-
1
-
-
51249178048
-
Eigenvalues, geometric expanders, sorting in rounds, amd Ramsey theory
-
N. Alon, "Eigenvalues, geometric expanders, sorting in rounds, amd Ramsey theory," Combinatorica, vol. 6, pp. 207-219, 1986.
-
(1986)
Combinatorica
, vol.6
, pp. 207-219
-
-
Alon, N.1
-
4
-
-
0347589496
-
Improved low-degree testing and its applications
-
S. Arora and M. Sudan, "Improved low-degree testing and its applications," Combinatorica, vol. 23, pp. 365-426, 2003.
-
(2003)
Combinatorica
, vol.23
, pp. 365-426
-
-
Arora, S.1
Sudan, M.2
-
5
-
-
85028539051
-
Checking computations in polylogarithmic time
-
L. Babai, L. Fortnow, L. Levin, and M. Szegedy, "Checking computations in polylogarithmic time," in ACM Symposium on Theory of Computing (STOC), pp. 21-31, 1991.
-
(1991)
ACM Symposium on Theory of Computing (STOC)
, pp. 21-31
-
-
Babai, L.1
Fortnow, L.2
Levin, L.3
Szegedy, M.4
-
7
-
-
79959750951
-
Rank bounds for design matrices with applications to combinatorial geometry and locally correctable codes
-
B. Barak, Z. Dvir, A. Wigderson, and A. Yehudayoff, "Rank bounds for design matrices with applications to combinatorial geometry and locally correctable codes," in ACM Symposium on Theory of Computing (STOC), 2011.
-
(2011)
ACM Symposium on Theory of Computing (STOC)
-
-
Barak, B.1
Dvir, Z.2
Wigderson, A.3
Yehudayoff, A.4
-
8
-
-
33748118575
-
2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction
-
B. Barak, A. Rao, R. Shaltiel, and A. Wigderson, "2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction," in ACM Symposium on Theory of Computing (STOC), pp. 671-680, 2006.
-
(2006)
ACM Symposium on Theory of Computing (STOC)
, pp. 671-680
-
-
Barak, B.1
Rao, A.2
Shaltiel, R.3
Wigderson, A.4
-
9
-
-
38049039951
-
On locally decodable codes, selfcorrectable codes, and t-private PIR
-
O. Barkol, Y. Ishai, and E. Weinreb, "On locally decodable codes, selfcorrectable codes, and t-private PIR," in International Workshop on Randomization and Computation (RANDOM), pp. 311-325, 2007.
-
(2007)
International Workshop on Randomization and Computation (RANDOM)
, pp. 311-325
-
-
Barkol, O.1
Ishai, Y.2
Weinreb, E.3
-
10
-
-
0000107258
-
Representing Boolean functions as polynomials modulo composite numbers
-
D. A. Barrington, R. Beigel, and S. Rudich, "Representing Boolean functions as polynomials modulo composite numbers," Computational Complexity, vol. 4, pp. 67-382, 1994.
-
(1994)
Computational Complexity
, vol.4
, pp. 67-382
-
-
Barrington, D.A.1
Beigel, R.2
Rudich, S.3
-
12
-
-
0002840876
-
Security with low communication overhead
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, "Security with low communication overhead," in International Cryptology Conference (CRYPTO), pp. 62-76, 1990.
-
(1990)
International Cryptology Conference (CRYPTO)
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
13
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, and P. Rogaway, "The round complexity of secure protocols," in ACM Symposium on Theory of Computing (STOC), pp. 503-513, 1990.
-
(1990)
ACM Symposium on Theory of Computing (STOC)
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
14
-
-
21144453606
-
General constructions for information-theoretic private information retrieval
-
A. Beimel, Y. Ishai, and E. Kushilevitz, "General constructions for information-theoretic private information retrieval," Journal of Computer and System Sciences, vol. 71, pp. 213-247, 2005.
-
(2005)
Journal of Computer and System Sciences
, vol.71
, pp. 213-247
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
15
-
-
0036957230
-
Breaking the O(n1/(2-1)) barrier for information-theoretic private information retrieval
-
A. Beimel, Y. Ishai, E. Kushilevitz, and J.-F. Raymond, "Breaking the O(n1/(2-1)) barrier for information-theoretic private information retrieval," in IEEE Symposium on Foundations of Computer Science (FOCS), pp. 261-270, 2002.
