-
1
-
-
70349877054
-
Random Satisfiability
-
chapter IOS Press
-
D. Achlioptas. Handbook of Satisfiability, chapter Random Satisfiability, pages 243-268. IOS Press, 2009.
-
(2009)
Handbook of Satisfiability
, pp. 243-268
-
-
Achlioptas, D.1
-
2
-
-
0344118879
-
More on average case vs approximation complexity
-
IEEE Computer Society
-
M. Alekhnovich. More on average case vs approximation complexity. In FOCS, pages 298-307. IEEE Computer Society, 2003.
-
(2003)
FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
3
-
-
33750301291
-
Exponential lower bounds for the running time of DPLL algorithms on satisfiable formulas
-
DOI 10.1007/s10817-005-9006-x
-
M. Alekhnovich, E. A. Hirsch, and D. Itsykson. Exponential lower bounds for the running time of DPLL algorithms on satisfiable formulas. J. Autom. Reasoning, 35(1-3):51-72, 2005. (Pubitemid 44619279)
-
(2005)
Journal of Automated Reasoning
, vol.35
, Issue.1-3
, pp. 51-72
-
-
Alekhnovich, M.1
Hirsch, E.A.2
Itsykson, D.3
-
4
-
-
84858309524
-
Pseudorandom generators with long stretch and low locality from random local one-way functions
-
B. Applebaum. Pseudorandom generators with long stretch and low locality from random local one-way functions. Electronic Colloquium on Computational Complexity (ECCC), 18:7, 2011.
-
(2011)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.18
, pp. 7
-
-
Applebaum, B.1
-
5
-
-
77954751550
-
Public-key cryptography from different assumptions
-
B. Applebaum, B. Barak, and A. Wigderson. Public-key cryptography from different assumptions. In Proc. of 42nd STOC, pages 171-180, 2010.
-
(2010)
Proc. of 42nd STOC
, pp. 171-180
-
-
Applebaum, B.1
Barak, B.2
Wigderson, A.3
-
7
-
-
34547843026
-
Cryptography in NC0
-
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC0. SIAM Journal on Computing, 36(4):845-888, 2006.
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.4
, pp. 845-888
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
9
-
-
79955416334
-
Computational complexity and information asymmetry in financial products
-
S. Arora, B. Barak, M. Brunnermeier, and R. Ge. Computational complexity and information asymmetry in financial products. Commun. ACM, 54(5):101-107, 2011.
-
(2011)
Commun. ACM
, vol.54
, Issue.5
, pp. 101-107
-
-
Arora, S.1
Barak, B.2
Brunnermeier, M.3
Ge, R.4
-
11
-
-
70350589609
-
On the security of goldreich's one-way function
-
A. Bogdanov and Y. Qiao. On the security of goldreich's one-way function. In Proc. of 13th RANDOM, pages 392-405, 2009.
-
(2009)
Proc. of 13th RANDOM
, pp. 392-405
-
-
Bogdanov, A.1
Qiao, Y.2
-
12
-
-
79953179313
-
Input locality and hardness amplification
-
A. Bogdanov and A. Rosen. Input locality and hardness amplification. In Proc. of 8th TCC, pages 1-18, 2011.
-
(2011)
Proc. of 8th TCC
, pp. 1-18
-
-
Bogdanov, A.1
Rosen, A.2
-
14
-
-
70350681135
-
Goldreich's one-way function candidate and myopic backtracking algorithms
-
J. Cook, O. Etesami, R. Miller, and L. Trevisan. Goldreich's one-way function candidate and myopic backtracking algorithms. In Proc. of 6th TCC, pages 521-538, 2009.
-
(2009)
Proc. of 6th TCC
, pp. 521-538
-
-
Cook, J.1
Etesami, O.2
Miller, R.3
Trevisan, L.4
-
18
-
-
0036038682
-
Relations between average case complexity and approximation complexity
-
U. Feige. Relations between average case complexity and approximation complexity. In Proc. of 34th STOC, pages 534-543, 2002.
