Pseudorandomness

SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …

1no(n) circuit lower bounds for explicit functions

J Li, T Yang - Proceedings of the 54th Annual ACM SIGACT …, 2022 - dl.acm.org
Proving circuit lower bounds has been an important but extremely hard problem for
decades. Although it can be shown that almost every function f: F2 n→ F2 requires circuit of …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

An introduction to randomness extractors

R Shaltiel - International colloquium on automata, languages, and …, 2011 - Springer
We give an introduction to the area of “randomness extraction” and survey the main
concepts of this area: deterministic extractors, seeded extractors and multiple sources …

Improved two-source extractors, and affine extractors for polylogarithmic entropy

X Li - 2016 IEEE 57th Annual Symposium on Foundations of …, 2016 - ieeexplore.ieee.org
In a recent breakthrough [1], Chattopadhyay and Zuckerman gave an explicit two-source
extractor for min-entropy k≥ log C n for some large enough constant C, where n is the …

On the vector subspaces of over which the multiplicative inverse function sums to zero

C Carlet - Designs, Codes and Cryptography, 2024 - Springer
We study the behavior of the multiplicative inverse function (which plays an important role in
cryptography and in the study of finite fields), with respect to a recently introduced …

Subspace polynomials and cyclic subspace codes

E Ben-Sasson, T Etzion, A Gabizon… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Subspace codes have received an increasing interest recently due to their application in
error correction for random network coding. In particular, cyclic subspace codes are possible …

Extractors for circuit sources

E Viola - SIAM Journal on Computing, 2014 - SIAM
We obtain the first deterministic extractors for sources generated (or sampled) by small
circuits of bounded depth. Our main results are (1) we extract k(k/nd)^O(1) bits with …

Constructions of cyclic constant dimension codes

B Chen, H Liu - Designs, Codes and Cryptography, 2018 - Springer
Subspace codes and particularly constant dimension codes have attracted much attention in
recent years due to their applications in random network coding. As a particular subclass of …

Repairing Reed–Solomon codes evaluated on subspaces

A Berman, S Buzaglo, A Dor, Y Shany… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We consider the repair problem for Reed–Solomon (RS) codes, evaluated on an-linear
subspace of dimension, where is a prime power, is a positive integer, and is the Galois field …