-
1
-
-
78149360960
-
Logical design with three-input majority gates
-
Akers, S., Robbins, T.: Logical design with three-input majority gates. Comput. Des. 12-27 (1963)
-
(1963)
Comput. Des.
, pp. 12-27
-
-
Akers, S.1
Robbins, T.2
-
3
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
Preliminary version in FOCS'92
-
Arora, S., Safra, S.: Probabilistic checking of proofs: a new characterization of NP. J. ACM 45(1), 70-122 (1998). Preliminary version in FOCS'92
-
(1998)
J. ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
4
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
Preliminary version in FOCS'92
-
Arora, S., Lund, C., Motwani, R., Sudan, M., Szegedy, M.: Proof verification and the hardness of approximation problems. J. ACM 45(3), 501-555 (1998). Preliminary version in FOCS'92
-
(1998)
J. ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
6
-
-
0142255894
-
Designs and codes: An update
-
Assmus, E. F., Key, J. D.: Designs and codes: An update. Des. Codes Cryptogr. 9(1), 7-27 (1996)
-
(1996)
Des. Codes Cryptogr
, vol.9
, Issue.1
, pp. 7-27
-
-
Assmus, E.F.1
Key, J.D.2
-
7
-
-
85028539051
-
Checking computations in polylogarithmic time
-
Babai, L., Fortnow, L., Levin, L. A., Szegedy, M.: Checking computations in polylogarithmic time. In: Proc. of the 23rd Annual ACM Symposium on the Theory of Computing (STOC), pp. 21-31 (1991)
-
(1991)
Proc. of the 23rd Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 21-31
-
-
Babai, L.1
Fortnow, L.2
Levin, L.A.3
Szegedy, M.4
-
8
-
-
0001338853
-
BPP Has subexponential time simulations unless EXPTIME has publishable proofs
-
Babai, L., Fortnow, L., Nisan, N., Wigderson, A.: BPP Has subexponential time simulations unless EXPTIME has publishable proofs. Comput. Complex. 3, 307-318 (1993)
-
(1993)
Comput. Complex
, vol.3
, pp. 307-318
-
-
Babai, L.1
Fortnow, L.2
Nisan, N.3
Wigderson, A.4
-
11
-
-
21144453606
-
General constructions for information-theoretic private information retrieval
-
Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2), 213-247 (2005)
-
(2005)
J. Comput. Syst. Sci.
, vol.71
, Issue.2
, pp. 213-247
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
13
-
-
0003723775
-
-
2nd edn. Cambridge University Press, Cambridge
-
Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vol. 1, 2nd edn. Cambridge University Press, Cambridge (1999)
-
(1999)
Design Theory
, vol.1
-
-
Beth, T.1
Jungnickel, D.2
Lenz, H.3
-
14
-
-
0029214558
-
Designing programs that check their work
-
Blum, M., Kannan, S.: Designing programs that check their work. J. ACM 42(1), 269-291 (1995)
-
(1995)
J. ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
15
-
-
0000460625
-
Minimum weight and dimension formulas for some geometric codes
-
Calkin, N. J., Key, J. D., De Resmini, M. J.: Minimum weight and dimension formulas for some geometric codes. Des. Codes Cryptogr. 17, 105-120 (1999)
-
(1999)
Des. Codes Cryptogr
, vol.17
, pp. 105-120
-
-
Calkin, N.J.1
Key, J.D.2
De Resmini, M.J.3
-
17
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proc. of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41-50 (1995)
-
(1995)
Proc. of the 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
19
-
-
0012523350
-
Universal service-providers for private information retrieval
-
Preliminary version in PODC'98
-
Di-Crescenzo, G., Ishai, Y., Ostrovsky, R.: Universal service-providers for private information retrieval. J. Cryptol. 14(1), 37-74 (2001). Preliminary version in PODC'98
-
(2001)
J. Cryptol
, vol.14
, Issue.1
, pp. 37-74
-
-
Di-Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
20
-
-
0034271895
-
Minimum-weight codewords as generators of generalized Reed-Muller codes
-
Ding, P., Key, J.: Minimum-weight codewords as generators of generalized Reed-Muller codes. IEEE Trans. Inf. Theory 46, 2152-2158 (2000)
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, pp. 2152-2158
-
-
Ding, P.1
Key, J.2
-
21
-
-
0030100766
-
Interactive proofs and the hardness of approximating cliques
-
Preliminary version in FOCS'91
-
Feige, U., Goldwasser, S., Lovasz, L., Safra, S., Szegedy, M.: Interactive proofs and the hardness of approximating cliques. J. ACM 43(2), 268-292 (1996). Preliminary version in FOCS'91
-
(1996)
J. ACM
, vol.43
, Issue.2
, pp. 268-292
-
-
Feige, U.1
Goldwasser, S.2
Lovasz, L.3
Safra, S.4
Szegedy, M.5
-
22
-
-
21144442219
-
A survey on private information retrieval
-
See
-
Gasarch, W.: A survey on private information retrieval. Bull. Eur. Assoc. Theor. Comput. Sci. 82, 72-107 (2004). See http://www.cs.umd.edu/~gasarch/pir/ pir.html for updates
-
(2004)
Bull. Eur. Assoc. Theor. Comput. Sci.
