A reduction from efficient non-malleable extractors to low-error two-source extractors with arbitrary constant rate
暂无分享,去创建一个
Amnon Ta-Shma | Eshan Chattopadhyay | Dean Doron | Avraham Ben-Aroya | Xin Li | A. Ta-Shma | Xin Li | Eshan Chattopadhyay | Dean Doron | Avraham Ben-Aroya
[1] Gil Cohen,et al. Local Correlation Breakers and Applications to Three-Source Extractors and Mergers , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[2] Yevgeniy Dodis,et al. Non-malleable extractors and symmetric key cryptography from weak secrets , 2009, STOC '09.
[3] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[4] Fan Chung Graham. A note on constructive methods for ramsey numbers , 1981, J. Graph Theory.
[5] Xin Li,et al. Explicit Non-malleable Extractors, Multi-source Extractors, and Almost Optimal Privacy Amplification Protocols , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[6] Amnon Ta-Shma,et al. Explicit two-source extractors for near-logarithmic min-entropy , 2016, Electron. Colloquium Comput. Complex..
[7] Gil Cohen,et al. Making the Most of Advice: New Correlation Breakers and Their Applications , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[8] David Zuckerman,et al. Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .
[9] Raghu Meka,et al. Explicit Resilient Functions Matching Ajtai-Linial , 2015, SODA.
[10] J. Bourgain,et al. MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS , 2005 .
[11] Ran Raz,et al. Extractors with weak random seeds , 2005, STOC '05.
[12] Vipul Goyal,et al. Non-malleable extractors and codes, with their many tampered extensions , 2015, IACR Cryptol. ePrint Arch..
[13] Noga Alon,et al. The Shannon Capacity of a Union , 1998, Comb..
[14] Xin Li,et al. Three-Source Extractors for Polylogarithmic Min-Entropy , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[15] David Zuckerman,et al. Explicit two-source extractors and resilient functions , 2016, Electron. Colloquium Comput. Complex..
[16] Xin Li,et al. Improved non-malleable extractors, non-malleable codes and independent source extractors , 2016, Electron. Colloquium Comput. Complex..
[17] Gil Cohen,et al. Two-source dispersers for polylogarithmic entropy and improved ramsey graphs , 2015, Electron. Colloquium Comput. Complex..
[18] Gil Cohen,et al. Two-Source Extractors for Quasi-Logarithmic Min-Entropy and Improved Privacy Amplification Protocols , 2016, Electron. Colloquium Comput. Complex..
[19] Victor Neumann-Lara,et al. The dichromatic number of a digraph , 1982, J. Comb. Theory, Ser. B.
[20] M. Naor. Constructing Ramsey graphs from small probability spaces , 1992 .
[21] H. L. Abbott,et al. Lower Bounds for Some Ramsey Numbers , 1974, J. Comb. Theory, Ser. A.
[22] Xin Li,et al. Improved Constructions of Two-Source Extractors , 2015, Electron. Colloquium Comput. Complex..
[23] Jaikumar Radhakrishnan,et al. Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators , 2000, SIAM J. Discret. Math..
[24] Guy Kindler,et al. Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.
[25] Gil Cohen,et al. Non-Malleable Extractors - New Tools and Improved Constructions , 2016, Electron. Colloquium Comput. Complex..
[26] Vince Grolmusz. Low Rank Co-Diagonal Matrices and Ramsey Graphs , 2000, Electron. J. Comb..
[27] Nathan Linial,et al. The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[28] Avi Wigderson,et al. 2-source dispersers for $n^{o(1)}$ entropy, and Ramsey graphs beating the Frankl-Wilson construction , 2012 .
[29] Peter Frankl,et al. Intersection theorems with geometric consequences , 1981, Comb..