Separating the power of monotone span programs over different fields
暂无分享,去创建一个
[1] Anna Gál,et al. Lower bounds for monotone span programs , 2005, computational complexity.
[2] Roman Smolensky,et al. Algebraic methods in the theory of lower bounds for Boolean circuit complexity , 1987, STOC.
[3] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[4] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[5] Stuart J. Berkowitz,et al. On Computing the Determinant in Small Parallel Time Using a Small Number of Processors , 1984, Inf. Process. Lett..
[6] Stephen Smale,et al. On a theory of computation over the real numbers; NP completeness, recursive functions and universal machines , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[7] Jirí Sgall,et al. Algebraic models of computation and interpolation for algebraic proof systems , 1996, Proof Complexity and Feasible Arithmetics.
[8] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[9] Gordon F. Royle,et al. Algebraic Graph Theory , 2001, Graduate texts in mathematics.
[10] Pavel Pudlák. Monotone complexity and the rank of matrices , 2002, Electron. Colloquium Comput. Complex..
[11] Avi Wigderson,et al. Superpolynomial Lower Bounds for Monotone Span Programs , 1996, Comb..
[12] Alexander A. Razborov,et al. Applications of matrix methods to the theory of lower bounds in computational complexity , 1990, Comb..
[13] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[14] Moni Naor,et al. Distributed Pseudo-random Functions and KDCs , 1999, EUROCRYPT.
[15] Christoph Meinel,et al. On relations between counting communication complexity classes , 2004, J. Comput. Syst. Sci..
[16] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[17] P. Frankl,et al. Linear Algebra Methods in Combinatorics I , 1988 .
[18] Enav Weinreb,et al. Separating the Power of Monotone Span Programs over Different Fields , 2005, SIAM J. Comput..
[19] Yuval Ishai,et al. On the power of nonlinear secret-sharing , 2001, Proceedings 16th Annual IEEE Conference on Computational Complexity.
[20] Ketan Mulmuley,et al. A fast parallel algorithm to compute the rank of a matrix over an arbitrary field , 1986, STOC '86.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Christoph Meinel,et al. Structure and importance of logspace-MOD class , 1992, Mathematical systems theory.
[23] E. Kushilevitz,et al. Communication Complexity: Basics , 1996 .
[24] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[25] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[26] S. Smale,et al. On a theory of computation and complexity over the real numbers; np-completeness , 1989 .
[27] Eli Ben-Sasson,et al. Random Cnf’s are Hard for the Polynomial Calculus , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[28] S. Smale,et al. On a theory of computation and complexity over the real numbers; np-completeness , 1989 .
[29] Anna Gál. A characterization of span program size and improved lower bounds for monotone span programs , 1998, STOC '98.
[30] Kurt Mehlhorn,et al. Las Vegas is better than determinism in VLSI and distributed computing (Extended Abstract) , 1982, STOC '82.