-
2
-
-
34247619858
-
On the construction of affine extractors
-
J. Bourgain, "On the construction of affine extractors," Geometric & Functional Analysis, vol. 17 Number 1, pp. 33-57, 2007.
-
(2007)
Geometric & Functional Analysis
, vol.17
, Issue.1
, pp. 33-57
-
-
Bourgain, J.1
-
3
-
-
0036861262
-
A generalization of an addition theorem of kneser
-
X. Hour, K. Leung, and Q. Xiang, "A generalization of an addition theorem of kneser," Journal of Number Theory, vol. 97, pp. 1-9, 2002.
-
(2002)
Journal of Number Theory
, vol.97
, pp. 1-9
-
-
Hour, X.1
Leung, K.2
Xiang, Q.3
-
4
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Apr. special issue on cryptography
-
B. Chor and O. Goldreich, "Unbiased bits from sources of weak randomness and probabilistic communication complexity," SIAM Journal on Computing, vol. 17, no. 2, pp. 230-261, Apr. 1988, special issue on cryptography.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
5
-
-
0003087344
-
Various techniques used in connection with random digits
-
J. von Neumann, "Various techniques used in connection with random digits," Applied Math Series, vol. 12, pp. 36-38, 1951.
-
(1951)
Applied Math Series
, vol.12
, pp. 36-38
-
-
Von Neumann, J.1
-
9
-
-
51249175241
-
Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
-
-, "Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources," Combinatorica, vol. 7, pp. 375-392, 1987.
-
(1987)
Combinatorica
, vol.7
, pp. 375-392
-
-
Vazirani, U.1
-
11
-
-
17744369958
-
-
in Submitted
-
B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson, "Simulating independence: New consturctions of condenesers, ramsey graphs, dispersers, and extractors," in Submitted, 2004.
-
(2004)
Simulating Independence: New Consturctions of Condenesers, Ramsey Graphs, Dispersers, and Extractors
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
12
-
-
20544433132
-
Improved randomness extraction from two independent sources
-
RANDOM: International Workshop on Randomization and Approximation Techniques in Computer Science
-
Y. Dodis, A. Elbaz, R. Oliveira, and R. Raz, "Improved randomness extraction from two independent sources," in RANDOM: International Workshop on Randomization and Approximation Techniques in Computer Science. LNCS, 2004.
-
(2004)
LNCS
-
-
Dodis, Y.1
Elbaz, A.2
Oliveira, R.3
Raz, R.4
-
14
-
-
33748118575
-
2-Source dispersers for sub-polynomial entropy and ramsey graphs beating the frankl-wilson construction
-
B. Barak, A. Rao, R. Shaltiel, and A. Wigderson, "2-source dispersers for sub-polynomial entropy and ramsey graphs beating the frankl-wilson construction," in Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006.
-
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
-
-
Barak, B.1
Rao, A.2
Shaltiel, R.3
Wigderson, A.4
-
16
-
-
33748100350
-
Deterministic extractors for small-space sources
-
J. Kamp, A. Rao, S. Vadhan, and D. Zuckerman, "Deterministic extractors for small-space sources," in STOC: ACM Symposium on Theory of Computing (STOC), 2006.
-
STOC: ACM Symposium on Theory of Computing (STOC), 2006
-
-
Kamp, J.1
Rao, A.2
Vadhan, S.3
Zuckerman, D.4
-
17
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky, "The bit extraction problem or t-resilient functions," in Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, 1985.
-
Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, 1985
-
-
Chor, B.1
Goldreich, O.2
Hastad, J.3
Friedman, J.4
Rudich, S.5
Smolensky, R.6
-
19
-
-
17744384984
-
Determinsitic extractors for bitfixing sources by obtaining an independent seed
-
A. Gabizon, R. Raz, and R. Shaltiel, "Determinsitic extractors for bitfixing sources by obtaining an independent seed," in FOCS 2004, 2004.
-
(2004)
FOCS 2004
-
-
Gabizon, A.1
Raz, R.2
Shaltiel, R.3
-
21
-
-
0344058606
-
-
Cornell University, Computer Science Department, Technical Report TR88-959, Dec.
-
U. Vazirani and V. Vazirani, "Random polynomial time is equal to semi-random polynomial time," Cornell University, Computer Science Department, Technical Report TR88-959, Dec. 1988.
-
(1988)
Random Polynomial Time Is Equal to Semi-random Polynomial Time
-
-
Vazirani, U.1
Vazirani, V.2
-
22
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen and A. Wigderson, "Dispersers, deterministic amplification, and weak random sources," in Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989.
