On e-Biased Generators in NC0
暂无分享,去创建一个
[1] Moni Naor,et al. Small-Bias Probability Spaces: Efficient Constructions and Applications , 1993, SIAM J. Comput..
[2] David P. Williamson,et al. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming , 1995, JACM.
[3] Richard Zippel,et al. Probabilistic algorithms for sparse polynomials , 1979, EUROSAM.
[4] Ron M. Roth,et al. Author's Reply to Comments on 'Maximum-rank array codes and their application to crisscross error correction' , 1991, IEEE Trans. Inf. Theory.
[5] Roy Meshulam,et al. Spaces of Hankel matrices over finite fields , 1995 .
[6] Noga Alon,et al. Explicit unique-neighbor expanders , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[7] Thomas Johansson,et al. Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.
[8] Kenji Obata,et al. A lower bound for testing 3-colorability in bounded-degree graphs , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[9] Peter Bro Miltersen,et al. On Pseudorandom Generators in NC , 2001, MFCS.
[10] Elchanan Mossel,et al. On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.
[11] Noam Nisan,et al. Constant depth circuits, Fourier transform, and learnability , 1993, JACM.
[12] Michael E. Saks,et al. On the complexity of unsatisfiability proofs for random k-CNF formulas , 1998, STOC '98.
[13] Ryan O'Donnell,et al. Learning juntas , 2003, STOC '03.
[14] Noga Alon,et al. Simple Construction of Almost k-wise Independent Random Variables , 1992, Random Struct. Algorithms.
[15] Oded Goldreich,et al. Three XOR-Lemmas - An Exposition , 1995, Electron. Colloquium Comput. Complex..
[16] Eli Ben-Sasson,et al. Short proofs are narrow—resolution made simple , 2001, JACM.
[17] Oded Goldreich,et al. Candidate One-Way Functions Based on Expander Graphs , 2011, Studies in Complexity and Cryptography.
[18] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[19] Avi Wigderson,et al. Extractors: optimal up to constant factors , 2003, STOC '03.
[20] Michael Kharitonov,et al. Cryptographic hardness of distribution-specific learning , 1993, STOC.
[21] Johan Håstad,et al. Some optimal inapproximability results , 1997, STOC '97.
[22] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 2004, Journal of Cryptology.
[23] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[24] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.
[25] J. Hirschfeld. Projective Geometries Over Finite Fields , 1980 .
[26] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.