pp. 1-10.
-
(2005)
Proc. of 37th STOC
, pp. 1-10
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
4
-
-
34848882226
-
Extractors with weak random seeds
-
R. Raz, "Extractors with weak random seeds," in Proc. of 37th STOC, 2005, pp. 11-20.
-
(2005)
Proc. of 37th STOC
, pp. 11-20
-
-
Raz, R.1
-
5
-
-
33746365070
-
More on the sum-product phenomenon in prime fields and its applications
-
J. Bourgain, "More on the sum-product phenomenon in prime fields and its applications," International Journal of Number Theory, vol. 1, pp. 1-32, 2005.
-
(2005)
International Journal of Number Theory
, vol.1
, pp. 1-32
-
-
Bourgain, J.1
-
6
-
-
57949084783
-
Extractors for a constant number of polynomially small min-entropy independent sources
-
A. Rao, "Extractors for a constant number of polynomially small min-entropy independent sources," in Proc. of 38th STOC, 2006.
-
(2006)
Proc. of 38th STOC
-
-
Rao, A.1
-
8
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
U. V. Vazirani and V. V. Vazirani, "Random polynomial time is equal to slightly-random polynomial time," in Proc. of 26th FOCS, 1985, pp. 417-428.
-
(1985)
Proc. of 26th FOCS
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
9
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman, "Simulating BPP using a general weak random source," Algorithmica, vol. 16, pp. 367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
-
10
-
-
0031654488
-
Explicit OR-dispersers with polylog degree
-
M. Saks, A. Srinivasan, and S. Zhou, "Explicit OR-dispersers with polylog degree," Journal of the ACM, vol. 45, pp. 123-154, 1998.
-
(1998)
Journal of the ACM
, vol.45
, pp. 123-154
-
-
Saks, M.1
Srinivasan, A.2
Zhou, S.3
-
11
-
-
0033341167
-
Weak random sources, hitting sets, and BPP simulations
-
A. E. Andreev, A. E. F. Clementi, J. D. P. Rolim, and L. Trevisan, "Weak random sources, hitting sets, and BPP simulations," SIAM Journal on Computing, vol. 28, no. 6, pp. 2103-2116, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.E.1
Clementi, A.E.F.2
Rolim, J.D.P.3
Trevisan, L.4
-
12
-
-
17744370165
-
On the (im)possibility of cryptography with imperfect randomness
-
Y. Dodis, S. J. Ong, M. Prabhakaran, and A. Sahai, "On the (im)possibility of cryptography with imperfect randomness," in FOCS04, 2004, pp. 196-205.
-
(2004)
FOCS04
, pp. 196-205
-
-
Dodis, Y.1
Ong, S.J.2
Prabhakaran, M.3
Sahai, A.4
-
14
-
-
57949107508
-
Network extractor protocols
-
Y. T. Kalai, X. Li, A. Rao, and D. Zuckerman, "Network extractor protocols," in Proc. of 49th FOCS, 2008.
-
(2008)
Proc. of 49th FOCS
-
-
Kalai, Y.T.1
Li, X.2
Rao, A.3
Zuckerman, D.4
-
18
-
-
38049024277
-
On obfuscating point functions
-
H. Wee, "On obfuscating point functions," in Proc. of 37th STOC, 2005.
-
(2005)
Proc. of 37th STOC
-
-
Wee, H.1
-
21
-
-
77952325267
-
Extractors for 3 uneven length sources
-
A. Rao and D. Zuckerman, "Extractors for 3 uneven length sources," in Random 2008, 2008.
-
(2008)
Random 2008
-
-
Rao, A.1
Zuckerman, D.2
-
22
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. A. Levin, "A hard-core predicate for all one-way functions," in Proc. of 21st STOC, 1989, pp. 25-32.
-
(1989)
Proc. of 21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
23
-
-
0028516244
-
Hardness vs randomness
-
Oct.
-
N. Nisan and A. Wigderson, "Hardness vs randomness," Journal of Computer and System Sciences, vol. 49, no. 2, pp. 149-167, Oct. 1994.
-
(1994)
Journal of Computer and System Sciences
, vol.49
, Issue.2
, pp. 149-167
-
-
Nisan, N.1
Wigderson, A.2
-
24
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan, "Extractors and pseudorandom generators," Journal of the ACM, pp. 860-879, 2001.
-
(2001)
Journal of the ACM
, pp. 860-879
-
-
Trevisan, L.1
-
26
-
-
0034832181
-
Loss-less condensers, unbalanced expanders, and extractors
-
A. Ta-Shma, C. Umans, and D. Zuckerman, "Loss-less condensers, unbalanced expanders, and extractors," in Proc. of 33rd STOC, 2001, pp. 143-152.
-
(2001)
Proc. of 33rd STOC
, pp. 143-152
-
-
Ta-Shma, A.1
Umans, C.2
Zuckerman, D.3
-
27
-
-
27844593208
-
Simple extractors for all min-entropies and a new pseudorandom generator
-
R. Shaltiel and C. Umans, "Simple extractors for all min-entropies and a new pseudorandom generator," Journal of the ACM, vol. 52, pp. 172-216, 2005.
-
(2005)
Journal of the ACM
, vol.52
, pp. 172-216
-
-
Shaltiel, R.1
Umans, C.2
-
28
-
-
26944474386
-
Reconstructive dispersers and hitting set generators
-
C. Umans, "Reconstructive dispersers and hitting set generators," in APPROX-RANDOM, vol. 3624, 2005, pp. 460-471.
-
(2005)
APPROX-RANDOM
, vol.3624
, pp. 460-471
-
-
Umans, C.1
-
29
-
-
43849088675
-
Linear degree extractors and the inap-proximability of max clique and chromatic number
-
D. Zuckerman, "Linear degree extractors and the inap-proximability of max clique and chromatic number," in Theory of Computing, 2007, pp. 103-128.
-
(2007)
Theory of Computing
, pp. 103-128
-
-
Zuckerman, D.1
-
30
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Aug.
-
U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology - CRYPTO '97, vol. 1294, Aug. 1997, pp. 307-321.
-
(1997)
Advances in Cryptology - CRYPTO '97
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
|