[LIBRO][B] Rainbow connections of graphs

X Li, Y Sun - 2012 - books.google.com
Rainbow connections are natural combinatorial measures that are used in applications to
secure the transfer of classified information between agencies in communication networks …

Rainbow connections of graphs: A survey

X Li, Y Shi, Y Sun - Graphs and combinatorics, 2013 - Springer
The concept of rainbow connection was introduced by Chartrand et al.[14] in 2008. It is
interesting and recently quite a lot papers have been published about it. In this survey we …

Non-malleable codes from two-source extractors

S Dziembowski, T Kazana, M Obremski - Annual Cryptology Conference, 2013 - Springer
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …

Non-malleable extractors and codes, with their many tampered extensions

E Chattopadhyay, V Goyal, X Li - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …

Exponential separation between shallow quantum circuits and unbounded fan-in shallow classical circuits

AB Watts, R Kothari, L Schaeffer, A Tal - … of the 51st Annual ACM SIGACT …, 2019 - dl.acm.org
Recently, Bravyi, Gosset, and Konig (Science, 2018) exhibited a search problem called the
2D Hidden Linear Function (2D HLF) problem that can be solved exactly by a constant …

Leakage-resilient signatures

S Faust, E Kiltz, K Pietrzak, GN Rothblum - Theory of Cryptography: 7th …, 2010 - Springer
The strongest standard security notion for digital signature schemes is unforgeability under
chosen message attacks. In practice, however, this notion can be insufficient due to “side …

An introduction to randomness extractors

R Shaltiel - International colloquium on automata, languages, and …, 2011 - Springer
We give an introduction to the area of “randomness extraction” and survey the main
concepts of this area: deterministic extractors, seeded extractors and multiple sources …

FlexIO: I/O middleware for location-flexible scientific data analytics

F Zheng, H Zou, G Eisenhauer… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
Increasingly severe I/O bottlenecks on High-End Computing machines are prompting
scientists to process simulation output data online while simulations are running and before …

Leakage-resilient storage

F Davì, S Dziembowski, D Venturi - … SCN 2010, Amalfi, Italy, September 13 …, 2010 - Springer
We study a problem of secure data storage on hardware that may leak information. We
introduce a new primitive, that we call leakage-resilient storage (LRS), which is an …

How to refute a random CSP

SR Allen, R O'Donnell, D Witmer - 2015 IEEE 56th Annual …, 2015 - ieeexplore.ieee.org
Let P be a k-ary predicate over a finite alphabet. Consider a random CSP (P) instance I over
n variables with m constraints. When m≫ n the instance will be unsatisfiable with high …