Pseudorandomness for network algorithms

From MaRDI portal
Publication:2817628

DOI10.1145/195058.195190zbMath1345.68269OpenAlexW2011438986MaRDI QIDQ2817628

Avi Wigderson, Russell Impagliazzo, Noam Nisan

Publication date: 1 September 2016

Published in: Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/195058.195190




Related Items

Universal traversal sequences with backtracking.Partition expandersA New Pseudorandom Generator from Collision-Resistant Hash FunctionsLow discrepancy sets yield approximate min-wise independent permutation familiesUnnamed ItemA dichotomy for local small-bias generatorsMemory Efficient Anonymous Graph ExplorationRandom oracles and non-uniformityCryptographic hardness of random local functions. SurveyFooling PolytopesPseudorandomness via the Discrete Fourier TransformRandomness-efficient non-interactive zero knowledgeTrading locality for time: certifiable randomness from low-depth circuitsOn Probabilistic Space-Bounded Machines with Multiple Access to Random TapePseudorandom generators for combinatorial checkerboardsParadigms for Unconditional Pseudorandom GeneratorsUnnamed ItemUnnamed ItemHow strong is Nisan's pseudo-random generator?Expander graphs and their applicationsSimple Optimal Hitting Sets for Small-Success RLComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Unnamed ItemLimitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programsWeak derandomization of weak algorithms: explicit versions of Yao's lemmaPseudorandom Pseudo-distributions with Near-Optimal Error for Read-Once Branching ProgramsRandomness buys depth for approximate countingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationBounded Independence Plus Noise Fools ProductsPreserving Randomness for Adaptive AlgorithmsImpact of memory size on graph exploration capabilityImproved Explicit Hitting-Sets for ROABPsHighly symmetric expandersUnnamed ItemUnnamed ItemUnnamed ItemExplicit list-decodable codes with optimal rate for computationally bounded channelsAlgorithms and lower bounds for de morgan formulas of low-communication leaf gatesFourier bounds and pseudorandom generators for product testsApproximating hyper-rectangles: Learning and pseudorandom setsUnnamed ItemTargeted Pseudorandom Generators, Simulation Advice Generators, and Derandomizing LogspaceUnnamed ItemGraph exploration by a finite automatonPseudorandom Functions: Three Decades Later




This page was built for publication: Pseudorandomness for network algorithms