Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

Visual cryptography

M Naor, A Shamir - Advances in Cryptology—EUROCRYPT'94: Workshop …, 1995 - Springer
In this paper we consider a new type of cryptographic scheme, which can decode concealed
images without any cryptographic computations. The scheme is perfectly secure and very …

Expander graphs and their applications

S Hoory, N Linial, A Wigderson - Bulletin of the American Mathematical …, 2006 - ams.org
But, perhaps, we should start with a few words about graphs in general. They are, of course,
one of the prime objects of study in Discrete Mathematics. However, graphs are among the …

Quantum fingerprinting

H Buhrman, R Cleve, J Watrous, R De Wolf - Physical review letters, 2001 - APS
Classical fingerprinting associates with each string a shorter string (its fingerprint), such that
any two distinct strings can be distinguished with small error by comparing their fingerprints …

Color-coding

N Alon, R Yuster, U Zwick - Journal of the ACM (JACM), 1995 - dl.acm.org
We describe a novel randomized method. the method of cobm-coding for finding simple
paths and cycles of a specified length k, and other small subgraphs, within a gwen graph …

Expander codes

M Sipser, DA Spielman - IEEE transactions on Information …, 1996 - ieeexplore.ieee.org
Using expander graphs, we construct a new family of asymptotically good, linear error-
correcting codes. These codes have linear time sequential decoding algorithms and …

[PDF][PDF] Small-bias probability spaces: Efficient constructions and applications

J Naor, M Naor - Proceedings of the twenty-second annual ACM …, 1990 - dl.acm.org
We show how to efficiently construct a small probability space on n binary random variables
such that for every subset, its parity is either zero or one with" almost" equal probability. They …

Collusion-secure fingerprinting for digital data

D Boneh, J Shaw - IEEE Transactions on Information Theory, 1998 - ieeexplore.ieee.org
This paper discusses methods for assigning code-words for the purpose of fingerprinting
digital data, eg, software, documents, music, and video. Fingerprinting consists of uniquely …

Tracing traitors

B Chor, A Fiat, M Naor - Advances in Cryptology—CRYPTO'94: 14th …, 1994 - Springer
We give cryptographic schemes that help trace the source of leaks when sensitive or
proprietary data is made available to a large set of parties. This is particularly important for …

Simple constructions of almost k‐wise independent random variables

N Alon, O Goldreich, J Håstad… - Random Structures & …, 1992 - Wiley Online Library
We present three alternative simple constructions of small probability spaces on n bits for
which any k bits are almost independent. The number of bits used to specify a point in the …