-
(2002)
IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 261-270
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Raymond, J.-F.4
-
16
-
-
84974593790
-
Reducing the servers' computation in private information retrieval: PIR with preprocessing
-
A. Beimel, Y. Ishai, and T. Malkin, "Reducing the servers' computation in private information retrieval: PIR with preprocessing," in International Cryptology Conference (CRYPTO), vol. 1880 of Lecture Notes in Computer Science, pp. 56-74, 2000.
-
(2000)
International Cryptology Conference (CRYPTO) 1880 of Lecture Notes in Computer Science
, pp. 56-74
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
18
-
-
78751561512
-
Local list decoding with a constant number of queries
-
A. Ben-Aroya, K. Efremenko, and A. Ta-Shma, "Local list decoding with a constant number of queries," in IEEE Symposium on Foundations of Computer Science (FOCS), pp. 715-722, 2010.
-
IEEE Symposium on Foundations of Computer Science (FOCS)
, vol.2010
, pp. 715-722
-
-
Ben-Aroya, A.1
Efremenko, K.2
Ta-Shma, A.3
-
20
-
-
57949116863
-
A hypercontractive inequality for matrix-valued functions with applications to quantum computing and LDCs
-
A. Ben-Aroya, O. Regev, and R. de Wolf, "A hypercontractive inequality for matrix-valued functions with applications to quantum computing and LDCs," in IEEE Symposium on Foundations of Computer Science (FOCS), pp. 477-486, 2008.
-
(2008)
IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 477-486
-
-
Ben-Aroya, A.1
Regev, O.2
De Wolf, R.3
-
21
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM Symposium on Theory of Computing (STOC), pp. 1-10, 1988.
-
(1988)
ACM Symposium on Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
22
-
-
84863301031
-
Tight lower bounds for 2-query LCCs over finite fields
-
A. Bhattacharyya, Z. Dvir, S. Saraf, and A. Shpilka, "Tight lower bounds for 2-query LCCs over finite fields," in IEEE Symposium on Foundations of Computer Science (FOCS), pp. 638-647, 2011.
-
IEEE Symposium on Foundations of Computer Science (FOCS)
, vol.2011
, pp. 638-647
-
-
Bhattacharyya, A.1
Dvir, Z.2
Saraf, S.3
Shpilka, A.4
-
24
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
M. Blum, M. Luby, and R. Rubinfeld, "Self-testing/correcting with applications to numerical problems," Journal of Computer and System Sciences, vol. 47, pp. 549-595, 1993.
-
(1993)
Journal of Computer and System Sciences
, vol.47
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
25
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in International Cryptology Conference (EUROCRYPT), vol. 1592 of Lecture Notes in Computer Science, pp. 402-414, 1999.
-
(1999)
International Cryptology Conference (EUROCRYPT) 1592 of Lecture Notes in Computer Science
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
27
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crepeau, and I. Damgard, "Multiparty unconditionally secure protocols," in ACM Symposium on Theory of Computing (STOC), pp. 11-19, 1988.
-
(1988)
ACM Symposium on Theory of Computing (STOC)
, pp. 11-19
-
-
Chaum, D.1
Crepeau, C.2
Damgard, I.3
-
29
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," Journal of the ACM, vol. 45, pp. 965-981, 1998.
-
(1998)
Journal of the ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
31
-
-
0036287481
-
Better lower bounds for locally decodable codes
-
A. Deshpande, R. Jain, T. Kavitha, S. Lokam, and J. Radhakrishnan, "Better lower bounds for locally decodable codes," in IEEE Computational Complexity Conference (CCC), pp. 184-193, 2002.
-
(2002)
IEEE Computational Complexity Conference (CCC)
, pp. 184-193
-
-
Deshpande, A.1
Jain, R.2
Kavitha, T.3
Lokam, S.4
Radhakrishnan, J.5
-
32
-
-
0012523350
-
Universal service-providers for private information retrieval
-
G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky, "Universal service-providers for private information retrieval," Journal of Cryptology, vol. 14, pp. 37-74, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 37-74
-
-
Di-Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
34
-
-
77955233118
-
On matrix rigidity and locally self-correctable codes
-
Z. Dvir, "On matrix rigidity and locally self-correctable codes," in IEEE Computational Complexity Conference (CCC), pp. 102-113, 2010.
-
IEEE Computational Complexity Conference (CCC)
, vol.2010
, pp. 102-113
-
-
Dvir, Z.1
-
36
-
-
77952402919
-
Extensions to the method of multiplicities, with applications to Kakeya sets and mergers
-
Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan, "Extensions to the method of multiplicities, with applications to Kakeya sets and mergers," in IEEE Symposium on Foundations of Computer Science (FOCS), pp. 181-190, 2009.
