Sciweavers

254 search results - page 1 / 51
» On randomized one-round communication complexity
Sort
View
CRYPTO
2003
Springer
124views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Primality Proving via One Round in ECPP and One Iteration in AKS
On August 2002, Agrawal, Kayal and Saxena announced the first deterministic and polynomial time primality testing algorithm. For an input n, the AKS algorithm runs in heuristic t...
Qi Cheng
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
13 years 10 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 3 months ago
Adding a referee to an interconnection network: What can(not) be computed in one round
Abstract—In this paper we ask which properties of a distributed network can be computed from a few amount of local information provided by its nodes. The distributed model we con...
Florent Becker, Martín Matamala, Nicolas Ni...
CORR
2010
Springer
312views Education» more  CORR 2010»
13 years 5 days ago
Quantum One-Way Communication is Exponentially Stronger Than Classical Communication
In STOC 1999, Raz presented a (partial) function for which there is a quantum protocol communicating only O(log n) qubits, but for which any classical (randomized, bounded-error) ...
Bo'az Klartag, Oded Regev
IM
2008
13 years 5 months ago
Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs
Let G = G(n, r) be a random geometric graph resulting from placing n nodes uniformly at random in the unit square (disk) and connecting every two nodes if and only if their Euclide...
Chen Avin