-
1
-
-
0003430191
-
The Probabilistic Method
-
John Wiley & Sons, Inc. New York
-
N. Alon, and J.H. Spencer The Probabilistic Method Wiley-Interscience Series 2000 John Wiley & Sons, Inc. New York
-
(2000)
Wiley-Interscience Series
-
-
Alon, N.1
Spencer, J.H.2
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
Charles H. Bennett, Gilles Brassard, and Robert Jean-Marc Privacy amplification by public discussion SIAM J. Comput. 17 2 April 1988 210 229
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Jean-Marc, R.3
-
3
-
-
33646375214
-
Estimates for the number of sums and products and for exponential sums in fields of prime order
-
J. Bourgain, A. Glibichuk, and S. Konyagin Estimates for the number of sums and products and for exponential sums in fields of prime order J. Lond. Math. Soc. 73 2 2006 380 398
-
(2006)
J. Lond. Math. Soc.
, vol.73
, Issue.2
, pp. 380-398
-
-
Bourgain, J.1
Glibichuk, A.2
Konyagin, S.3
-
4
-
-
34247566037
-
Extracting randomness using few independent sources
-
B. Barak, R. Impagliazzo, and A. Wigderson Extracting randomness using few independent sources SIAM J. Comput. 36 2006 1095 1118
-
(2006)
SIAM J. Comput.
, vol.36
, pp. 1095-1118
-
-
Barak, B.1
Impagliazzo, R.2
Wigderson, A.3
-
5
-
-
34848820045
-
Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors
-
Boaz Barak, Guy Kindler, Ronen Shaltiel, Benny Sudakov, Avi Wigderson, Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors, in: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005, pp. 1-10.
-
(2005)
Proceedings of the 37th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
6
-
-
51249178917
-
Independent unbiased coin flips from a correlated biased source: A finite Markov chain
-
M. Blum Independent unbiased coin flips from a correlated biased source: A finite Markov chain Combinatorica 6 2 1986 97 108
-
(1986)
Combinatorica
, vol.6
, Issue.2
, pp. 97-108
-
-
Blum, M.1
-
8
-
-
33746365070
-
More on the sum-product phenomenon in prime fields and its applications
-
J. Bourgain More on the sum-product phenomenon in prime fields and its applications Int. J. Number Theory 1 2005 1 32
-
(2005)
Int. J. Number Theory
, vol.1
, pp. 1-32
-
-
Bourgain, J.1
-
10
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Advances in Cryptology - EUROCRYPT 2000
-
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, and Amit Sahai Exposure-resilient functions and all-or-nothing transforms Bart Preneel, Advances in Cryptology - EUROCRYPT 2000 Lecture Notes in Comput. Sci. vol. 1807 May 2000 Springer-Verlag 453 469
-
(2000)
Lecture Notes in Comput. Sci.
, vol.1807
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
11
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, J. Friedman, O. Goldreich, J. Håstad, S. Rudich, R. Smolensky, The bit extraction problem or t-resilient functions, in: Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, 1985, pp. 396-407.
-
(1985)
Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
-
12
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor, and O. Goldreich Unbiased bits from sources of weak randomness and probabilistic communication complexity SIAM J. Comput. 17 2 1988 230 261
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
14
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen, A. Wigderson, Dispersers, deterministic amplification, and weak random sources, in: Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989, pp. 14-19.
-
(1989)
Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 14-19
-
-
Cohen, A.1
Wigderson, A.2
-
18
-
-
34547843024
-
Deterministic extractors for bit-fixing sources by obtaining an independent seed
-
A. Gabizon, R. Raz, and R. Shaltiel Deterministic extractors for bit-fixing sources by obtaining an independent seed SIAM J. Comput. 36 2006 1072 1094
-
(2006)
SIAM J. Comput.
, vol.36
, pp. 1072-1094
-
-
Gabizon, A.1
Raz, R.2
Shaltiel, R.3
-
21
-
-
33646844308
-
Generalized strong extractors and deterministic privacy amplification
-
Cryptography and Coding 2005
-
Robert Koenig, and Ueli Maurer Generalized strong extractors and deterministic privacy amplification Nigel Smart, Cryptography and Coding 2005 Lecture Notes in Comput. Sci. vol. 3796 December 2005 Springer-Verlag 322 339
-
(2005)
Lecture Notes in Comput. Sci.
, vol.3796
, pp. 322-339
-
-
Koenig, R.1
Maurer, U.2
-
22
-
-
35448977790
-
Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
-
J. Kamp, and D. Zuckerman Deterministic extractors for bit-fixing sources and exposure-resilient cryptography SIAM J. Comput. 36 2006 1231 1247
-
(2006)
SIAM J. Comput.
, vol.36
, pp. 1231-1247
-
-
Kamp, J.1
Zuckerman, D.2
-
23
-
-
0012523366
-
Some extremal problems arising from discrete control processes
-
D. Lichtenstein, N. Linial, and M. Saks Some extremal problems arising from discrete control processes Combinatorica 9 3 1989 269 287
-
(1989)
Combinatorica
, vol.9
, Issue.3
, pp. 269-287
-
-
Lichtenstein, D.1
Linial, N.2
Saks, M.3
-
24
-
-
0006217743
-
Random walks on graphs: A survey
-
Combinatorics
-
L. Lovász Random walks on graphs: A survey D. Miklós, V.T. Sós, T. Szonyi, Combinatorics Paul Erdos is Eighty vol. 2 1996 J. Bolyai Math. Soc. Budapest 353 398
-
(1996)
Paul Erdos Is Eighty
, vol.2
, pp. 353-398
-
-
Lovász, L.1
-
25
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Advances in Cryptology - CRYPTO '97
-
Ueli Maurer, and Stefan Wolf Privacy amplification secure against active adversaries Burton S. Kaliski Jr. Advances in Cryptology - CRYPTO '97 Lecture Notes in Comput. Sci. vol. 1294 August 1997 Springer-Verlag 307 321
-
(1997)
Lecture Notes in Comput. Sci.
