The function-inversion problem: barriers and opportunities (Q2175919): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-36030-6_16 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2990000219 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond Hellman's time-memory trade-offs with applications to proofs of space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple Constructions of Almost k-wise Independent Random Variables / rank
 
Normal rank
Property / cites work
 
Property / cites work: The cost of the missing bit: Communication complexity with help / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct indexes for strings, binary relations and multilabeled trees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs / rank
 
Normal rank
Property / cites work
 
Property / cites work: On ACC / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707396 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537979 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Is There an Oblivious RAM Lower Bound? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4910715 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Position-based cryptography and multiparty communication complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3467513 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5351925 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower bounds for complexity of Boolean circuits of finite depth with arbitrary elements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4875211 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random oracles and non-uniformity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some bounds on multiparty communication complexity of pointer jumping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Time Space Tradeoffs for Attacks against One-Way Functions and PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A linear lower bound on index size for text retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message Authentication Codes from Unpredictable Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Static data structure lower bounds imply rigidity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rigorous Time/Space Trade-offs for Inverting Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4449186 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The cell probe complexity of succinct data structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct ordinal trees with level-ancestor queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounds on the Efficiency of Generic Cryptographic Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3413440 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Existence of Pseudorandom Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Software protection and simulation on oblivious RAMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Data structures meet cryptography: 3SUM with preprocessing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal lower bounds for rank and select indexes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4633874 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A parallel search game / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Trade-Offs for Succinct String Indexes / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Communication Complexity of Key-Agreement Protocols. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct ordinal trees based on tree covering / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptanalytic time-memory trade-off / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the power of small-depth threshold circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boolean function complexity. Advances and frontiers. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Min-rank conjecture for log-depth circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Yes, there is an oblivious RAM lower bound! / rank
 
Normal rank
Property / cites work
 
Property / cites work: One way functions and pseudorandom generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal collapsing protocol for multiparty pointer jumping / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the cell probe complexity of polynomial evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct representations of permutations and functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Boolean Circuits, Tensor Ranks, and Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Squeezing succinct data structures into entropy bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random Oracles and Auxiliary Input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4164821 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036702 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Power of Small-Depth Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5215665 / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-way multiparty communication lower bound for pointer jumping with applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On obfuscating point functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Is there an oblivious RAM lower bound for online reads? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Should Tables Be Sorted? / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 13:20, 22 July 2024

scientific article
Language Label Description Also known as
English
The function-inversion problem: barriers and opportunities
scientific article

    Statements

    The function-inversion problem: barriers and opportunities (English)
    0 references
    0 references
    0 references
    30 April 2020
    0 references
    Hellman's algorithm
    0 references
    Yao's lower bound
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers