[KNJIGA][B] Analysis of boolean functions

R O'Donnell - 2014 - books.google.com
Boolean functions are perhaps the most basic objects of study in theoretical computer
science. They also arise in other areas of mathematics, including combinatorics, statistical …

Pseudorandomness

SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …

Bounded independence fools halfspaces

I Diakonikolas, P Gopalan, R Jaiswal… - SIAM Journal on …, 2010 - SIAM
We show that any distribution on {-1,+1\}^n that is k-wise independent fools any halfspace
(or linear threshold function) h:{-1,+1\}^n→{-1,+1\}, ie, any function of the form …

Pseudorandom bits for polynomials

A Bogdanov, E Viola - SIAM Journal on Computing, 2010 - SIAM
We present a new approach to constructing pseudorandom generators that fool low-degree
polynomials over finite fields, based on the Gowers norm. Using this approach, we obtain …

B-tree indexes and CPU caches

G Graefe, PA Larson - Proceedings 17th International …, 2001 - ieeexplore.ieee.org
Since many existing techniques for exploiting CPU caches in the implementation of B-tree
indexes have not been discussed in the literature, most of them are surveyed. Rather than …

Optimal testing of Reed-Muller codes

A Bhattacharyya, S Kopparty… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
We consider the problem of testing if a given function f: F 2 n→ F 2 is close to any degree d
polynomial in n variables, also known as the Reed-Muller testing problem. Alon et al.[1] …

The Sum of D Small-Bias Generators Fools Polynomials of Degree D

E Viola - Computational Complexity, 2009 - Springer
We prove that the sum of d small-bias generators L: F^ s → F^ n fools degree-d polynomials
in n variables over a field F, for any fixed degree d and field F, including F= F _ 2={0, 1\}. Our …

Pseudorandom generators for width-3 branching programs

R Meka, O Reingold, A Tal - Proceedings of the 51st Annual ACM …, 2019 - dl.acm.org
We construct pseudorandom generators of seed length Õ (log (n)· log (1/є)) that є-fool
ordered read-once branching programs (ROBPs) of width 3 and length n. For unordered …

Better pseudorandom generators from milder pseudorandom restrictions

P Gopalan, R Meka, O Reingold… - 2012 IEEE 53rd …, 2012 - ieeexplore.ieee.org
We present an iterative approach to constructing pseudorandom generators, based on the
repeated application of mild pseudorandom restrictions. We use this template to construct …

Cryptographic hardness of random local functions: Survey

B Applebaum - Computational complexity, 2016 - Springer
Constant parallel-time cryptography allows to perform complex cryptographic tasks at an
ultimate level of parallelism, namely by local functions that each of their output bits depend …