-
(2002)
Proc. of 34th STOC
, pp. 534-543
-
-
Feige, U.1
-
19
-
-
0005259971
-
The dense k-subgraph problem
-
U. Feige, D. Peleg, and G. Kortsarz. The dense k-subgraph problem. Algorithmica, 29(3):410-421, 2001. (Pubitemid 33710542)
-
(2001)
Algorithmica (New York)
, vol.29
, Issue.3
, pp. 410-421
-
-
Feige, U.1
Kortsarz, G.2
Peleg, D.3
-
20
-
-
78649567109
-
Random planted 3-SAT
-
M.-Y. Kao, editor, Springer
-
A. Flaxman. Random planted 3-SAT. In M.-Y. Kao, editor, Encyclopedia of Algorithms. Springer, 2008.
-
(2008)
Encyclopedia of Algorithms
-
-
Flaxman, A.1
-
23
-
-
0027797493
-
On the existence of pseudorandom generators
-
Preliminary version in Proc. 29th FOCS, 1988
-
O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM J. Comput., 22(6):1163-1175, 1993. Preliminary version in Proc. 29th FOCS, 1988.
-
(1993)
SIAM J. Comput.
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
25
-
-
17444362761
-
On the security of modular exponentiation with application to the construction of pseudorandom generators
-
DOI 10.1007/s00145-002-0038-7
-
O. Goldreich and V. Rosen. On the security of modular exponentiation with application to the construction of pseudorandom generators. J. Cryptology, 16(2):71-93, 2003. (Pubitemid 41201210)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.2
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
26
-
-
77954721007
-
Efficiency improvements in constructing pseudorandom generators from one-way functions
-
I. Haitner, O. Reingold, and S. P. Vadhan. Efficiency improvements in constructing pseudorandom generators from one-way functions. In Proc. of 42nd STOC, pages 437-446, 2010.
-
(2010)
Proc. of 42nd STOC
, pp. 437-446
-
-
Haitner, I.1
Reingold, O.2
Vadhan, S.P.3
-
27
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
29
-
-
57049124387
-
Cryptography with constant computational overhead
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Cryptography with constant computational overhead. In Proc. of 40th STOC, pages 433-442, 2008.
-
(2008)
Proc. of 40th STOC
, pp. 433-442
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
31
-
-
0024140061
-
The influence of variables on boolean functions
-
J. Kahn, G. Kalai, and N. Linial. The influence of variables on boolean functions. In Proc. of 29th FOCS, pages 68-80, 1988.
-
(1988)
Proc. of 29th FOCS
, pp. 68-80
-
-
Kahn, J.1
Kalai, G.2
Linial, N.3
-
32
-
-
17744389433
-
Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique
-
S. Khot. Ruling out PTAS for graph min-bisection, densest subgraph and bipartite clique. In Proc. of 45th FOCS, pages 136-145, 2004.
-
(2004)
Proc. of 45th FOCS
, pp. 136-145
-
-
Khot, S.1
-
33
-
-
0021902611
-
One-way functions and pseudorandom generators
-
L. A. Levin. One-way functions and pseudorandom generators. In Proc. of 17th STOC, pages 363-365, 1985.
-
(1985)
Proc. of 17th STOC
, pp. 363-365
-
-
Levin, L.A.1
-
36
-
-
4243054954
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM, 51(2):231-262, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
38
-
-
0035276434
-
Pseudorandom generators without the XOR Lemma
-
DOI 10.1006/jcss.2000.1730
-
M. Sudan, L. Trevisan, and S. P. Vadhan. Pseudorandom generators without the xor lemma. J. Comput. Syst. Sci., 62(2):236-266, 2001. (Pubitemid 32334551)
-
(2001)
Journal of Computer and System Sciences
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
39
-
-
0020301290
-
Theory and application of trapdoor functions
-
A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.
-
(1982)
Proc. 23rd FOCS
, pp. 80-91
-
-
Yao, A.C.1
|