-
(2009)
IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 181-190
-
-
Dvir, Z.1
Kopparty, S.2
Saraf, S.3
Sudan, M.4
-
37
-
-
35448994446
-
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits
-
Z. Dvir and A. Shpilka, "Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits," SIAM Journal on Computing, vol. 36, no. 5, pp. 1404-1434, 2006.
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 1404-1434
-
-
Dvir, Z.1
Shpilka, A.2
-
38
-
-
70350642094
-
3-query locally decodable codes of subexponential length
-
K. Efremenko, "3-query locally decodable codes of subexponential length," in ACM Symposium on Theory of Computing (STOC), pp. 39-44, 2009.
-
(2009)
ACM Symposium on Theory of Computing (STOC)
, pp. 39-44
-
-
Efremenko, K.1
-
39
-
-
0003469050
-
List Decoding for Noisy Channels. Research laboratory for electronics
-
P. Elias, List Decoding for Noisy Channels. Research laboratory for electronics, MIT, 1957.
-
(1957)
MIT
-
-
Elias, P.1
-
42
-
-
21144442219
-
A survey on private information retrieval
-
W. Gasarch, "A survey on private information retrieval," The Bulletin of the EATCS, vol. 82, pp. 72-107, 2004.
-
(2004)
The Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
43
-
-
0001975984
-
Self testing/correcting for polynomials and for approximate functions
-
P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson, "Self testing/correcting for polynomials and for approximate functions," in ACM Symposium on Theory of Computing (STOC), pp. 32-42, 1991.
-
(1991)
ACM Symposium on Theory of Computing (STOC)
, pp. 32-42
-
-
Gemmell, P.1
Lipton, R.2
Rubinfeld, R.3
Sudan, M.4
Wigderson, A.5
-
44
-
-
0000377057
-
Highly resilient correctors for polynomials
-
P. Gemmell and M. Sudan, "Highly resilient correctors for polynomials," Information Processing Letters, vol. 43, pp. 169-174, 1992.
-
(1992)
Information Processing Letters
, vol.43
, pp. 169-174
-
-
Gemmell, P.1
Sudan, M.2
-
46
-
-
84937574654
-
A random server model for private information retrieval
-
Y. Gertner, S. Goldwasser, and T. Malkin, "A random server model for private information retrieval," in International Workshop on Randomization and Computation (RANDOM), vol. 1518 of Lecture Notes in Computer Science, pp. 200-217, 1998.
-
(1998)
International Workshop on Randomization and Computation (RANDOM) 1518 of Lecture Notes in Computer Science
, pp. 200-217
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
47
-
-
0034205020
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in private information retrieval schemes," Journal of Computer and System Sciences, vol. 60, pp. 592-629, 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.60
, pp. 592-629
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
48
-
-
0036287480
-
Lower bounds for locally decodable codes and private information retrieval
-
O. Goldreich, H. Karloff, L. Schulman, and L. Trevisan, "Lower bounds for locally decodable codes and private information retrieval," in IEEE Computational Complexity Conference (CCC), pp. 175-183, 2002.
-
(2002)
IEEE Computational Complexity Conference (CCC)
, pp. 175-183
-
-
Goldreich, O.1
Karloff, H.2
Schulman, L.3
Trevisan, L.4
-
50
-
-
0036701862
-
Constructing set-systems with prescribed intersection sizes
-
V. Grolmusz, "Constructing set-systems with prescribed intersection sizes," Journal of Algorithms, vol. 44, pp. 321-337, 2002.
-
(2002)
Journal of Algorithms
, vol.44
, pp. 321-337
-
-
Grolmusz, V.1
-
51
-
-
0034363403
-
Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs
-
V. Grolmusz, "Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs," Combinatorica, vol. 20, pp. 71-86, 2000.
-
(2000)
Combinatorica
, vol.20
, pp. 71-86
-
-
Grolmusz, V.1
-
53
-
-
38349146703
-
Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy
-
V. Guruswami and A. Rudra, "Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy," IEEE Transactions on Information Theory, vol. 54, pp. 135-150, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 135-150
-
-
Guruswami, V.1
Rudra, A.2
-
54
-
-
0034429184
-
Soft-decision decoding of Chinese Remainder Codes
-
Redondo Beach, California, November 12-14
-
V. Guruswami, A. Sahai, and M. Sudan, "Soft-decision decoding of Chinese Remainder Codes," in Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 159-168, Redondo Beach, California, November 12-14 2000.
