Pseudorandomness
SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …
random" despite being constructed using little or no randomness. This theory has …
1n − o(n) circuit lower bounds for explicit functions
J Li, T Yang - Proceedings of the 54th Annual ACM SIGACT …, 2022 - dl.acm.org
Proving circuit lower bounds has been an important but extremely hard problem for
decades. Although it can be shown that almost every function f: F2 n→ F2 requires circuit of …
decades. Although it can be shown that almost every function f: F2 n→ F2 requires circuit of …
Two source extractors for asymptotically optimal entropy, and (many) more
X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …
several different pseudorandom objects and applications, including seeded or seedless non …
An introduction to randomness extractors
R Shaltiel - International colloquium on automata, languages, and …, 2011 - Springer
We give an introduction to the area of “randomness extraction” and survey the main
concepts of this area: deterministic extractors, seeded extractors and multiple sources …
concepts of this area: deterministic extractors, seeded extractors and multiple sources …
Improved two-source extractors, and affine extractors for polylogarithmic entropy
X Li - 2016 IEEE 57th Annual Symposium on Foundations of …, 2016 - ieeexplore.ieee.org
In a recent breakthrough [1], Chattopadhyay and Zuckerman gave an explicit two-source
extractor for min-entropy k≥ log C n for some large enough constant C, where n is the …
extractor for min-entropy k≥ log C n for some large enough constant C, where n is the …
On the vector subspaces of over which the multiplicative inverse function sums to zero
C Carlet - Designs, Codes and Cryptography, 2024 - Springer
We study the behavior of the multiplicative inverse function (which plays an important role in
cryptography and in the study of finite fields), with respect to a recently introduced …
cryptography and in the study of finite fields), with respect to a recently introduced …
Subspace polynomials and cyclic subspace codes
E Ben-Sasson, T Etzion, A Gabizon… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Subspace codes have received an increasing interest recently due to their application in
error correction for random network coding. In particular, cyclic subspace codes are possible …
error correction for random network coding. In particular, cyclic subspace codes are possible …
Extractors for circuit sources
E Viola - SIAM Journal on Computing, 2014 - SIAM
We obtain the first deterministic extractors for sources generated (or sampled) by small
circuits of bounded depth. Our main results are (1) we extract k(k/nd)^O(1) bits with …
circuits of bounded depth. Our main results are (1) we extract k(k/nd)^O(1) bits with …
Constructions of cyclic constant dimension codes
B Chen, H Liu - Designs, Codes and Cryptography, 2018 - Springer
Subspace codes and particularly constant dimension codes have attracted much attention in
recent years due to their applications in random network coding. As a particular subclass of …
recent years due to their applications in random network coding. As a particular subclass of …
Repairing Reed–Solomon codes evaluated on subspaces
We consider the repair problem for Reed–Solomon (RS) codes, evaluated on an-linear
subspace of dimension, where is a prime power, is a positive integer, and is the Galois field …
subspace of dimension, where is a prime power, is a positive integer, and is the Galois field …