An Entropy Lower Bound for Non-Malleable Extractors
暂无分享,去创建一个
[1] Madhu Sudan,et al. Extensions to the Method of Multiplicities, with Applications to Kakeya Sets and Mergers , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[2] Enkatesan G Uruswami. Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .
[3] Avi Wigderson,et al. Extracting randomness via repeated condensing , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[4] Xin Li,et al. Non-malleable Extractors, Two-Source Extractors and Privacy Amplification , 2011, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[5] Ran Raz,et al. Non-malleable Extractors with Short Seeds and Applications to Privacy Amplification , 2012, 2012 IEEE 27th Conference on Computational Complexity.
[6] Jaikumar Radhakrishnan,et al. Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators , 2000, SIAM J. Discret. Math..
[7] Yevgeniy Dodis,et al. Non-malleable extractors and symmetric key cryptography from weak secrets , 2009, STOC '09.
[8] Salil P. Vadhan,et al. Pseudorandomness , 2012, Found. Trends Theor. Comput. Sci..
[9] Gil Cohen,et al. Non-Malleable Extractors - New Tools and Improved Constructions , 2016, Electron. Colloquium Comput. Complex..
[10] Amnon Ta-Shma,et al. A reduction from efficient non-malleable extractors to low-error two-source extractors with arbitrary constant rate , 2017, Electron. Colloquium Comput. Complex..
[11] Xin Li,et al. Design extractors, non-malleable condensers and privacy amplification , 2012, STOC '12.
[12] David Zuckerman,et al. Explicit two-source extractors and resilient functions , 2016, Electron. Colloquium Comput. Complex..
[13] Vojtech Rödl,et al. Pseudorandom sets and explicit constructions of ramsey graphs , 2004 .
[14] Xin Li,et al. Non-malleable extractors and non-malleable codes: partially optimal constructions , 2018, IACR Cryptol. ePrint Arch..
[15] Amnon Ta-Shma,et al. Better Condensers and New Extractors from Parvaresh-Vardy Codes , 2012, 2012 IEEE 27th Conference on Computational Complexity.
[16] Gil Cohen,et al. Towards optimal two-source extractors and Ramsey graphs , 2017, STOC.
[17] Robert J. McEliece,et al. New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities , 1977, IEEE Trans. Inf. Theory.
[18] Alex Samorodnitsky,et al. Linear Programming Bounds for Codes via a Covering Argument , 2007, Electron. Colloquium Comput. Complex..
[19] Vipul Goyal,et al. Non-malleable extractors and codes, with their many tampered extensions , 2015, IACR Cryptol. ePrint Arch..
[20] Xin Li,et al. Improved non-malleable extractors, non-malleable codes and independent source extractors , 2016, Electron. Colloquium Comput. Complex..
[21] Noga Alon,et al. Perturbed Identity Matrices Have High Rank: Proof and Applications , 2009, Combinatorics, Probability and Computing.
[22] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[23] Guy Kindler,et al. Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.
[24] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..