Infeasibility of instance compression and succinct PCPs for NP
暂无分享,去创建一个
[1] Harry Buhrman,et al. NP-Hard Sets Are Exponentially Dense Unless coNP C NP/poly , 2008, 2008 23rd Annual IEEE Conference on Computational Complexity.
[2] Liming Cai,et al. Advice Classes of Parameterized Tractability , 1997, Ann. Pure Appl. Log..
[3] Avi Wigderson,et al. P = BPP if E requires exponential circuits: derandomizing the XOR lemma , 1997, STOC '97.
[4] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[5] Stephen R. Mahaney. Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[6] David S. Johnson,et al. Approximation algorithms for combinatorial problems: an annotated bibliography , 1976 .
[7] Yuval Ishai,et al. On the randomness complexity of efficient sampling , 2006, STOC '06.
[8] Yael Tauman Kalai,et al. Interactive PCP , 2007 .
[9] Rolf Niedermeier,et al. Invitation to Fixed-Parameter Algorithms , 2006 .
[10] Jin-Yi Cai,et al. Competing Provers Yield Improved Karp-Lipton Collapse Results , 2003, STACS.
[11] Yonatan Aumann,et al. Information Theoretically Secure Communication in the Limited Storage Space Model , 1999, CRYPTO.
[12] Jörg Flum,et al. Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series) , 2006 .
[13] Sanjeev Arora,et al. Probabilistic checking of proofs; a new characterization of NP , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[14] Christopher Umans,et al. Simple extractors for all min-entropies and a new pseudo-random generator , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[15] Rolf Niedermeier,et al. Invitation to data reduction and problem kernelization , 2007, SIGA.
[16] Chee-Keng Yap,et al. Some Consequences of Non-Uniform Conditions on Uniform Classes , 1983, Theor. Comput. Sci..
[17] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[18] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[19] Moni Naor,et al. On Everlasting Security in the Hybrid Bounded Storage Model , 2006, ICALP.
[20] Leonard M. Adleman,et al. Two theorems on random polynomial time , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[21] Michael R. Fellows,et al. On problems without polynomial kernels , 2009, J. Comput. Syst. Sci..
[22] Yijia Chen,et al. Lower Bounds for Kernelizations and Other Preprocessing Procedures , 2009, CiE.
[23] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[24] Daniel R. Simon,et al. Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? , 1998, EUROCRYPT.
[25] Michael R. Fellows,et al. Parameterized Complexity , 1998 .
[26] Dieter van Melkebeek,et al. Graph Nonisomorphism Has Subexponential Size Proofs Unless the Polynomial-Time Hierarchy Collapses , 2002, SIAM J. Comput..
[27] Moni Naor,et al. On the Compressibility of NP Instances and Cryptographic Applications , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[28] Carsten Lund,et al. Proof verification and the hardness of approximation problems , 1998, JACM.
[29] Jörg Flum,et al. Parameterized Complexity Theory , 2006, Texts in Theoretical Computer Science. An EATCS Series.
[30] Dániel Marx,et al. Parameterized Complexity and Approximation Algorithms , 2008, Comput. J..
[31] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[32] Irit Dinur,et al. The PCP theorem by gap amplification , 2006, STOC.