暂无分享,去创建一个
[1] Leslie G. Valiant,et al. NP is as easy as detecting unique solutions , 1985, STOC '85.
[2] L. Fortnow,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.
[3] Salil P. Vadhan,et al. Characterizing pseudoentropy and simplifying pseudorandom generator constructions , 2012, STOC '12.
[4] Noam Nisan,et al. Pseudorandom generators for space-bounded computation , 1992, Comb..
[5] Yuval Ishai,et al. Cryptography in NC0 , 2004, SIAM J. Comput..
[6] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[7] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[8] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[9] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[10] Ryan O'Donnell,et al. Hardness amplification within NP , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[11] Daniel A. Spielman,et al. Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[12] Jehoshua Bruck,et al. Linear extractors for extracting randomness from noisy sources , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[13] Omer Reingold,et al. Efficiency improvements in constructing pseudorandom generators from one-way functions , 2010, STOC '10.
[14] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[15] Ran Raz,et al. On recycling the randomness of states in space bounded computation , 1999, STOC '99.
[16] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[17] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[18] Salil P. Vadhan,et al. On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model , 2003, CRYPTO.
[19] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[20] Jaikumar Radhakrishnan,et al. Tight bounds for depth-two superconcentrators , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[21] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.
[22] Rafail Ostrovsky,et al. Cryptography with constant computational overhead , 2008, STOC.
[23] Shachar Lovett,et al. A tail bound for read-k families of functions , 2015, Random Struct. Algorithms.
[24] Emanuele Viola,et al. The complexity of constructing pseudorandom generators from hard functions , 2005, computational complexity.
[25] Avi Wigderson,et al. Randomness conductors and constant-degree lossless expanders , 2002, STOC '02.
[26] Luca Trevisan,et al. Extractors Using Hardness Amplification , 2009, APPROX-RANDOM.
[27] Alon Rosen,et al. Input Locality and Hardness Amplification , 2011, Journal of Cryptology.
[28] Noam Nisan,et al. The computational complexity of universal hashing , 1990, STOC '90.
[29] Yuval Ishai,et al. Cryptography in NC0 , 2004, FOCS.
[30] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.