-
1
-
-
0033341167
-
Weak random sources, hitting sets, and BPP simulations
-
Andreev, A.E., Clementi, A.E.F., Rolim, J.D.P., Trevisan, L.: Weak random sources, hitting sets, and BPP simulations. SIAM J. Comput. 28(6), 2103-2116 (1999)
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.E.1
Clementi, A.E.F.2
Rolim, J.D.P.3
Trevisan, L.4
-
2
-
-
33244468835
-
Practical privacy: The sulq framework
-
Li, C. (ed.) ACM
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the sulq framework. In: Li, C. (ed.) PODS, pp. 128-138. ACM (2005)
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
38049035373
-
Does Privacy Require True Randomness?
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Bosley, C., Dodis, Y.: Does Privacy Require True Randomness? In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 1-20. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 1-20
-
-
Bosley, C.1
Dodis, Y.2
-
4
-
-
0010362121
-
Syntactic clustering of the web
-
Broder, A.Z., Glassman, S.C., Manasse, M.S., Zweig, G.: Syntactic clustering of the web. Computer Networks 29(8-13), 1157-1166 (1997)
-
(1997)
Computer Networks
, vol.29
, Issue.8-13
, pp. 1157-1166
-
-
Broder, A.Z.1
Glassman, S.C.2
Manasse, M.S.3
Zweig, G.4
-
5
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230-261 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
6
-
-
1142275486
-
Revealing information while preserving privacy
-
Neven, F., Beeri, C., Milo, T. (eds.) ACM
-
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Neven, F., Beeri, C., Milo, T. (eds.) PODS, pp. 202-210. ACM (2003)
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
7
-
-
33749541274
-
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
8
-
-
17744370165
-
On the (im)possibility of cryptography with imperfect randomness
-
IEEE Computer Society
-
Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: FOCS, pp. 196-205. IEEE Computer Society (2004)
-
(2004)
FOCS
, pp. 196-205
-
-
Dodis, Y.1
Ong, S.J.2
Prabhakaran, M.3
Sahai, A.4
-
9
-
-
0036957025
-
On the (non)universality of the one-time pad
-
IEEE Computer Society
-
Dodis, Y., Spencer, J.: On the (non)universality of the one-time pad. In: FOCS, pp. 376-385. IEEE Computer Society (2002)
-
(2002)
FOCS
, pp. 376-385
-
-
Dodis, Y.1
Spencer, J.2
-
10
-
-
33745556605
-
Calibrating Noise to Sensitivity in Private Data Analysis
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
11
-
-
35048856104
-
Privacy-Preserving Datamining on Vertically Partitioned Databases
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Dwork, C., Nissim, K.: Privacy-Preserving Datamining on Vertically Partitioned Databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528-544. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
12
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
Mitzenmacher, M. (ed.) ACM
-
Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. In: Mitzenmacher, M. (ed.) STOC, pp. 351-360. ACM (2009)
-
(2009)
STOC
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
13
-
-
77954711905
-
On the geometry of differential privacy
-
Schulman, L.J. (ed.) ACM
-
Hardt, M., Talwar, K.: On the geometry of differential privacy. In: Schulman, L.J. (ed.) STOC, pp. 705-714. ACM (2010)
-
(2010)
STOC
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
14
-
-
35448934885
-
Parallel repetition: Simplifications and the no-signaling case
-
Johnson, D.S., Feige, U. (eds.) ACM
-
Holenstein, T.: Parallel repetition: simplifications and the no-signaling case. In: Johnson, D.S., Feige, U. (eds.) STOC, pp. 411-419. ACM (2007)
-
(2007)
STOC
, pp. 411-419
-
-
Holenstein, T.1
-
16
-
-
84958670019
-
Privacy Amplification Secure against Active Adversaries
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Maurer, U.M., Wolf, S.: Privacy Amplification Secure against Active Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307-321. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 307-321
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
78751557330
-
The limits of two-party differential privacy
-
IEEE Computer Society
-
McGregor, A., Mironov, I., Pitassi, T., Reingold, O., Talwar, K., Vadhan, S.P.: The limits of two-party differential privacy. In: FOCS, pp. 81-90. IEEE Computer Society (2010)
-
(2010)
FOCS
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.P.6
-
18
-
-
84977114496
-
On the Impossibility of Private Key Cryptography with Weakly Random Keys
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
McInnes, J.L., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421-435. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 421-435
-
-
McInnes, J.L.1
Pinkas, B.2
-
19
-
-
0032108353
-
Arithmetic coding revisited
-
Moffat, A., Neal, R.M., Witten, I.H.: Arithmetic coding revisited. ACM Trans. Inf. Syst. 16(3), 256-294 (1998)
-
(1998)
ACM Trans. Inf. Syst.
, vol.16
, Issue.3
, pp. 256-294
-
-
Moffat, A.1
Neal, R.M.2
Witten, I.H.3
-
21
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
Santha, M., Vazirani, U.V.: Generating quasi-random sequences from semi-random sources. J. Comput. Syst. Sci. 33(1), 75-87 (1986)
-
(1986)
J. Comput. Syst. Sci.
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
22
-
-
0022252339
-
Random polynomial time is equal to slightlyrandom polynomial time
-
IEEE Computer Society
-
Vazirani, U.V., Vazirani, V.V.: Random polynomial time is equal to slightlyrandom polynomial time. In: FOCS, pp. 417-428. IEEE Computer Society (1985)
-
(1985)
FOCS
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
23
-
-
0023364261
-
Arithmetic coding for data compression
-
Witten, I.H., Neal, R.M., Cleary, J.G.: Arithmetic coding for data compression. Commun. ACM 30(6), 520-540 (1987)
-
(1987)
Commun. ACM
, vol.30
, Issue.6
, pp. 520-540
-
-
Witten, I.H.1
Neal, R.M.2
Cleary, J.G.3
-
24
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367-391 (1996)
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|