-
1
-
-
57949110964
-
Algorithmic barriers from phase transitions
-
D. Achlioptas and A. Coja-Oghlan. Algorithmic barriers from phase transitions. In FOCS, pages 793-802, 2008.
-
(2008)
FOCS
, pp. 793-802
-
-
Achlioptas, D.1
Coja-Oghlan, A.2
-
2
-
-
27344461174
-
Lattice problems in NP intersect coNP
-
D. Aharonov and O. Regev. Lattice problems in NP intersect coNP. J. ACM, 52:749-765, 2005.
-
(2005)
J. ACM
, vol.52
, pp. 749-765
-
-
Aharonov, D.1
Regev, O.2
-
3
-
-
0030679849
-
A public-key cryptosystem with worst-case/average-case equivalence
-
M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In STOC, pages 284-293, 1997.
-
(1997)
STOC
, pp. 284-293
-
-
Ajtai, M.1
Dwork, C.2
-
4
-
-
0344118879
-
More on average case vs approximation complexity
-
M. Alekhnovich. More on average case vs approximation complexity. In FOCS, pages 298-307, 2003.
-
(2003)
FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
5
-
-
34547843026
-
Cryptography in NC0
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC0. SIAM J. Comput, 36(4):845-888, 2006.
-
(2006)
SIAM J. Comput
, vol.36
, Issue.4
, pp. 845-888
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
6
-
-
0031119485
-
The hardness of approximate optima in lattices, codes, and systems of linear equations
-
S. Arora, L. Babai, J. Stern, and Z. Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. J. Comput. Syst. Sci., 54(2):317-331, 1997.
-
(1997)
J. Comput. Syst. Sci.
, vol.54
, Issue.2
, pp. 317-331
-
-
Arora, S.1
Babai, L.2
Stern, J.3
Sweedyk, Z.4
-
7
-
-
84871752900
-
Computational complexity and information asymmetry in financial products
-
S. Arora, B. Barak, M. Brunnermeier, and R. Ge. Computational complexity and information asymmetry in financial products. In ICS, 2010.
-
(2010)
ICS
-
-
Arora, S.1
Barak, B.2
Brunnermeier, M.3
Ge, R.4
-
10
-
-
40349087309
-
Basing weak public-key cryptography on strong one-way functions
-
E. Biham, Y. J. Goren, and Y. Ishai. Basing weak public-key cryptography on strong one-way functions. In TCC, volume 4948, pages 55-72, 2008.
-
(2008)
TCC
, vol.4948
, pp. 55-72
-
-
Biham, E.1
Goren, Y.J.2
Ishai, Y.3
-
11
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
A. Blum, M. Furst, M. Kearns, and R. J. Lipton. Cryptographic primitives based on hard learning problems. In CRYPTO, pages 278-291, 1994.
-
(1994)
CRYPTO
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
12
-
-
84974698517
-
Relevant examples and relevant features: Thoughts from computational learning theory
-
A. L. Blum. Relevant examples and relevant features: Thoughts from computational learning theory. AAAI Fall Symposium on Relevance, 1994.
-
AAAI Fall Symposium on Relevance, 1994
-
-
Blum, A.L.1
-
13
-
-
0031334221
-
Selection of relevant features and examples in machine learning
-
A. L. Blum and P. Langley. Selection of relevant features and examples in machine learning. Artificial Intelligence, 97(1-2):245-271, 1997.
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1-2
, pp. 245-271
-
-
Blum, A.L.1
Langley, P.2
-
14
-
-
70350589609
-
On the security of goldreich's one-way function
-
A. Bogdanov and Y. Qiao. On the security of goldreich's one-way function. In APPROX-RANDOM, pages 392-405, 2009.
-
(2009)
APPROX-RANDOM
, pp. 392-405
-
-
Bogdanov, A.1
Qiao, Y.2
-
15
-
-
70350367955
-
0 circuits
-
0 circuits. In CCC, pages 3-8, 2009.
-
(2009)
CCC
, pp. 3-8
-
-
Braverman, M.1
-
16
-
-
77954742158
-
Rudich, and Smolensky. The bit extraction problem or t-resilient functions
-
Chor, Goldreich, Hastad, Freidmann, Rudich, and Smolensky. The bit extraction problem or t-resilient functions. In FOCS, 1985.
