-
2
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Apr.
-
B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, Apr. 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
3
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, A. Fiat, and A. Shamir. Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77-94, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
5
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33 (4):792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
6
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Preliminary version in FOCS'86
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(1):691-729, 1991. Preliminary version in FOCS'86.
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
7
-
-
0027797493
-
On the existence of pseudorandom generators
-
O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM Journal on Computing, 22(6):1163-1175, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
10
-
-
77954734930
-
Efficient pseudorandom generators from exponentially hard one-way functions
-
I. Haitner, D. Harnik, and O. Reingold. Efficient pseudorandom generators from exponentially hard one-way functions. In Automata, Languages and Programming, 24th International Colloquium, ICALP, 2006.
-
Automata, Languages and Programming, 24th International Colloquium, ICALP, 2006
-
-
Haitner, I.1
Harnik, D.2
Reingold, O.3
-
11
-
-
77954636265
-
Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
-
I. Haitner, M. Nguyen, S. J. Ong, O. Reingold, and S. Vadhan. Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM Journal on Computing, 39(3):1153-1218, 2009.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.3
, pp. 1153-1218
-
-
Haitner, I.1
Nguyen, M.2
Ong, S.J.3
Reingold, O.4
Vadhan, S.5
-
12
-
-
70350668805
-
Inaccessible entropy
-
31 May-2 June
-
I. Haitner, O. Reingold, S. Vadhan, and H. Wee. Inaccessible entropy. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC '09), pages 611-620, 31 May-2 June 2009.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC '09)
, pp. 611-620
-
-
Haitner, I.1
Reingold, O.2
Vadhan, S.3
Wee, H.4
-
13
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Preliminary versions in STOC'89 and STOC'90
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999. Preliminary versions in STOC'89 and STOC'90.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
20
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
21
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Preliminary version in CRYPTO'89
-
M. Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151-158, 1991. Preliminary version in CRYPTO'89.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
23
-
-
0031097176
-
Decoding of Reed Solomon codes beyond the error-correction bound
-
DOI 10.1006/jcom.1997.0439, PII S0885064X97904398
-
M. Sudan. Decoding of Reed-Solomon codes beyond the error correction bound. J. of Complexity, 13:180-193, 1997. (Pubitemid 127172728)
-
(1997)
Journal of Complexity
, vol.13
, Issue.1
, pp. 180-193
-
-
Sudan, M.1
-
25
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
January
-
S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
26
-
-
0021518106
-
A theory of the learnable
-
L. G. Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134-1142, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
28
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Oct./Nov.
-
D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, Oct./Nov. 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|