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
26
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
N. Nisan, and A. Ta-Shma Extracting randomness: A survey and new constructions J. Comput. System Sci. 58 1999 148 173
-
(1999)
J. Comput. System Sci.
, vol.58
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
28
-
-
33748105465
-
Extractors for a constant number of polynomially small min-entropy independent sources
-
A. Rao, Extractors for a constant number of polynomially small min-entropy independent sources, in: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006, pp. 497-506.
-
(2006)
Proceedings of the 38th Annual ACM Symposium on Theory of Computing
, pp. 497-506
-
-
Rao, A.1
-
30
-
-
0038309373
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
R. Raz, O. Reingold, and S. Vadhan Extracting all the randomness and reducing the error in Trevisan's extractors J. Comput. System Sci. 65 1 2002 97 128
-
(2002)
J. Comput. System Sci.
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
31
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Ronen Shaltiel Recent developments in explicit constructions of extractors Bull. Eur. Assoc. Theor. Comput. Sci. 77 June 2002 67 95
-
(2002)
Bull. Eur. Assoc. Theor. Comput. Sci.
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
33
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
DOI 10.1016/0022-0000(86)90044-9
-
M. Santha, and U.V. Vazirani Generating quasi-random sequences from semi-random sources J. Comput. System Sci. 33 1986 75 87 (Pubitemid 17484840)
-
(1984)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha Miklos1
Vazirani Umesh, V.2
-
34
-
-
0021469810
-
Generating quasirandom sequences from semirandom sources
-
Twenty-fifth Annual Symposium on Foundations of Computer Science Singer Island, Fla., 1984
-
Miklós Sántha, and Umesh V. Vazirani Generating quasirandom sequences from semirandom sources Twenty-fifth Annual Symposium on Foundations of Computer Science Singer Island, Fla., 1984 J. Comput. System Sci. 33 1 1986 75 87
-
(1986)
J. Comput. System Sci.
, vol.33
, Issue.1
, pp. 75-87
-
-
Sántha, M.1
Vazirani, U.V.2
-
35
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan Extractors and pseudorandom generators J. ACM 2001 860 879
-
(2001)
J. ACM
, pp. 860-879
-
-
Trevisan, L.1
-
38
-
-
4344628859
-
On constructing locally computable extractors and cryptosystems in the bounded-storage model
-
S. Vadhan On constructing locally computable extractors and cryptosystems in the bounded-storage model J. Cryptology 17 1 Winter 2004 43 77
-
(2004)
J. Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.1
-
39
-
-
0004262006
-
-
PhD thesis, EECS, University of California at Berkeley
-
U.V. Vazirani, Randomness, adversaries and computation, PhD thesis, EECS, University of California at Berkeley, 1986.
-
(1986)
Randomness, Adversaries and Computation
-
-
Vazirani, U.V.1
-
40
-
-
0023573599
-
Efficiency considerations in using semi-random sources (extended abstract)
-
Vazirani New York City, 25-27 May
-
Umesh V. Vazirani, Efficiency considerations in using semi-random sources (extended abstract), in: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York City, 25-27 May 1987, pp. 160-168.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 160-168
-
-
Umesh, V.1
-
41
-
-
51249175241
-
Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
-
Umesh V. Vazirani Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources Combinatorica 7 4 1987 375 392
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.V.1
-
44
-
-
0003101125
-
The differential equation method for random graph processes and greedy algorithms
-
M. Karonski, H.J. Proemel, PWN Warsaw
-
N.C. Wormald The differential equation method for random graph processes and greedy algorithms M. Karonski, H.J. Proemel, Lectures on Approximation and Randomized Algorithms 1999 PWN Warsaw 73 155
-
(1999)
Lectures on Approximation and Randomized Algorithms
, pp. 73-155
-
-
Wormald, N.C.1
-
45
-
-
0040707391
-
Expanders that beat the eigenvalue bound: Explicit construction and applications
-
A. Wigderson, and D. Zuckerman Expanders that beat the eigenvalue bound: Explicit construction and applications Combinatorica 19 1 1999 125 138
-
(1999)
Combinatorica
, vol.19
, Issue.1
, pp. 125-138
-
-
Wigderson, A.1
Zuckerman, D.2
-
46
-
-
0001023343
-
Simulating BPP using a general weak random source
-
D. Zuckerman Simulating BPP using a general weak random source Algorithmica 16 1996 367 391
-
(1996)
Algorithmica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
-
47
-
-
43849088675
-
Linear degree extractors and the inapproximability of max clique and chromatic number
-
D. Zuckerman Linear degree extractors and the inapproximability of max clique and chromatic number Theory Comput. 3 2007 103 128
-
(2007)
Theory Comput.
, vol.3
, pp. 103-128
-
-
Zuckerman, D.1
|