Pseudorandom generators for space-bounded computation

From MaRDI portal
Revision as of 06:13, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1204523

DOI10.1007/BF01305237zbMath0759.68024MaRDI QIDQ1204523

Noam Nisan

Publication date: 10 March 1993

Published in: Combinatorica (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Universal traversal sequences with backtracking.\(\text{RL}\subseteq \text{SC}\)A New Pseudorandom Generator from Collision-Resistant Hash FunctionsA Sufficient Condition for Sets Hitting the Class of Read-Once Branching Programs of Width 3Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesCounting distinct items over update streamsOn the Problem of Approximating the Eigenvalues of Undirected Graphs in Probabilistic LogspaceSublinear Estimation of Weighted Matchings in Dynamic Data StreamsA Statistical Analysis of Probabilistic Counting AlgorithmsFooling PolytopesDerandomized constructions of \(k\)-wise (almost) independent permutationsPseudorandomness via the Discrete Fourier TransformEntropy of Weight Distributions of Small-Bias Spaces and PseudobinomialityImproved hardness amplification in NPRandomness-efficient non-interactive zero knowledgeEfficient construction of a small hitting set for combinatorial rectangles in high dimensionOn approximating the eigenvalues of stochastic matrices in probabilistic logspace(De)randomized construction of small sample spaces in \(\mathcal{NC}\)On Probabilistic Space-Bounded Machines with Multiple Access to Random TapePseudorandom generators for combinatorial checkerboardsQuantum vs. classical algorithms for solving the heat equationUnnamed ItemLog-space constructible universal traversal sequences for cycles of length O(\(n^{4.03}\)).Unnamed ItemHow strong is Nisan's pseudo-random generator?Quantum key distribution with PRF(Hash, Nonce) achieves everlasting securityComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Single Pass Spectral Sparsification in Dynamic StreamsUnnamed ItemLimitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programsWeak derandomization of weak algorithms: explicit versions of Yao's lemmaMassive online teaching to bounded learnersLearning mixtures of spherical gaussiansLow-weight halfspaces for sparse boolean vectorsLearnability of DNF with representation-specific queriesCan theories be tested?Making evolution rigorousOn the convergence of the Hegselmann-Krause systemIs privacy compatible with truthfulness?Differentially private data analysis of social networks via restricted sensitivityCharacterizing the sample complexity of private learnersBarriers in cryptography with weak, correlated and leaky sourcesOn the possibilities and limitations of pseudodeterministic algorithmsEvasiveness through a circuit lensThe garden-hose modelSpace-bounded communication complexityTowards an optimal query efficient PCP?A characterization of approximation resistance for even k-partite CSPsOn the optimality of semidefinite relaxations for average-case and generalized constraint satisfactionOn the power of many one-bit proversApproaching utopiaLearning and incentives in user-generated contentWelfare maximization and the supermodular degreeReachability in graph timelinesRuntime guarantees for regression problemsAn energy complexity model for algorithmsStreaming computations with a loquacious proverAdversary lower bound for the k-sum problemStronger methods of making quantum interactive proofs perfectly completeActive self-assembly of algorithmic shapes and patterns in polylogarithmic timeAn equational approach to secure multi-party computationPublicly verifiable proofs of sequential workOn the power of nonuniformity in proofs of securityFast reductions from RAMs to delegatable succinct constraint satisfaction problemsResource-based corruptions and the combinatorics of hidden diversityTime hierarchies for sampling distributionsProperties and applications of boolean function compositionPseudo-partitions, transversality and localityCompeting provers protocols for circuit evaluationCatch them if you canInstance-sensitive robustness guarantees for sequencing with unknown packing and covering constraintsRobust optimization in the presence of uncertaintySorting noisy data with partial informationNew affine-invariant codes from liftingH-wise independenceSparse extractor families for all the entropyOn the power of conditional samples in distribution testingRandomness buys depth for approximate countingDeterministic parallel algorithms for bilinear objective functionsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAlmost k-Wise Independent Sets Establish Hitting Sets for Width-3 1-Branching ProgramsFinite Groups and Complexity Theory: From Leningrad to Saint Petersburg via Las VegasBounded Independence Plus Noise Fools ProductsImpact of memory size on graph exploration capabilityPseudo-random graphs and bit probe schemes with one-sided errorUnnamed ItemFaster Space-Efficient Algorithms for Subset Sum, $k$-Sum, and Related ProblemsExplicit list-decodable codes with optimal rate for computationally bounded channelsPseudorandom generators from regular one-way functions: new constructions with improved parametersPeriodicity and Cyclic Shifts via Linear SketchesTight time-space lower bounds for finding multiple collision pairs and their applicationsBravely, Moderately: A Common Theme in Four Recent WorksAn Almost m-wise Independent Random Permutation of the CubeSynthesizers and their application to the parallel construction of pseudo-random functions\(\text{BP}_{\text{H}}\text{SPACE}(S) \subseteq \text{DSPACE}(S^{3/2})\)Constant-Round Interactive Proofs for Delegating ComputationGraph exploration by a finite automatonPseudorandom Functions: Three Decades LaterRandomness in interactive proofsOn the streaming indistinguishability of a random permutation and a random function



Cites Work




This page was built for publication: Pseudorandom generators for space-bounded computation