-
5
-
-
0023995534
-
Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes
-
L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36(2):254-276, 1988.
-
(1988)
Journal of Computer and System Sciences
, vol.36
, Issue.2
, pp. 254-276
-
-
Babai, L.1
Moran, S.2
-
6
-
-
0040456486
-
A fast parallel algorithm for determining all roots of a polynomial with real roots
-
M. Ben-Or, E. Feig, D. Kozen, and P. Tiwari. A fast parallel algorithm for determining all roots of a polynomial with real roots. In Proceedings of the 18th Annual ACM Symposium on Theory of Computing, pages 340-349, 1986.
-
(1986)
Proceedings of the 18th Annual ACM Symposium on Theory of Computing
, pp. 340-349
-
-
Ben-Or, M.1
Feig, E.2
Kozen, D.3
Tiwari, P.4
-
7
-
-
84898945449
-
Multi-prover interactive proofs: How to remove intractability assumptions
-
M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: how to remove intractability assumptions. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 113-131, 1988.
-
(1988)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
9
-
-
0012462413
-
Computing matrix eigenvalues and polynomial zeros where the output is real
-
D. Bini and V. Pan. Computing matrix eigenvalues and polynomial zeros where the output is real. SIAM Journal on Computing, 27(4):1099-1115, 1998.
-
(1998)
SIAM Journal on Computing
, vol.27
, Issue.4
, pp. 1099-1115
-
-
Bini, D.1
Pan, V.2
-
10
-
-
0000849112
-
On relating time and space to size and depth
-
A. Borodin. On relating time and space to size and depth. SIAM Journal on Computing, 6:733-744, 1977.
-
(1977)
SIAM Journal on Computing
, vol.6
, pp. 733-744
-
-
Borodin, A.1
-
11
-
-
0020780139
-
Parallel computation for well-endowed rings and space-bounded probabilistic machines
-
A. Borodin, S. Cook, and N. Pippenger. Parallel computation for well-endowed rings and space-bounded probabilistic machines. Information and Control, 58:113-136, 1983.
-
(1983)
Information and Control
, vol.58
, pp. 113-136
-
-
Borodin, A.1
Cook, S.2
Pippenger, N.3
-
12
-
-
11144351679
-
Approximation by Algebraic Numbers
-
Cambridge University Press, Cambridge
-
Y. Bugeaud. Approximation by Algebraic Numbers, volume 160 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 2004.
-
(2004)
Cambridge Tracts in Mathematics
, vol.160
-
-
Bugeaud, Y.1
-
13
-
-
0000538288
-
Fast parallel matrix inversion algorithms
-
L. Csanky. Fast parallel matrix inversion algorithms. SIAM Journal on Computing, 5(4):618-623, 1976.
-
(1976)
SIAM Journal on Computing
, vol.5
, Issue.4
, pp. 618-623
-
-
Csanky, L.1
-
14
-
-
0002012024
-
Linear programming is log-space hard for P
-
D. Dobkin, R. Lipton, and S. Reiss. Linear programming is log-space hard for P. Information Processing Letters, 8(2):96-97, 1979.
-
(1979)
Information Processing Letters
, vol.8
, Issue.2
, pp. 96-97
-
-
Dobkin, D.1
Lipton, R.2
Reiss, S.3
-
15
-
-
0021420540
-
The complexity of promise problems with applications to public-key cryptography
-
S. Even, A. Selman, and Y. Yacobi. The complexity of promise problems with applications to public-key cryptography. Information and Control, 61(2):159-173, 1984.
-
(1984)
Information and Control
, vol.61
, Issue.2
, pp. 159-173
-
-
Even, S.1
Selman, A.2
Yacobi, Y.3
-
18
-
-
0003285494
-
Parallel linear algebra
-
J. Reif, editor, chapter 13. Morgan Kaufmann Publishers, Inc.
-
J. von zur Gathen. Parallel linear algebra. In J. Reif, editor, Synthesis of Parallel Algorithms, chapter 13. Morgan Kaufmann Publishers, Inc., 1993.
-
(1993)
Synthesis of Parallel Algorithms
-
-
Von Zur Gathen, J.1
-
19
-
-
33748683648
-
On promise problems (a survey in memory of Shimon even [1935-2004])
-
Report TR05-018
-
O. Goldreich. On promise problems (a survey in memory of Shimon Even [1935-2004]). Electronic Colloquium on Computational Complexity, Report TR05-018, 2005.
-
(2005)
Electronic Colloquium on Computational Complexity
-
-
Goldreich, O.1
-
20
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(1):691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
0001796243
-
Private coins versus public coins in interactive proof systems
-
S. Micali, editor, Randomness and Computation, JAI Press
-
S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. In S. Micali, editor, Randomness and Computation, volume 5 of Advances in Computing Research, pages 73-90. JAI Press, 1989.
