Andrej Bogdanov

From MaRDI portal
(Redirected from Person:315548)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Classical simulation of one-query quantum distinguishers2025-01-14Paper
CDS composition of multi-round protocols2024-12-13Paper
Nondeterministic interactive refutations for nearest Boolean vector2024-11-14Paper
Public-key encryption, local pseudorandom generators, and the low-degree method2024-08-01Paper
scientific article; zbMATH DE number 7829258 (Why is no real title available?)2024-04-09Paper
Public-key encryption from homogeneous CLWE
Theory of Cryptography
2023-08-14Paper
Acyclicity programming for sigma-protocols2023-03-31Paper
Non-interactive composition of sigma-protocols via Share-then-Hash2023-03-29Paper
Approximate Degree, Secret Sharing, and Concentration Phenomena
(available as arXiv preprint)
2023-02-03Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2022-03-03Paper
Pseudorandom functions: three decades later
Tutorials on the Foundations of Cryptography
2022-01-12Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2021-11-24Paper
Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2021-09-10Paper
Optimal deterministic extractors for generalized Santha-Vazirani sources2021-08-04Paper
Threshold secret sharing requires a linear-size alphabet
Theory of Computing
2020-12-17Paper
Approximate bounded indistinguishability2020-05-27Paper
Unconditionally secure computation against low-complexity leakage
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Complete Classification of Generalized Santha-Vazirani Sources2017-09-10Paper
On Extracting Common Random Bits From Correlated Sources
IEEE Transactions on Information Theory
2017-07-12Paper
Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Sparse extractor families for all the entropy
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Threshold Secret Sharing Requires a Linear Size Alphabet
Theory of Cryptography
2016-12-22Paper
Bounded indistinguishability and the complexity of recovering secrets
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
A dichotomy for local small-bias generators
Journal of Cryptology
2016-09-21Paper
On the hardness of learning with rounding over small modulus
Theory of Cryptography
2016-03-23Paper
Homomorphic evaluation requires depth
Theory of Cryptography
2016-03-23Paper
Hard functions for low-degree polynomials over prime fields
ACM Transactions on Computation Theory
2015-09-24Paper
On basing size-verifiable one-way functions on NP-hardness
Theory of Cryptography
2015-07-06Paper
Pseudorandomness for Read-Once Formulas
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
Limits of provable security for homomorphic encryption
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Input locality and hardness amplification
Journal of Cryptology
2013-04-15Paper
Pseudorandomness for Linear Length Branching Programs and Stack Machines
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2012-11-02Paper
On the security of Goldreich's one-way function
Computational Complexity
2012-06-26Paper
A dichotomy for local small-bias generators
Theory of Cryptography
2012-06-15Paper
The computational complexity of estimating MCMC convergence time
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2011-08-17Paper
Hard functions for low-degree polynomials over prime fields
Mathematical Foundations of Computer Science 2011
2011-08-17Paper
Input locality and hardness amplification
Theory of Cryptography
2011-05-19Paper
Pseudorandom bits for polynomials
SIAM Journal on Computing
2011-01-17Paper
Pseudorandom generators for low degree polynomials
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
2010-08-16Paper
On the Security of Goldreich’s One-Way Function
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2009-10-28Paper
The Complexity of Distinguishing Markov Random Fields
Lecture Notes in Computer Science
2008-11-27Paper
Average-Case Complexity
Foundations and Trends® in Theoretical Computer Science
2008-09-01Paper
On Worst‐Case to Average‐Case Reductions for NP Problems
SIAM Journal on Computing
2007-09-07Paper
scientific article; zbMATH DE number 5081744 (Why is no real title available?)2007-01-04Paper
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Lecture Notes in Computer Science
2005-08-25Paper
scientific article; zbMATH DE number 1973995 (Why is no real title available?)2003-09-03Paper


Research outcomes over time


This page was built for person: Andrej Bogdanov