-
(1985)
FOCS
-
-
Chor, G.1
Hastad, F.2
-
17
-
-
77954694274
-
Goldreich's one-way function candidate and myopic backtracking algorithms
-
J. Cook, O. Etesami, R. Miller, and L. Trevisan. Goldreich's one-way function candidate and myopic backtracking algorithms. In TCC, 2009.
-
(2009)
TCC
-
-
Cook, J.1
Etesami, O.2
Miller, R.3
Trevisan, L.4
-
20
-
-
0141655066
-
Approximating cvp to within almost-polynomial factors is np-hard
-
I. Dinur, G. Kindler, R. Raz, and S. Safra. Approximating cvp to within almost-polynomial factors is np-hard. Combinatorica, 23(2):205-243, 2003.
-
(2003)
Combinatorica
, vol.23
, Issue.2
, pp. 205-243
-
-
Dinur, I.1
Kindler, G.2
Raz, R.3
Safra, S.4
-
21
-
-
38149139025
-
Witnesses for non-satisfiability of dense random 3CNF formulas
-
U. Feige, J. H. Kim, and E. Ofek. Witnesses for non-satisfiability of dense random 3CNF formulas. In FOCS, pages 497-508, 2006.
-
(2006)
FOCS
, pp. 497-508
-
-
Feige, U.1
Kim, J.H.2
Ofek, E.3
-
22
-
-
0005259971
-
The dense k-subgraph problem
-
U. Feige, D. Peleg, and G. Kortsarz. The dense k-subgraph problem. Algorithmica, 29(3):410-421, 2001.
-
(2001)
Algorithmica
, vol.29
, Issue.3
, pp. 410-421
-
-
Feige, U.1
Peleg, D.2
Kortsarz, G.3
-
23
-
-
84893574327
-
Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming
-
Goemans and Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. J. ACM, 42, 1995.
-
(1995)
J. ACM
, vol.42
-
-
Goemans1
Williamson2
-
25
-
-
0034205405
-
On the limits of nonapproximability of lattice problems
-
O. Goldreich and S. Goldwasser. On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci., 60(3):540-563, 2000.
-
(2000)
J. Comput. Syst. Sci.
, vol.60
, Issue.3
, pp. 540-563
-
-
Goldreich, O.1
Goldwasser, S.2
-
26
-
-
0027797493
-
On the existence of pseudorandom generators
-
O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM J. Comput, 22:1163, 1993.
-
(1993)
SIAM J. Comput
, vol.22
, pp. 1163
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
28
-
-
33745169714
-
One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
-
T. Holenstein and R. Renner. One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption. In CRYPTO, pages 478-493, 2005.
-
(2005)
CRYPTO
, pp. 478-493
-
-
Holenstein, T.1
Renner, R.2
-
30
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In STOC, pages 44-61, 1989.
-
(1989)
STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
31
-
-
57049124387
-
Cryptography with constant computational overhead
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Cryptography with constant computational overhead. In STOC, pages 433-442, 2008.
-
(2008)
STOC
, pp. 433-442
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
32
-
-
0038501444
-
Hiding cliques for cryptographic security
-
A. Juels and M. Peinado. Hiding cliques for cryptographic security. Designs, Codes and Cryptography, 20(3):269-280, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.20
, Issue.3
, pp. 269-280
-
-
Juels, A.1
Peinado, M.2
-
33
-
-
0028324717
-
Cryptographic limitations on learning Boolean formulae and finite automata
-
M. Kearns and L. Valiant. Cryptographic limitations on learning Boolean formulae and finite automata. J. ACM, 41(1):67-95, 1994.
-
(1994)
J. ACM
, vol.41
, Issue.1
, pp. 67-95
-
-
Kearns, M.1
Valiant, L.2
-
34
-
-
17744389433
-
Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique
-
S. Khot. Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique. In FOCS, pages 136-145, 2004.
-
(2004)
FOCS
, pp. 136-145
-
-
Khot, S.1
-
35
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
37
-
-
0141517272
-
A comparison of the Sherali-Adams, Lovasz-Schrijver, and Lasserre relaxations for 0-1 programming
-
M. Laurent. A comparison of the Sherali-Adams, Lovasz-Schrijver, and Lasserre relaxations for 0-1 programming. MOR: Mathematics of Operations Research, 28:470-496, 2003.