-
(2000)
Proceedings of the IEEE Symposium on Foundations of Computer Science
, pp. 159-168
-
-
Guruswami, V.1
Sahai, A.2
Sudan, M.3
-
55
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometric codes
-
V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometric codes," IEEE Transactions on Information Theory, vol. 45, pp. 1757-1767, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
57
-
-
0002863426
-
Bounds for the quantity of information transmitted by a quantum communication channel
-
A. Holevo, "Bounds for the quantity of information transmitted by a quantum communication channel," Problems of Information Transmission, vol. 9, pp. 177-183, 1973.
-
(1973)
Problems of Information Transmission
, vol.9
, pp. 177-183
-
-
Holevo, A.1
-
59
-
-
77950208135
-
New constructions for query-efficient locally decodable codes of subexponential length
-
T. Itoh and Y. Suzuki, "New constructions for query-efficient locally decodable codes of subexponential length," IEICE Transactions on Information and Systems, pp. 263-270, 2010.
-
IEICE Transactions on Information and Systems
, vol.2010
, pp. 263-270
-
-
Itoh, T.1
Suzuki, Y.2
-
60
-
-
0033720713
-
On the efficiency of local decoding procedures for error-correcting codes
-
J. Katz and L. Trevisan, "On the efficiency of local decoding procedures for error-correcting codes," in ACM Symposium on Theory of Computing (STOC), pp. 80-86, 2000.
-
(2000)
ACM Symposium on Theory of Computing (STOC)
, pp. 80-86
-
-
Katz, J.1
Trevisan, L.2
-
61
-
-
78751546228
-
Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers
-
SIAM
-
K. S. Kedlaya and S. Yekhanin, "Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers," SIAM Journal on Computing, vol. 38, pp. 1952-1969, 2009.
-
(2009)
Journal on Computing
, vol.38
, pp. 1952-1969
-
-
Kedlaya, K.S.1
Yekhanin, S.2
-
62
-
-
4544225791
-
Exponential lower bound for 2-query locally decodable codes via a quantum argument
-
I. Kerenidis and R. de Wolf, "Exponential lower bound for 2-query locally decodable codes via a quantum argument," Journal of Computer and System Sciences, vol. 69, pp. 395-420, 2004.
-
(2004)
Journal of Computer and System Sciences
, vol.69
, pp. 395-420
-
-
Kerenidis, I.1
De Wolf, R.2
-
63
-
-
79959688264
-
High-rate codes with sublineartime decoding
-
S. Kopparty, S. Saraf, and S. Yekhanin, "High-rate codes with sublineartime decoding," in ACM Symposium on Theory of Computing (STOC), pp. 167-176, 2011.
-
ACM Symposium on Theory of Computing (STOC)
, vol.2011
, pp. 167-176
-
-
Kopparty, S.1
Saraf, S.2
Yekhanin, S.3
-
69
-
-
80051956244
-
Query-efficient locally decodable codes of subexponential length
-
Y. Meng Chee, T. Feng, S. Ling, H. Wang, and L. Zhang, "Query-efficient locally decodable codes of subexponential length," in Electronic Colloquium on Computational Complexity (ECCC), TR10-173, 2010.
-
(2010)
Electronic Colloquium on Computational Complexity (ECCC), TR10-173
-
-
Meng Chee, Y.1
Feng, T.2
Ling, S.3
Wang, H.4
Zhang, L.5
-
70
-
-
0002669842
-
Application of boolean algebra to switching circuit design and to error detection
-
D. E. Muller, "Application of boolean algebra to switching circuit design and to error detection," IEEE Transactions on Computers, vol. 3, pp. 6-12, 1954.
-
(1954)
IEEE Transactions on Computers
, vol.3
, pp. 6-12
-
-
Muller, D.E.1
-
80
-
-
70350677619
-
An Ω(n1/3) lower bound for bilinear group based private information retrieval
-
A. Razborov and S. Yekhanin, "An Ω(n1/3) lower bound for bilinear group based private information retrieval," Theory of Computing, vol. 3, pp. 221-238, 2007.
-
(2007)
Theory of Computing
, vol.3
, pp. 221-238
-
-
Razborov, A.1
Yekhanin, S.2
-
81
-
-
9144245836
-
A class of multiple-error-correcting codes and the decoding scheme
-
I. S. Reed, "A class of multiple-error-correcting codes and the decoding scheme," IEEE Transactions on Information Theory, vol. 4, pp. 38-49, 1954.
