Pseudorandomness

From MaRDI portal
Publication:2869768

DOI10.1561/0400000010zbMath1308.68011OpenAlexW4205550388WikidataQ56058888 ScholiaQ56058888MaRDI QIDQ2869768

Salil P. Vadhan

Publication date: 3 January 2014

Published in: Foundations and Trends® in Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1561/0400000010




Related Items (39)

A construction of combinatorial NLTSAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreConstructing locally leakage-resilient linear secret-sharing schemesModel independent approach to probabilistic modelsRobustly reusable fuzzy extractor with imperfect randomnessProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesNew techniques and tighter bounds for local computation algorithmsOrganisational hierarchy constructions with easy Kuramoto synchronisationOn the Error-Correcting Radius of Folded Reed–Solomon Code DesignsOptimal Rate List Decoding over Bounded Alphabets Using Algebraic-geometric CodesFully adaptive decentralized multi-authority \textsf{ABE}Derandomizing local distributed algorithms under bandwidth restrictionsGrounding the randomness of quantum measurementQuery-to-communication lifting for \(\mathsf{P}^{\mathsf{NP}}\)Component stability in low-space massively parallel computationIndistinguishable predictions and multi-group fair learningParadigms for Unconditional Pseudorandom GeneratorsNonmalleable digital lockers and robust fuzzy extractors in the plain modelUnnamed ItemUnnamed ItemCryptographic hash functions from sequences of lifted Paley graphsUnnamed ItemFurther optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectorsContinuous Monitoring of l_p Norms in Data StreamsLossless dimension expanders via linearized polynomials and subspace designsNon-malleable coding against bit-wise and split-state tamperingQuasirandomness in hypergraphsUnnamed ItemUnnamed ItemStabilizing network bargaining games by blocking playersFragile complexity of adaptive algorithmsSuperfast coloring in CONGEST via efficient color samplingFragile complexity of adaptive algorithmsPublic-coin statistical zero-knowledge batch verification against malicious verifiersAlgorithms and lower bounds for de morgan formulas of low-communication leaf gatesTypically-correct derandomization for small time and spaceProving that \(\mathrm{prBPP}=\mathrm{prP}\) is as hard as proving that ``almost NP is not contained in P/polyRandomness in post-selected eventsRank-Metric Codes and Their Applications




This page was built for publication: Pseudorandomness