-
(2003)
MOR: Mathematics of Operations Research
, vol.28
, pp. 470-496
-
-
Laurent, M.1
-
39
-
-
0001154274
-
Cones of matrices and set-functions and 0-1 optimization
-
L. Lovász and A. Schrijver. Cones of matrices and set-functions and 0-1 optimization. SIAM Journal on Optimization, 1(2):166-190, 1991.
-
(1991)
SIAM Journal on Optimization
, vol.1
, Issue.2
, pp. 166-190
-
-
Lovász, L.1
Schrijver, A.2
-
40
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, pages 42-44, 1978.
-
(1978)
DSN Progress Report
, pp. 42-44
-
-
McEliece, R.J.1
-
41
-
-
0017959977
-
Secure communications over insecure channels
-
R. Merkle. Secure communications over insecure channels. Commun. ACM, 21(4):294-299, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.1
-
42
-
-
85015402934
-
Use of elliptic curves in cryptography
-
V. S. Miller. Use of elliptic curves in cryptography. In CRYPTO, volume 218, pages 417-426, 1985.
-
(1985)
CRYPTO
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
43
-
-
33746430446
-
On epsilon-biased generators in NC0
-
E. Mossel, A. Shpilka, and L. Trevisan. On epsilon-biased generators in NC0. Random Struct. Algorithms, 29(1):56-81, 2006.
-
(2006)
Random Struct. Algorithms
, vol.29
, Issue.1
, pp. 56-81
-
-
Mossel, E.1
Shpilka, A.2
Trevisan, L.3
-
44
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor. Bit commitment using pseudorandomness. J. Cryptology, 4(2):151-158, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
45
-
-
77954721112
-
An experimental evaluation of goldreich's one-way function
-
S. K. Panjwani. An experimental evaluation of goldreich's one-way function. Technical report, IIT, Bombay, 2001.
-
(2001)
Technical Report, IIT, Bombay
-
-
Panjwani, S.K.1
-
46
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
J. Patarin. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. In EUROCRYPT, pages 33-48, 1996.
-
(1996)
Eurocrypt
, pp. 33-48
-
-
Patarin, J.1
-
47
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem
-
C. Peikert. Public-key cryptosystems from the worst-case shortest vector problem. In STOC, pages 333-342, 2009.
-
(2009)
STOC
, pp. 333-342
-
-
Peikert, C.1
-
48
-
-
51849126892
-
A framework for efficient and composable oblivious transfer
-
C. Peikert, V. Vaikuntanathan, and B. Waters. A framework for efficient and composable oblivious transfer. In CRYPTO, pages 554-571, 2008.
-
(2008)
CRYPTO
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
-
50
-
-
20444451186
-
New lattice-based cryptographic constructions
-
O. Regev. New lattice-based cryptographic constructions. J. ACM, 51(6):899-942, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.6
, pp. 899-942
-
-
Regev, O.1
-
51
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev. On lattices, learning with errors, random linear codes, and cryptography. In STOC, pages 84-93, 2005.
-
(2005)
STOC
, pp. 84-93
-
-
Regev, O.1
-
52
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
53
-
-
57949101640
-
Linear level Lasserre lower bounds for certain k-csps
-
G. Schoenebeck. Linear level Lasserre lower bounds for certain k-csps. In FOCS, pages 593-602, 2008.
-
(2008)
FOCS
, pp. 593-602
-
-
Schoenebeck, G.1
-
54
-
-
0001321687
-
A hierarchy of relaxation between the continuous and convex hull representations for zero-one programming problems
-
H. D. Sherali and W. P. Adams. A hierarchy of relaxation between the continuous and convex hull representations for zero-one programming problems. SIAM J. Disc. Math., 3:411-430, 1990.
-
(1990)
SIAM J. Disc. Math.
, vol.3
, pp. 411-430
-
-
Sherali, H.D.1
Adams, W.P.2
-
55
-
-
51749100454
-
The sum of d small-bias generators fools polynomials of degree d
-
E. Viola. The sum of d small-bias generators fools polynomials of degree d. In CCC, pages 124-127, 2008.
-
(2008)
CCC
, pp. 124-127
-
-
Viola, E.1
-
56
-
-
0020301290
-
Theory and applications of trapdoor functions
-
A. C. C. Yao. Theory and applications of trapdoor functions. In FOCS, pages 80-91, 1982.
-
(1982)
FOCS
, pp. 80-91
-
-
Yao, A.C.C.1
|