Sciweavers

ECCC
2011
180views ECommerce» more  ECCC 2011»
12 years 11 months ago
Two Comments on Targeted Canonical Derandomizers
We revisit the notion of a targeted canonical derandomizer, introduced in our recent ECCC Report (TR10-135) as a uniform notion of a pseudorandom generator that suffices for yield...
Oded Goldreich
ECCC
2010
77views more  ECCC 2010»
13 years 4 months ago
In a World of P=BPP
We show that proving results such as BPP = P essentially necessitate the construction of suitable pseudorandom generators (i.e., generators that suffice for such derandomization r...
Oded Goldreich
CRYPTO
2006
Springer
110views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
On the Power of the Randomized Iterate
We consider two of the most fundamental theorems in Cryptography. The first, due to H
Iftach Haitner, Danny Harnik, Omer Reingold
STOC
1994
ACM
108views Algorithms» more  STOC 1994»
13 years 8 months ago
Pseudorandomness for network algorithms
We define pseudorandom generators for Yao's twoparty communication complexity model and exhibit a simple construction, based on expanders, for it. We then use a recursive com...
Russell Impagliazzo, Noam Nisan, Avi Wigderson
ASIACRYPT
2001
Springer
13 years 9 months ago
Practical Construction and Analysis of Pseudo-Randomness Primitives
Abstract. We give a careful, fixed-size parameter analysis of a standard [1,4] way to form a pseudorandom generator by iterating a one-way function and then pseudo-random function...
Johan Håstad, Mats Näslund
FOCS
2007
IEEE
13 years 11 months ago
Pseudorandom Bits for Polynomials
We present a new approach to constructing pseudorandom generators that fool lowdegree polynomials over finite fields, based on the Gowers norm. Using this approach, we obtain th...
Andrej Bogdanov, Emanuele Viola