-
1
-
-
85039788012
-
High quality pseudorandom generators: Fast serial and parallel implementations
-
Aiello, W., R. Venkatesan, "High Quality Pseudorandom Generators: Fast Serial and Parallel Implementations", Bellcore Technical Memorandum, 1993.
-
(1993)
Bellcore Technical Memorandum
-
-
Aiello, W.1
Venkatesan, R.2
-
2
-
-
0023548546
-
Deterministic simulation of logspace
-
Ajtai, M., Komlos, J., Szemeredi, E., "Deterministic Simulation of Logspace, " Proc. of ACM Symp. on Theory of Computing (1987).
-
(1987)
Proc. of ACM Symp. on Theory of Computing
-
-
Ajtai, M.1
Komlos, J.2
Szemeredi, E.3
-
3
-
-
0023985196
-
RSA and rabin functions: Certain parts are as hard as the whole
-
Alexi, W., B. Chor, O. Goldreich, C. P. Schnorr, "RSA and Rabin Functions: Certain parts are as hard as the whole, " SIAM J. Computing, 17 (1988) 194-209.
-
(1988)
SIAM J. Computing
, vol.17
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
6
-
-
0021522644
-
-
SIAM J. CompuL, 13 (1984) 850-864.
-
(1984)
SIAM J. CompuL
, vol.13
, pp. 850-864
-
-
-
7
-
-
0026103228
-
Realistic analysis of some randomized algorithms
-
Bach, E., "Realistic Analysis of Some Randomized Algorithms, " J. Computer Sys. Sci. 42 (1991) 30-53.
-
(1991)
J. Computer Sys. Sci.
, vol.42
, pp. 30-53
-
-
Bach, E.1
-
8
-
-
0025535128
-
Randomness in interactive proofs
-
Bellare, M., Goldreich, O., Goldwasser, S., "Randomness in Interactive Proofs, " Proc. of IEEE Symp. on Foundations of Computer Science (1990).
-
(1990)
Proc. of IEEE Symp. on Foundations of Computer Science
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
10
-
-
11944269419
-
Monte-carlo simulations: Hidden errors from "good" random number generator
-
Dec.
-
Ferrenberg, A. M., D. P. Landau, Y. J. Wong, "Monte-Carlo Simulations: Hidden errors from "Good" Random Number Generator", Physical Review Letters, vol 69 (23) Dec. 1992.
-
(1992)
Physical Review Letters
, vol.69
, Issue.23
-
-
Ferrenberg, A.M.1
Landau, D.P.2
Wong, Y.J.3
-
11
-
-
0023985464
-
Reconstructing truncated integer variables satisfying linear congruences
-
Frieze, A. M., J. Hastad, R. Kannan, J.C. Lagarias, "Reconstructing Truncated Integer Variables Satisfying Linear Congruences, " SIAM J. Comput. 17 (1988) 262280.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 262280
-
-
Frieze, A.M.1
Hastad, J.2
Kannan, R.3
Lagarias, J.C.4
-
12
-
-
0000871697
-
Explicit constructions of linear-sized superconcentrators
-
Gabber, O., Z. Galil, "Explicit constructions of linear-sized superconcentrators, " J. Comput. Sys. Sci. 22 (1981).
-
(1981)
J. Comput. Sys. Sci.
, vol.22
-
-
Gabber, O.1
Galil, Z.2
-
16
-
-
0346554917
-
Security preserving amplification of hardness
-
Goldreich, O., R. Impagliazzo, L. A. Levin, R. Venkate-san, D. Zuckerman, "Security Preserving Amplification of Hardness, " Proc. of IEEE Symp. on Foundations of Computer Science (1990).
-
(1990)
Proc. of IEEE Symp. on Foundations of Computer Science
-
-
Goldreich, O.1
Impagliazzo, R.2
Levin, L.A.3
Venkate-San, R.4
Zuckerman, D.5
-
17
-
-
0024866111
-
Pseudorandom generation from one-way functions
-
Hastad, J., R. Impagliazzo, L. Levin, M. Luby, "Pseudorandom Generation From One-Way Functions, Proc. ACM Symp. on Theory of Computing (1989) 12-24;
-
(1989)
Proc. ACM Symp. on Theory of Computing
, pp. 12-24
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
18
-
-
0025115363
-
Pseudorandom generators under uniform assumptions
-
"Pseudorandom Generators under Uniform assumptions, " Proc. of ACM Symp. on Theory of Computing (1990) 395-404.
-
(1990)
Proc. of ACM Symp. on Theory of Computing
, pp. 395-404
-
-
-
20
-
-
0007513183
-
Polynomial factorization and nonrandomness of bits of algebraic and some transcendental numbers
-
Kannan, R., A. K. Lenstra, L. Lovasz, "Polynomial Factorization and Nonrandomness of Bits of Algebraic and Some Transcendental Numbers, " Math. Comp. 50 (1988) 235-250.
-
(1988)
Math. Comp.
, vol.50
, pp. 235-250
-
-
Kannan, R.1
Lenstra, A.K.2
Lovasz, L.3
-
23
-
-
0023984977
-
Unique extrapolation of polynomial recurrences
-
Lagarias, J., J. Reed, "Unique Extrapolation of Polynomial Recurrences, " SIAM J. Comput. 17 (1988) 342362.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 342362
-
-
Lagarias, J.1
Reed, J.2
-
25
-
-
85039804627
-
Cryptography
-
Princeton Univ Press, to appear
-
Luby, M., Cryptography, Draft Manuscript, 1993, Princeton Univ Press, to appear.
-
(1993)
Draft Manuscript
-
-
Luby, M.1
-
26
-
-
0003508568
-
-
National Bureau of Standards, Department of Commerce, FIPS, pub 46, Jan.
-
National Bureau of Standards, Data Encryption Standard, Department of Commerce, FIPS, pub 46, Jan., 1977.
-
(1977)
Data Encryption Standard
-
-
-
27
-
-
0024303956
-
Inferring sequences produced by pseudorandom number generators
-
Plumstead, J. B. "Inferring Sequences Produced By Pseudorandom Number Generators, " J. ACM 36 (1989), 129-141.
-
(1989)
J. ACM
, vol.36
, pp. 129-141
-
-
Plumstead, J.B.1
-
28
-
-
0023573599
-
Efficiency considerations in using semi-random sources
-
Vazirani, U, V. Vazirani, "Efficiency considerations in using semi-random sources", STOC 19 (1987) 160-168.
-
(1987)
STOC
, vol.19
, pp. 160-168
-
-
Vazirani, U.1
Vazirani, V.2
-
30
-
-
0347815155
-
General weak random sources
-
Zuckerman, D., "General weak random sources", FOCS31 (1990), 318-326.
-
(1990)
FOCS31
, pp. 318-326
-
-
Zuckerman, D.1
|