Extractors for Circuit Sources
暂无分享,去创建一个
[1] Ran Raz,et al. A parallel repetition theorem , 1995, STOC '95.
[2] Ryan O'Donnell,et al. Every decision tree has an influential variable , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[3] Xin Li,et al. Improved Constructions of Three Source Extractors , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.
[4] Manuel Blum. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..
[5] Nathan Linial,et al. The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[6] Nathan Linial,et al. Collective Coin Flipping , 1989, Adv. Comput. Res..
[7] Luca Trevisan,et al. Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[8] Ran Raz,et al. Extracting all the randomness and reducing the error in Trevisan's extractors , 1999, STOC '99.
[9] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[10] Anindya De,et al. Extractors and Lower Bounds for Locally Samplable Sources , 2011, APPROX-RANDOM.
[11] Homin K. Lee,et al. Decision Trees and Influence: an Inductive Proof of the OSSS Inequality , 2010, Theory Comput..
[12] L. H. Harper. Optimal Assignments of Numbers to Vertices , 1964 .
[13] Ronen Shaltiel,et al. Dispersers for Affine Sources with Sub-polynomial Entropy , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[14] J. Håstad. Computational limitations of small-depth circuits , 1987 .
[15] Shachar Lovett,et al. Bounded-Depth Circuits Cannot Sample Good Codes , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.
[16] Enkatesan G Uruswami. Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .
[17] Amir Yehudayoff,et al. Affine extractors over prime fields , 2011, Comb..
[18] Miklos Santha,et al. Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..
[19] A. Yao. Separating the polynomial-time hierarchy by oracles , 1985 .
[20] Noga Alon,et al. Construction Of Asymptotically Good Low-rate Error-correcting Codes Through Pseudo-random Graphs , 1991, Proceedings. 1991 IEEE International Symposium on Information Theory.
[21] Sergiu Hart,et al. A note on the edges of the n-cube , 1976, Discret. Math..
[22] Neil Thapen. Notes on switching lemmas , 2009 .
[23] Ran Raz,et al. Deterministic extractors for bit-fixing sources by obtaining an independent seed , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[24] David Zuckerman,et al. Deterministic extractors for small-space sources , 2011, J. Comput. Syst. Sci..
[25] P. Beame. A switching lemma primer , 1994 .
[26] Anup Rao,et al. Extractors for Low-Weight Affine Sources , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.
[27] Noam Nisan,et al. Pseudorandomness for network algorithms , 1994, STOC '94.
[28] Miklós Ajtai,et al. ∑11-Formulae on finite structures , 1983, Ann. Pure Appl. Log..
[29] Guy Kindler,et al. Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.
[30] Aravind Srinivasan,et al. Randomized Distributed Edge Coloring via an Extension of the Chernoff-Hoeffding Bounds , 1997, SIAM J. Comput..
[31] Russell Impagliazzo,et al. Constructive Proofs of Concentration Bounds , 2010, APPROX-RANDOM.
[32] GuruswamiVenkatesan,et al. Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes , 2009 .
[33] Noam Nisan,et al. Pseudorandom bits for constant depth circuits , 1991, Comb..
[34] Pavel Pudlák,et al. Threshold circuits of bounded depth , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[35] Emanuele Viola,et al. The Complexity of Distributions , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[36] Kristoffer Arnsfelt Hansen,et al. Some Meet-in-the-Middle Circuit Lower Bounds , 2004, MFCS.
[37] Emanuele Viola,et al. Pseudorandom bits for constant depth circuits with few arbitrary symmetric gates , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[38] Noga Alon,et al. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs , 1992, IEEE Trans. Inf. Theory.
[39] David Zuckerman,et al. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .
[40] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[41] Luca Trevisan,et al. Extractors and pseudorandom generators , 2001, JACM.
[42] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 1989, 30th Annual Symposium on Foundations of Computer Science.
[43] Jean Bourgain,et al. On the Construction of Affine Extractors , 2007 .
[44] Emanuele Viola,et al. Hardness amplification proofs require majority , 2008, SIAM J. Comput..
[45] Emanuele Viola,et al. On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[46] Rocco A. Servedio,et al. Bounded Independence Fools Halfspaces , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[47] Xin Li,et al. A New Approach to Affine Extractors and Dispersers , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.
[48] Michael Sipser,et al. Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[49] Russell Impagliazzo,et al. Communication complexity towards lower bounds on circuit depth , 2001, computational complexity.
[50] Eli Ben-Sasson,et al. Affine dispersers from subspace polynomials , 2009, STOC '09.