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
23
-
-
84972522455
-
On the p-rank of the incidence matrix of a balanced or partially balanced incomplete block design and its application to error-correcting codes
-
Hamada, N.: On the p-rank of the incidence matrix of a balanced or partially balanced incomplete block design and its application to error-correcting codes. Hiroshima Math. J. 3, 153-226 (1973)
-
(1973)
Hiroshima Math. J.
, vol.3
, pp. 153-226
-
-
Hamada, N.1
-
24
-
-
25444521247
-
The geometric structure and the p-rank of an affine triple system derived from a nonassociative moufang loop with the maximum associative center
-
Hamada, N.: The geometric structure and the p-rank of an affine triple system derived from a nonassociative moufang loop with the maximum associative center. J. Comb. Theory Ser. A 30(3), 285-297 (1981)
-
(1981)
J. Comb. Theory Ser. A
, vol.30
, Issue.3
, pp. 285-297
-
-
Hamada, N.1
-
25
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
Hirt, M., Maurer, U. M.: Player simulation and general adversary structures in perfect multiparty computation. J. Cryptol. 13(1), 31-60 (2000)
-
(2000)
J. Cryptol
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.M.2
-
27
-
-
33748114725
-
On the hardness of information-theoretic multiparty computation
-
Ishai, Y., Kushilevitz, E.: On the hardness of information-theoretic multiparty computation. In: Proc. EUROCRYPT, pp. 439-455 (2004)
-
(2004)
Proc. EUROCRYPT
, pp. 439-455
-
-
Ishai, Y.1
Kushilevitz, E.2
-
29
-
-
4544225791
-
Exponential lower bound for 2-query locally decodable codes
-
Preliminary version in STOC'03
-
Kerenidis, I., de Wolf, R.: Exponential lower bound for 2-query locally decodable codes. J. Comput. Syst. Sci. 395-420 (2004). Preliminary version in STOC'03
-
(2004)
J. Comput. Syst. Sci.
, pp. 395-420
-
-
Kerenidis, I.1
De Wolf, R.2
-
32
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
Lu, C.-J., Reingold, O., Vadhan, S. P., Wigderson, A.: Extractors: optimal up to constant factors. In: Proc. of the 35th Annual ACM Symposium on the Theory of Computing (STOC), pp. 602-611 (2003)
-
(2003)
Proc. of the 35th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhan, S.P.3
Wigderson, A.4
-
35
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
0035276434
-
Pseudorandom generators without the XOR lemma
-
Preliminary version in STOC'99
-
Sudan, M., Trevisan, L., Vadhan, S. P.: Pseudorandom generators without the XOR lemma. J. Comput. Syst. Sci. 62(2), 236-266 (2001). Preliminary version in STOC'99
-
(2001)
J. Comput. Syst. Sci.
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.P.3
-
37
-
-
0009140643
-
Linear perfert codes and a characterization of the classical designs
-
Tonchev, V. D.: Linear perfert codes and a characterization of the classical designs. Des. Codes Cryptogr. 17, 121-128 (1999)
-
(1999)
Des. Codes Cryptogr
, vol.17
, pp. 121-128
-
-
Tonchev, V.D.1
-
38
-
-
33748588052
-
Some applications of coding theory in computational complexity
-
Trevisan, L.: Some applications of coding theory in computational complexity. Quad. Mat. 13, 347-424 (2004).
-
(2004)
Quad. Mat.
, vol.13
, pp. 347-424
-
-
Trevisan, L.1
-
39
-
-
78149361938
-
-
Also available as
-
Also available as ECCC Report No. 43(2004)
-
(2004)
ECCC Report No. 43
-
-
|