메뉴 건너뛰기




Volumn 20, Issue 1, 2011, Pages 87-143

Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma

Author keywords

circuit complexity; communication complexity; Derandomization; pseudorandomness; randomness extractors

Indexed keywords


EID: 85027926057     PISSN: 10163328     EISSN: 14208954     Source Type: Journal    
DOI: 10.1007/s00037-011-0006-4     Document Type: Article
Times cited : (18)

References (58)
  • 2
  • 3
    • 0033077324 scopus 로고    scopus 로고
    • The Space Complexity of Approximating the Frequency Moments
    • Alon N., Matias Y., Szegedy M. (1999) The Space Complexity of Approximating the Frequency Moments. J. Comput. Syst. Sci. 58(1): 137-147.
    • (1999) J. Comput. Syst. Sci. , vol.58 , Issue.1 , pp. 137-147
    • Alon, N.1    Matias, Y.2    Szegedy, M.3
  • 4
    • 0001338853 scopus 로고
    • BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs
    • Babai L., Fortnow L., Nisan N., Wigderson A. (1993) BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs. Computational Complexity 3(4): 307-318.
    • (1993) Computational Complexity , vol.3 , Issue.4 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 6
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • Blum M., Micali S. (1984) How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing 13(4): 850-864.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 33746365070 scopus 로고    scopus 로고
    • More on the sum-product phenomenon in prime fields and its applications
    • Bourgain J. (2005) More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory 1: 1-32.
    • (2005) International Journal of Number Theory , vol.1 , pp. 1-32
    • Bourgain, J.1
  • 8
    • 0037048579 scopus 로고    scopus 로고
    • Complexity measures and decision tree complexity: a survey
    • Buhrman H., de Wolf R. (2002) Complexity measures and decision tree complexity: a survey. Theor. Comput. Sci. 288(1): 21-43.
    • (2002) Theor. Comput. Sci. , vol.288 , Issue.1 , pp. 21-43
    • Buhrman, H.1    de Wolf, R.2
  • 9
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • ISSN 0097-5397 (print), 1095-7111 (electronic). Special issue on cryptography
    • B. Chor & O. Goldreich (1988). Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing17(2), 230-261. ISSN 0097-5397 (print), 1095-7111 (electronic). Special issue on cryptography.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 13
    • 70350641078 scopus 로고    scopus 로고
    • Extractors for Varieties
    • IEEE Computer Society, Washington, DC, USA. ISBN 978-0-7695-3717-7
    • Z. Dvir (2009). Extractors for Varieties. In 24th Annual IEEE Conference on Computational Complexity, 102-113. IEEE Computer Society, Washington, DC, USA. ISBN 978-0-7695-3717-7.
    • (2009) 24th Annual IEEE Conference on Computational Complexity , pp. 102-113
    • Dvir, Z.1
  • 14
    • 67349179079 scopus 로고    scopus 로고
    • Extractors And Rank Extractors For Polynomial Sources
    • Dvir Z., Gabizon A., Wigderson A. (2009) Extractors And Rank Extractors For Polynomial Sources. Computational Complexity 18(1): 1-58.
    • (2009) Computational Complexity , vol.18 , Issue.1 , pp. 1-58
    • Dvir, Z.1    Gabizon, A.2    Wigderson, A.3
  • 15
    • 0033908338 scopus 로고    scopus 로고
    • Testing and spot-checking of data streams (extended abstract)
    • J. Feigenbaum, S. Kannan, M. Strauss & M. Viswanathan (2000). Testing and spot-checking of data streams (extended abstract). In SODA, 165-174.
    • (2000) SODA , pp. 165-174
    • Feigenbaum, J.1    Kannan, S.2    Strauss, M.3    Viswanathan, M.4
  • 16
    • 34547843024 scopus 로고    scopus 로고
    • Deterministic Extractors for Bit-Fixing Sources by Obtaining an Independent Seed
    • Gabizon A., Raz R., Shaltiel R. (2006) Deterministic Extractors for Bit-Fixing Sources by Obtaining an Independent Seed. SICOMP: SIAM Journal on Computing 36(4): 1072-1094.
    • (2006) SICOMP: SIAM Journal on Computing , vol.36 , Issue.4 , pp. 1072-1094
    • Gabizon, A.1    Raz, R.2    Shaltiel, R.3
  • 18
    • 0002810605 scopus 로고
    • Almost Optimal Lower Bounds for Small Depth Circuits
    • ACM
    • J. Håstad (1986). Almost Optimal Lower Bounds for Small Depth Circuits. In STOC, 6-20. ACM.
    • (1986) STOC , pp. 6-20
    • Håstad, J.1
  • 24
    • 15244352005 scopus 로고    scopus 로고
    • Derandomizing Polynomial Identity Tests Means Proving Circuit Lower Bounds
