Communication vs. Computation
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[2] Leslie G. Valiant,et al. NP is as easy as detecting unique solutions , 1985, STOC '85.
[3] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[4] Leslie G. Valiant,et al. NP is as easy as detecting unique solutions , 1985, STOC '85.
[5] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[6] Carsten Lund,et al. Algebraic methods for interactive proof systems , 1992, JACM.
[7] Martin Tompa,et al. Communication-Space Tradeoffs for Unrestricted Protocols , 1994, SIAM J. Comput..
[8] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[9] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[10] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[11] Zvi Galil,et al. Lower bounds on communication complexity , 1984, STOC '84.
[12] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[13] Ran Canetti,et al. Bounds on tradeoffs between randomness and communication complexity , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[14] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[15] Leslie G. Valiant,et al. Fast Parallel Computation of Polynomials Using Few Processors , 1983, SIAM J. Comput..
[16] Lance Fortnow,et al. Arithmetization: A new method in structural complexity theory , 2005, computational complexity.
[17] Satyanarayana V. Lokam,et al. Communication Complexity of Simultaneous Messages , 2003, SIAM J. Comput..
[18] Adi Shamir,et al. The discrete log is very discreet , 1990, STOC '90.
[19] Noam Nisan,et al. Rounds in communication complexity revisited , 1991, STOC '91.
[20] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[21] Adi Shamir,et al. The Discrete Logarithm Modulo a Composite Hides O(n) Bits , 1993, J. Comput. Syst. Sci..
[22] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[23] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Richard J. Lipton,et al. Multi-party protocols , 1983, STOC.
[26] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[27] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[28] Eyal Kushilevitz,et al. Communication Complexity , 1997, Adv. Comput..