skip to main content
10.1145/335305.335306acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Extractors and pseudo-random generators with optimal seed length

Authors Info & Claims
Published:01 May 2000Publication History
First page image

References

  1. 1.L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXP- TIME has publishable proofs. Computational Complexity, 3(4):307-318, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. Blum. Independent unbiased coin flips from a correlated biased source: a finite state Markov chain. In 25th Annual Symposium on Foundations of Computer Science, pages 425-433, Singer Island, Florida, 24-26 Oct. 1984. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850-864, Nov. 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.J. Cai, A. Nerurkax, and D. Sivakumax. Hardness and hierarchy theorems for probabilistic quasi-polynomial time. In Proceedings of the Thirty-First Annual A CM Symposium on Theory of Computing, pages 726-735, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.B. Chor and O. Goldreich. On the power of two-point based sampling. Journal of Complexity, 5(1):96-106, Max. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.R. impagliazzo. Hard-core distributions for somewhat hard problems. In 36th Annual Symposium on Foundations of Computer Science, pages 538-545, Milwaukee, Wisconsin, 23-25 Oct. 1995. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.R. Impagliazzo, R. Shaltiel, and A. Wigderson. Near optimal conversion of hardness into pseudorandomness. In J Oth Annual Symposium on Foundations of Computer Science. IEEE, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In Proceedings of the Twenty-Ninth Annual A CM Symposium on Theory of Computing, pages 220- 229, E1 Paso, Texas, 4-6 May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.R. Impagliazzo and A. Wigderson. Randomness vs. time: De-randomization under a uniform assumption. In 39th Annual Symposium on Foundations of Computer Science. IEEE, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.A: R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. In Proceedings of the Thirty-First Annual A CM Symposium on Theory of Computing, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.N. Nisan. Extracting randomness: How and why: A survey. In Proceedings, Eleventh Annual IEEE Conference on Computational Complexity, pages 44-58, Philadelphia, Pennsylvania, 24-27 May 1996. IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.N. Nisan and A. Ta-Shma. Extracting randomness: A survey and new constructions. In Journal of Computer and System Sciencess, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.N. Nisan and A. Wigderson. Hardness vs. randomness (extended abstract), in ~9th Annual Symposium on Foundations of Computer Science, pages 2-11, White Plains, New York, 24-26 Oct. 1988. iEEE.Google ScholarGoogle Scholar
  15. 15.N. Nisan and D. Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 52(1):43-52, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.J. Radhakrishnan and A. Ta-Shma. Tight bounds for depth-two superconcentrators. In 38th Annual Symposium on Foundations of Computer Science, pages 585- 594, Miami Beach, Florida, 20-22 Oct. 1997. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.R. Raz, O. Reingold, and S. Vadhan. Error reduction for extractors, in JOth Annual Symposium on Foundations of Computer Science. IEEE, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.R. Raz, O. Reingold, and S. Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. In Proceedings of the Thirty-First Annual A CM Symposium on Theory of Computing, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.M. Santha and U. V. Vazirani. Generating quasirandom sequences from slightly-random sources (extended abstract). In ~5th Annual Symposium on Foundations of Computer Science, pages 434-440, Singer Island, Florida, 24-26 Oct. 1984. IEEE.Google ScholarGoogle Scholar
  20. 20.M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the xor lemma. In Proceedings of the Thirty-First Annual A CM Symposium on Theory of Computing, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.L. Trevisan. Construction of near-optimal extractors using pseudo-random generators. In Proceedings of the Thirty-First Annual A CM Symposium on Theory of Computing, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.hoih boihoi h oihgoirhht oihoigrhoihi iht0itgh the eigenvalue bound: Explicit construction and applications. In Proceedings of the Twenty-Fifth Annual A CM Symposium on the Theory of Computing, pages 245-251, San Diego, California, 16-18 May 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.A. C. Yao. Theory and applications of trapdoor functions (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 80-91, Chicago, Illinois, 3-5 Nov. 1982. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Extractors and pseudo-random generators with optimal seed length

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing
              May 2000
              756 pages
              ISBN:1581131844
              DOI:10.1145/335305

              Copyright © 2000 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 May 2000

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              STOC '00 Paper Acceptance Rate85of182submissions,47%Overall Acceptance Rate1,469of4,586submissions,32%

              Upcoming Conference

              STOC '24
              56th Annual ACM Symposium on Theory of Computing (STOC 2024)
              June 24 - 28, 2024
              Vancouver , BC , Canada

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader