-
2
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy Proof verification and the hardness of approximation problems J. ACM 45 3 1998 501 555
-
(1998)
J. ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
3
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
Yonatan Aumann, Michael Rabin, Information theoretically secure communication in the limited storage space model, in: Proceedings of CRYPTO '99, 1999, pp. 65-79.
-
(1999)
Proceedings of CRYPTO '99
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.2
-
4
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
Sanjeev Arora, and Shmuel Safra Probabilistic checking of proofs: A new characterization of NP J. ACM 45 1 1998 70 122
-
(1998)
J. ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
6
-
-
49049107158
-
On problems without polynomial kernels
-
Languages and Programming
-
Hans Bodlaender, Rod Downey, Michael Fellows, Danny Hermelin, On problems without polynomial kernels, in: Proceedings of 35th International Colloquium on Automata, Languages and Programming, 2008, pp. 563-574.
-
(2008)
Proceedings of 35th International Colloquium on Automata
, pp. 563-574
-
-
Bodlaender, H.1
Downey, R.2
Fellows, M.3
Hermelin, D.4
-
8
-
-
0031555827
-
Advice classes of parameterized tractability
-
Liming Cai, Jianer Chen, Rodney Downey, and Michael Fellows Advice classes of parameterized tractability Ann. Pure Appl. Logic 84 1 1997 119 138
-
(1997)
Ann. Pure Appl. Logic
, vol.84
, Issue.1
, pp. 119-138
-
-
Cai, L.1
Chen, J.2
Downey, R.3
Fellows, M.4
-
9
-
-
76249096645
-
Lower bounds for kernelizations and other preprocessing procedures
-
Lecture Notes in Comput. Sci., Springer-Verlag, 2009, in press
-
Yijia Chen, Jörg Flum, Moritz Müller, Lower bounds for kernelizations and other preprocessing procedures, in: Proceedings of Computability in Europe 2009, in: Lecture Notes in Comput. Sci., Springer-Verlag, 2009, in press.
-
Proceedings of Computability in Europe 2009
-
-
Yijia Chen, J.1
-
13
-
-
34250354807
-
The PCP theorem by gap amplification
-
Irit Dinur The PCP theorem by gap amplification J. ACM 54 3 2007
-
(2007)
J. ACM
, vol.54
, Issue.3
-
-
Dinur, I.1
-
14
-
-
84937431717
-
Hyper-encryption, everlasting security
-
Yan Zong Ding, Michael Rabin, Hyper-encryption, everlasting security, in: Annual Symposium on Theoretical Aspects of Computer Science, 2002, pp. 1-26.
-
(2002)
Annual Symposium on Theoretical Aspects of Computer Science
, pp. 1-26
-
-
Zong Ding, Y.1
Rabin, M.2
-
18
-
-
37149054237
-
Invitation to data reduction and problem kernelization
-
Jiong Guo, and Rolf Niedermeier Invitation to data reduction and problem kernelization ACM SIGACT News 38 1 2007 31 45
-
(2007)
ACM SIGACT News
, vol.38
, Issue.1
, pp. 31-45
-
-
Guo, J.1
Niedermeier, R.2
-
21
-
-
0030706544
-
Russell Impagliazzo, Avi Wigderson, P = BPP if e requires exponential circuits: Derandomizing the XOR lemma
-
Russell Impagliazzo, Avi Wigderson, P = BPP if E requires exponential circuits: Derandomizing the XOR lemma, in: Proceedings of the 29th Annual ACM Symposium on the Theory of Computing, 1997 pp. 220-229.
-
(1997)
Proceedings of the 29th Annual ACM Symposium on the Theory of Computing
, pp. 220-229
-
-
-
22
-
-
0000517449
-
Turing machines that take advice
-
Richard Karp, and Richard Lipton Turing machines that take advice Enseign. Math. 28 2 1982 191 209
-
(1982)
Enseign. Math.
, vol.28
, Issue.2
, pp. 191-209
-
-
Karp, R.1
Lipton, R.2
-
24
-
-
0036588881
-
Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses
-
Adam Klivans, and Dieter van Melkebeek Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses SIAM J. Comput. 31 5 2002 1501 1526
-
(2002)
SIAM J. Comput.
, vol.31
, Issue.5
, pp. 1501-1526
-
-
Klivans, A.1
Van Melkebeek, D.2
-
25
-
-
0000359018
-
Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis
-
Stephen Mahaney Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis J. Comput. System Sci. 25 2 1982 130 143
-
(1982)
J. Comput. System Sci.
, vol.25
, Issue.2
, pp. 130-143
-
-
Mahaney, S.1
-
26
-
-
78349311391
-
Parameterized complexity and approximation algorithms
-
in press
-
Daniel Márx, Parameterized complexity and approximation algorithms, The Computer Journal (2006), in press.
-
(2006)
The Computer Journal
-
-
Márx, D.1
-
27
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Ueli Maurer Conditionally-perfect secrecy and a provably-secure randomized cipher J. Cryptology 5 1 1992 53 66
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
29
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Advances in cryptology EUROCRYPT 1998
-
Daniel Simon Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? Advances in Cryptology EUROCRYPT 1998 Lecture Notes in Comput. Sci. vol. 1403 1998 334 345
-
(1998)
Lecture Notes in Comput. Sci.
, vol.1403
, pp. 334-345
-
-
Simon, D.1
-
31
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded storage model
-
Salil Vadhan Constructing locally computable extractors and cryptosystems in the bounded storage model J. Cryptology 17 1 2004 43 77
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.1
-
32
-
-
78349308316
-
-
Personal communication
-
Dieter van Melkebeek, Personal communication, 2009.
-
(2009)
-
-
Van Melkebeek, D.1
-
33
-
-
0000205276
-
Some consequences of non-uniform conditions on uniform classes
-
Chee-Keng Yap Some consequences of non-uniform conditions on uniform classes Theoret. Comput. Sci. 26 1983 287 300
-
(1983)
Theoret. Comput. Sci.
, vol.26
, pp. 287-300
-
-
Yap, C.-K.1
|