-
Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989
-
-
Cohen, A.1
Wigderson, A.2
-
24
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Oct./Nov.
-
-, "Simulating BPP using a general weak random source," Algorithmica, vol. 16, no. 4/5, pp. 367-391, Oct./Nov. 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
-
25
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," Journal of Computer and System Sciences, vol. 52, no. 1, pp. 43-52, 1996.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
28
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. Shaltiel, "Recent developments in explicit constructions of extractors," Bulletin of the EATCS, vol. 77, pp. 67-95, 2002.
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
30
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Feb.
-
A. Shamir, "On the generation of cryptographically strong pseudorandom sequences," ACM Trans. on Computer Sys., vol. 1, no. 1, p. 38, Feb. 1983.
-
(1983)
ACM Trans. on Computer Sys.
, vol.1
, Issue.1
, pp. 38
-
-
Shamir, A.1
-
31
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov.
-
M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo-random bits," SIAM Journal on Computing, vol. 13, no. 4, pp. 850-864, Nov. 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
32
-
-
0020301290
-
Theory and applications of trapdoor functions
-
(extended abstract), Chicago, Illinois: IEEE, 3-5 Nov.
-
A. C. Yao, "Theory and applications of trapdoor functions (extended abstract)," in 23rd Annual Symposium on Foundations of Computer Science. Chicago, Illinois: IEEE, 3-5 Nov. 1982, pp. 80-91.
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
33
-
-
0028516244
-
Hardness vs randomness
-
Oct.
-
N. Nisan and A. Wigderson, "Hardness vs randomness," Journal of Computer and System Sciences, vol. 49, no. 2, pp. 149-167, Oct. 1994.
-
(1994)
Journal of Computer and System Sciences
, vol.49
, Issue.2
, pp. 149-167
-
-
Nisan, N.1
Wigderson, A.2
-
34
-
-
34848865701
-
Undirected st-connectivity in log-space
-
O. Reingold, "Undirected st-connectivity in log-space," in STOC, 2005, pp. 376-385.
-
(2005)
STOC
, pp. 376-385
-
-
Reingold, O.1
-
35
-
-
51749084454
-
Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in
-
[Online]. Available
-
Z. Karnin and A. Shpilka, "Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in," in IEEE Conference on Computational Complexity. IEEE Computer Society, 2008, pp. 280-291. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/CCC. 2008.15
-
IEEE Conference on Computational Complexity. IEEE Computer Society, 2008
, pp. 280-291
-
-
Karnin, Z.1
Shpilka, A.2
-
36
-
-
77952350902
-
Blackbox polynomial identity testing for depth 3 circuits
-
IEEE Computer Society, [Online]. Available
-
N. Kayal and S. Saraf, "Blackbox polynomial identity testing for depth 3 circuits," in FOCS. IEEE Computer Society, 2009, pp. 198-207. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/FOCS.2009.67
-
(2009)
FOCS
, pp. 198-207
-
-
Kayal, N.1
Saraf, S.2
-
37
-
-
77955243406
-
From sylvester-gallai configurations to rank bounds: Improved black-box identity test for depth-3 circuits
-
vol. abs/1002.0145, informal publication. [Online]. Available
-
N. Saxena and C. Seshadhri, "From sylvester-gallai configurations to rank bounds: Improved black-box identity test for depth-3 circuits," CoRR, vol. abs/1002.0145, 2010, informal publication. [Online]. Available: http://arxiv.org/abs/1002.0145
-
(2010)
CoRR
-
-
Saxena, N.1
Seshadhri, C.2
-
40
-
-
0001303344
-
On some exponential sums
-
A. Weil, "On some exponential sums," in Proc. Nat. Acad. Sci. USA, vol. 34, 1948, pp. 204-207.
-
(1948)
Proc. Nat. Acad. Sci. USA
, vol.34
, pp. 204-207
-
-
Weil, A.1
-
41
-
-
0003215121
-
Equations over Finite Fields: An Elementary Approach
-
Springer-Verlag
-
W. M. Schmidt, Equations over Finite Fields: An Elementary Approach. Springer-Verlag, Lecture Notes in Mathematics, 1976, vol. 536.
-
(1976)
Lecture Notes in Mathematics
, vol.536
-
-
Schmidt, W.M.1
-
42
-
-
0039118587
-
On the interval containing at least one prime number
-
J. Nagura, "On the interval containing at least one prime number." Proceedings of the Japan Academy, vol. 28, pp. 177-181, 1952.
-
(1952)
Proceedings of the Japan Academy
, vol.28
, pp. 177-181
-
-
Nagura, J.1
|