    • Kabanets V., Impagliazzo R. (2004) Derandomizing Polynomial Identity Tests Means Proving Circuit Lower Bounds. Computational Complexity 13(1-2): 1-46.
    • (2004) Computational Complexity , vol.13 , Issue.1-2 , pp. 1-46
    • Kabanets, V.1    Impagliazzo, R.2
  • 26
    • 35448977790 scopus 로고    scopus 로고
    • Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography
    • Kamp J., Zuckerman D. (2007) Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography. SIAM J. Comput 36(5): 1231-1247.
    • (2007) SIAM J. Comput , vol.36 , Issue.5 , pp. 1231-1247
    • Kamp, J.1    Zuckerman, D.2
  • 28
    • 85028110712 scopus 로고    scopus 로고
    • On the Derandomization of Constant Depth Circuits. In RANDOM-APPROX, Michel~X. Goemans, Klaus Jansen, José D. P. Rolim & Luca Trevisan, editors, volume, Springer. ISBN 3-540-42470-9
    • A. Klivans (2001). On the Derandomization of Constant Depth Circuits. In RANDOM-APPROX, Michel~X. Goemans, Klaus Jansen, José D. P. Rolim & Luca Trevisan, editors, volume 2129 of Lecture Notes in Computer Science, 249-260. Springer. ISBN 3-540-42470-9.
    • (2001) Lecture Notes in Computer Science , vol.2129 , pp. 249-260
    • Klivans, A.1
  • 29
    • 33646844308 scopus 로고    scopus 로고
    • Generalized Strong Extractors and Deterministic Privacy Amplification
    • R. König & U. M. Maurer (2005). Generalized Strong Extractors and Deterministic Privacy Amplification. In IMA Int. Conf., 322-339.
    • (2005) IMA Int. Conf. , pp. 322-339
    • König, R.1    Maurer, U.M.2
  • 33
    • 0026187604 scopus 로고
    • Private vs. Common Random Bits in Communication Complexity
    • Newman I. (1991) Private vs. Common Random Bits in Communication Complexity. Inf. Process. Lett. 39(2): 67-71.
    • (1991) Inf. Process. Lett. , vol.39 , Issue.2 , pp. 67-71
    • Newman, I.1
  • 34
    • 0026389757 scopus 로고
    • CREW PRAMs and Decision Trees
    • Nisan N. (1991) CREW PRAMs and Decision Trees. SIAM J. Comput. 20(6): 999-1007.
    • (1991) SIAM J. Comput. , vol.20 , Issue.6 , pp. 999-1007
    • Nisan, N.1
  • 35
    • 0000947929 scopus 로고
    • Pseudorandom generators for space bounded computation
    • Nisan N. (1992) Pseudorandom generators for space bounded computation. Combinatorica 12(4): 449-461.
    • (1992) Combinatorica , vol.12 , Issue.4 , pp. 449-461
    • Nisan, N.1
  • 39
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
    • Radhakrishnan J., Ta-Shma A. (2000) Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators. SIAM Journal on Discrete Mathematics 13(1): 2-24.
    • (2000) SIAM Journal on Discrete Mathematics , vol.13 , Issue.1 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 40
    • 70350680503 scopus 로고    scopus 로고
    • Extractors for Low-Weight Affine Sources
    • IEEE Computer Society. ISBN 978-0-7695-3717-7
    • A. Rao (2009). Extractors for Low-Weight Affine Sources. In IEEE Conference on Computational Complexity, 95-101. IEEE Computer Society. ISBN 978-0-7695-3717-7.
    • (2009) IEEE Conference on Computational Complexity , pp. 95-101
    • Rao, A.1
  • 42
    • 52249087391 scopus 로고    scopus 로고
    • Undirected connectivity in log-space
    • O. Reingold (2008). Undirected connectivity in log-space. J. ACM55(4).
    • (2008) J. ACM , vol.55 , Issue.4
    • Reingold, O.1
  • 49
    • 38749129723 scopus 로고    scopus 로고
    • Pseudorandomness and Average-Case Complexity Via Uniform Reductions
    • Trevisan L., Vadhan S. P. (2007) Pseudorandomness and Average-Case Complexity Via Uniform Reductions. Computational Complexity 16(4): 331-364.
    • (2007) Computational Complexity , vol.16 , Issue.4 , pp. 331-364
    • Trevisan, L.1    Vadhan, S.P.2
  • 52
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
    • Vazirani U. (1987) Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources. Combinatorica 7: 375-392.
    • (1987) Combinatorica , vol.7 , pp. 375-392
    • Vazirani, U.1
  • 54
    • 0020301290 scopus 로고
    • Theory and Applications of Trapdoor Functions (Extended Abstract)
    • IEEE, Chicago, Illinois
    • A. C. Yao (1982). Theory and Applications of Trapdoor Functions (Extended Abstract). In 23rd Annual Symposium on Foundations of Computer Science, 80-91. IEEE, Chicago, Illinois.
    • (1982) 23rd Annual Symposium on Foundations of Computer Science , pp. 80-91
    • Yao, A.C.1
  • 57
  • 58


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.