-
(1954)
IEEE Transactions on Information Theory
, vol.4
, pp. 38-49
-
-
Reed, I.S.1
-
84
-
-
78149414388
-
Improved lower bound on the size of Kakeya sets over finite fields
-
S. Saraf and M. Sudan, "Improved lower bound on the size of Kakeya sets over finite fields," Analysis and PDE, vol. 1, pp. 375-379, 2008.
-
(2008)
Analysis and PDE
, vol.1
, pp. 375-379
-
-
Saraf, S.1
Sudan, M.2
-
86
-
-
0040707335
-
Bounds on pairs of families with restricted intersections
-
J. Sgall, "Bounds on pairs of families with restricted intersections," Combinatorica, vol. 19, pp. 555-566, 1999.
-
(1999)
Combinatorica
, vol.19
, pp. 555-566
-
-
Sgall, J.1
-
88
-
-
84974705272
-
Ideal error-correcting codes: Unifying algebraic and numbertheoretic algorithms
-
M. Sudan, "Ideal error-correcting codes: Unifying algebraic and numbertheoretic algorithms," in AAECC, pp. 36-45, 2001.
-
(2001)
AAECC
, pp. 36-45
-
-
Sudan, M.1
-
89
-
-
84868240352
-
-
Personal Communication
-
M. Sudan, Personal Communication. 2009.
-
(2009)
-
-
Sudan, M.1
-
90
-
-
0032686554
-
Pseudorandom generators without the XOR lemma
-
M. Sudan, L. Trevisan, and S. Vadhan, "Pseudorandom generators without the XOR lemma," in ACM Symposium on Theory of Computing (STOC), pp. 537-546, 1999.
-
(1999)
ACM Symposium on Theory of Computing (STOC)
, pp. 537-546
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
91
-
-
0032335232
-
A lower bound of the mod 6 degree of the or function
-
G. Tardos and D. Barrington, "A lower bound of the mod 6 degree of the OR function," Computational Complexity, vol. 7, pp. 99-108, 1998.
-
(1998)
Computational Complexity
, vol.7
, pp. 99-108
-
-
Tardos, G.1
Barrington, D.2
-
93
-
-
33748588052
-
Some applications of coding theory in computational complexity
-
L. Trevisan, "Some applications of coding theory in computational complexity," Quaderni di Matematica, vol. 13, pp. 347-424, 2004.
-
(2004)
Quaderni di Matematica
, vol.13
, pp. 347-424
-
-
Trevisan, L.1
-
94
-
-
26444620133
-
Improved lower bounds for locally decodable codes and private information retrieval
-
S.Wehner and R. deWolf, "Improved lower bounds for locally decodable codes and private information retrieval," in International Colloquium on Automata, Languages and Programming (ICALP), vol. 3580 of Lecture Notes in Computer Science, pp. 1424-1436, 2005.
-
(2005)
International Colloquium on Automata, Languages and Programming (ICALP) 3580 of Lecture Notes in Computer Science
, pp. 1424-1436
-
-
Wehner, S.1
Dewolf, R.2
-
97
-
-
27644594172
-
A geometric approach to information theoretic private information retrieval
-
D.Woodruff and S. Yekhanin, "A geometric approach to information theoretic private information retrieval," in IEEE Computational Complexity Conference (CCC), pp. 275-284, 2005.
-
(2005)
IEEE Computational Complexity Conference (CCC)
, pp. 275-284
-
-
Woodruff, D.1
Yekhanin, S.2
-
98
-
-
0037767676
-
Nonlinear codes from algebraic curves improving the Tsfasman- Vladut-Zink bound
-
C. Xing, "Nonlinear codes from algebraic curves improving the Tsfasman- Vladut-Zink bound," IEEE Transactions on Information Theory, vol. 49, pp. 1653-1657, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 1653-1657
-
-
Xing, C.1
-
99
-
-
40549114927
-
Towards 3-query locally decodable codes of subexponential length
-
S. Yekhanin, "Towards 3-query locally decodable codes of subexponential length," Journal of the ACM, vol. 55, pp. 1-16, 2008.
-
(2008)
Journal of the ACM
, vol.55
, pp. 1-16
-
-
Yekhanin, S.1
-
100
-
-
77950365227
-
Private information retrieval
-
S. Yekhanin, "Private information retrieval," Communications of the ACM, vol. 53, no. 4, pp. 68-73, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 68-73
-
-
Yekhanin, S.1
|