Sciweavers

ECCC
2011
180views ECommerce» more  ECCC 2011»
13 years 2 months ago
Two Comments on Targeted Canonical Derandomizers
We revisit the notion of a targeted canonical derandomizer, introduced in our recent ECCC Report (TR10-135) as a uniform notion of a pseudorandom generator that suffices for yield...
Oded Goldreich
ECCC
2010
77views more  ECCC 2010»
13 years 7 months ago
In a World of P=BPP
We show that proving results such as BPP = P essentially necessitate the construction of suitable pseudorandom generators (i.e., generators that suffice for such derandomization r...
Oded Goldreich
CRYPTO
2006
Springer
110views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On the Power of the Randomized Iterate
We consider two of the most fundamental theorems in Cryptography. The first, due to H
Iftach Haitner, Danny Harnik, Omer Reingold
STOC
1994
ACM
108views Algorithms» more  STOC 1994»
13 years 11 months ago
Pseudorandomness for network algorithms
We define pseudorandom generators for Yao's twoparty communication complexity model and exhibit a simple construction, based on expanders, for it. We then use a recursive com...
Russell Impagliazzo, Noam Nisan, Avi Wigderson
ASIACRYPT
2001
Springer
14 years 1 days ago
Practical Construction and Analysis of Pseudo-Randomness Primitives
Abstract. We give a careful, fixed-size parameter analysis of a standard [1,4] way to form a pseudorandom generator by iterating a one-way function and then pseudo-random function...
Johan Håstad, Mats Näslund
FOCS
2007
IEEE
14 years 1 months ago
Pseudorandom Bits for Polynomials
We present a new approach to constructing pseudorandom generators that fool lowdegree polynomials over finite fields, based on the Gowers norm. Using this approach, we obtain th...
Andrej Bogdanov, Emanuele Viola