-
(1989)
Advances in Computing Research
, vol.5
, pp. 73-90
-
-
Goldwasser, S.1
Sipser, M.2
-
25
-
-
49049100467
-
Making classical honest verifier zero knowledge protocols secure against quantum attacks
-
Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Springer
-
S. Hallgren, A. Kolla, P. Sen, and S. Zhang. Making classical honest verifier zero knowledge protocols secure against quantum attacks. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming, volume 5126 of Lecture Notes in Computer Science, pages 592-603. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5126
, pp. 592-603
-
-
Hallgren, S.1
Kolla, A.2
Sen, P.3
Zhang, S.4
-
29
-
-
68149178814
-
Using entanglement in quantum multi-prover interactive proofs
-
J. Kempe, H. Kobayashi, K. Matsumoto, and T. Vidick. Using entanglement in quantum multi-prover interactive proofs. Computational Complexity, 18(2):273-307, 2009.
-
(2009)
Computational Complexity
, vol.18
, Issue.2
, pp. 273-307
-
-
Kempe, J.1
Kobayashi, H.2
Matsumoto, K.3
Vidick, T.4
-
31
-
-
40249103101
-
General properties of quantum zero-knowledge proofs
-
Proceedings of the Fifth IACR Theory of Cryptography Conference, Springer
-
H. Kobayashi. General properties of quantum zero-knowledge proofs. In Proceedings of the Fifth IACR Theory of Cryptography Conference, volume 4948 of Lecture Notes in Computer Science, pages 107-124. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4948
, pp. 107-124
-
-
Kobayashi, H.1
-
32
-
-
0037561420
-
Quantum multi-prover interactive proof systems with limited prior entanglement
-
H. Kobayashi and K. Matsumoto. Quantum multi-prover interactive proof systems with limited prior entanglement. Journal of Computer and System Sciences, 66(3):429-450, 2003.
-
(2003)
Journal of Computer and System Sciences
, vol.66
, Issue.3
, pp. 429-450
-
-
Kobayashi, H.1
Matsumoto, K.2
-
33
-
-
0026930922
-
Algebraic methods for interactive proof systems
-
C. Lund, L. Fortnow, H. Karloff, and N. Nisan. Algebraic methods for interactive proof systems. Journal of the ACM, 39(4):859-868, 1992.
-
(1992)
Journal of the ACM
, vol.39
, Issue.4
, pp. 859-868
-
-
Lund, C.1
Fortnow, L.2
Karloff, H.3
Nisan, N.4
-
36
-
-
44049119317
-
A note on approximate linear programming
-
N. Megiddo. A note on approximate linear programming. Information Processing Letters, 42(1):53, 1992.
-
(1992)
Information Processing Letters
, vol.42
, Issue.1
, pp. 53
-
-
Megiddo, N.1
-
37
-
-
0037354371
-
Nineteen dubious ways to compute the exponential of a matrix, twenty-five years later
-
C. Moler and C. V. Loan. Nineteen dubious ways to compute the exponential of a matrix, twenty-five years later. SIAM Review, 45(1):3-49, 2003.
-
(2003)
SIAM Review
, vol.45
, Issue.1
, pp. 3-49
-
-
Moler, C.1
Loan, C.V.2
-
38
-
-
0028459683
-
Specified precision polynomial root isolation is in NC
-
C. A. Neff. Specified precision polynomial root isolation is in NC. Journal of Computer and System Sciences, 48(3):429-463, 1994.
-
(1994)
Journal of Computer and System Sciences
, vol.48
, Issue.3
, pp. 429-463
-
-
Neff, C.A.1
-
40
-
-
0026107466
-
Approximating linear programming is log-space complete for P
-
M. Serna. Approximating linear programming is log-space complete for P. Information Processing Letters, 37(4):233-236, 1991.
-
(1991)
Information Processing Letters
, vol.37
, Issue.4
, pp. 233-236
-
-
Serna, M.1
-
41
-
-
0026930543
-
IP = PSPACE
-
A. Shamir. IP = PSPACE. Journal of the ACM, 39(4):869-877, 1992.
-
(1992)
Journal of the ACM
, vol.39
, Issue.4
, pp. 869-877
-
-
Shamir, A.1
-
42
-
-
0026930375
-
IP = PSPACE: Simplified proof
-
A. Shen. IP = PSPACE: simplified proof. Journal of the ACM, 39(4):878-880, 1992.
-
(1992)
Journal of the ACM
, vol.39
, Issue.4
, pp. 878-880
-
-
Shen, A.1
-
44
-
-
33746083213
-
Online variance minimization
-
Proceedings of the 19th Annual Conference on Learning Theory, Springer
-
M. Warmuth and D. Kuzmin. Online variance minimization. In Proceedings of the 19th Annual Conference on Learning Theory, volume 4005 of Lecture Notes in Computer Science, pages 514-528. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4005
, pp. 514-528
-
-
Warmuth, M.1
Kuzmin, D.2
-
46
-
-
67650135522
-
Zero-knowledge against quantum attacks
-
J. Watrous. Zero-knowledge against quantum attacks. SIAM Journal on Computing, 39(1):25-58, 2009.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.1
, pp. 25-58
-
-
Watrous, J.1
|