Extracting All the Randomness from a Weakly Random Source
暂无分享,去创建一个
[1] Nicholas Pippenger,et al. Sorting and Selecting in Rounds , 1987, SIAM J. Comput..
[2] Aravind Srinivasan,et al. Explicit OR-dispersers with polylogarithmic degree , 1998, JACM.
[3] Michael Sipser,et al. Expanders, Randomness, or Time versus Space , 1988, J. Comput. Syst. Sci..
[4] Avi Wigderson,et al. Expanders That Beat the Eigenvalue Bound: Explicit Construction and Applications , 1999, Comb..
[5] Jennifer D. Key,et al. Designs and their codes , 1992, Cambridge tracts in mathematics.
[6] Oded Goldreich,et al. Another proof that bpp?ph (and more) , 1997 .
[7] David Zuckerman. Randomness-optimal oblivious sampling , 1997, Random Struct. Algorithms.
[8] Avi Wigdersony,et al. Tiny Families of Functions with Random Properties: a Quality{size Trade{oo for Hashing (preliminary Version) , 1994 .
[9] Miklos Santha,et al. Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..
[10] Oded Goldreich,et al. Modern Cryptography, Probabilistic Proofs and Pseudorandomness , 1998, Algorithms and Combinatorics.
[11] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[12] Luca Trevisan,et al. Constructions of Near-Optimal Extractors Using Pseudo-Random Generators , 1998, Electron. Colloquium Comput. Complex..
[13] Noam Nisan,et al. Hardness vs. randomness , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[14] Umesh V. Vazirani,et al. Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources , 1987, Comb..
[15] János Komlós,et al. Almost Sorting in one Round , 1989, Adv. Comput. Res..
[16] Jaikumar Radhakrishnan,et al. Tight bounds for depth-two superconcentrators , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[17] Amnon Ta-Shma,et al. Almost Optimal Dispersers , 1998, STOC '98.
[18] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[19] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[20] José D. P. Rolim,et al. Worst-Case Hardness Suffices for Derandomization: A New Method for Hardness-Randomness Trade-offs , 1997, Theor. Comput. Sci..
[21] Umesh Vazirani,et al. Efficiency Considerations in Using Semi-random Sources (Extended Abstract) , 1987, STOC 1987.
[22] Noam Nisan,et al. Extracting Randomness: A Survey and New Constructions , 1999, J. Comput. Syst. Sci..
[23] Leonid A. Levin,et al. Pseudo-random Generation from one-way functions (Extended Abstracts) , 1989, STOC 1989.
[24] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[25] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[26] Vijay V. Vazirani,et al. Random polynomial time is equal to slightly-random polynomial time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[27] Noam Nisan,et al. Extracting randomness: how and why. A survey , 1996, Proceedings of Computational Complexity (Formerly Structure in Complexity Theory).
[28] Amnon Ta-Shma,et al. On extracting randomness from weak random sources (extended abstract) , 1996, STOC '96.
[29] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[30] Aravind Srinivasan,et al. Computing with very weak random sources , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.