Sciweavers

290 search results - page 52 / 58
» Pseudorandom Bits for Polynomials
Sort
View
CRYPTO
2003
Springer
124views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Primality Proving via One Round in ECPP and One Iteration in AKS
On August 2002, Agrawal, Kayal and Saxena announced the first deterministic and polynomial time primality testing algorithm. For an input n, the AKS algorithm runs in heuristic t...
Qi Cheng
EUROCRYPT
2003
Springer
14 years 1 months ago
Algebraic Attacks on Stream Ciphers with Linear Feedback
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Nicolas Courtois, Willi Meier
CRYPTO
2001
Springer
116views Cryptology» more  CRYPTO 2001»
14 years 28 days ago
Nonlinear Vector Resilient Functions
An (n, m, k)-resilient function is a function f : Fn 2 → Fm 2 such that every possible output m-tuple is equally likely to occur when the values of k arbitrary inputs are fixed ...
Jung Hee Cheon
FOCS
1999
IEEE
14 years 22 days ago
A Probabilistic Algorithm for k-SAT and Constraint Satisfaction Problems
We present a simple probabilistic algorithm for solving kSAT, and more generally, for solving constraint satisfaction problems (CSP). The algorithm follows a simple localsearch pa...
Uwe Schöning
FOCS
2004
IEEE
14 years 5 days ago
Extracting Randomness Using Few Independent Sources
In this work we give the first deterministic extractors from a constant number of weak sources whose entropy rate is less than 1/2. Specifically, for every > 0 we give an expl...
Boaz Barak, Russell Impagliazzo, Avi Wigderson