Beating brute force for systems of polynomial equations over finite fields
We consider the problem of solving systems of multivariate polynomial equations of degree
k over a finite field. For every integer k≤ 2 and finite field q where q= pd for a prime p, we …
k over a finite field. For every integer k≤ 2 and finite field q where q= pd for a prime p, we …
Beyond natural proofs: Hardness magnification and locality
Hardness magnification reduces major complexity separations (such as EXP⊈ NC 1) to
proving lower bounds for some natural problem Q against weak circuit models. Several …
proving lower bounds for some natural problem Q against weak circuit models. Several …
Probabilistic rank and matrix rigidity
J Alman, R Williams - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
We consider a notion of probabilistic rank and probabilistic sign-rank of a matrix, which
measure the extent to which a matrix can be probabilistically represented by low-rank …
measure the extent to which a matrix can be probabilistically represented by low-rank …
Affine extractors and ac0-parity
We study a simple and general template for constructing affine extractors by composing a
linear transformation with resilient functions. Using this we show that good affine extractors …
linear transformation with resilient functions. Using this we show that good affine extractors …
Improved bounds on Fourier entropy and min-entropy
Given a Boolean function f:{-1, 1}^{n}→{-1, 1, define the Fourier distribution to be the
distribution on subsets of [n], where each S⊆[n] is sampled with probability f ˆ (S) 2. The …
distribution on subsets of [n], where each S⊆[n] is sampled with probability f ˆ (S) 2. The …
Quantum algorithms and approximating polynomials for composed functions with shared inputs
We give new quantum algorithms for evaluating composed functions whose inputs may be
shared between bottom-level gates. Let $ f $ be an $ m $-bit Boolean function and consider …
shared between bottom-level gates. Let $ f $ be an $ m $-bit Boolean function and consider …
Linear branching programs and directional affine extractors
S Gryaznov, P Pudlák, N Talebanfard - arxiv preprint arxiv:2201.10997, 2022 - arxiv.org
A natural model of read-once linear branching programs is a branching program where
queries are $\mathbb {F} _2 $ linear forms, and along each path, the queries are linearly …
queries are $\mathbb {F} _2 $ linear forms, and along each path, the queries are linearly …
On the power of border of depth-3 arithmetic circuits
M Kumar - ACM Transactions on Computation Theory (TOCT), 2020 - dl.acm.org
We show that over the field of complex numbers, every homogeneous polynomial of degree
d can be approximated (in the border complexity sense) by a depth-3 arithmetic circuit of top …
d can be approximated (in the border complexity sense) by a depth-3 arithmetic circuit of top …
Approximate degree in classical and quantum computing
Approximate Degree in Classical and Quantum Computing Page 1 Approximate Degree in
Classical and Quantum Computing Page 2 Other titles in Foundations and Trends® in …
Classical and Quantum Computing Page 2 Other titles in Foundations and Trends® in …
[PDF][PDF] Learning the coefficients: A presentable version of border complexity and applications to circuit factoring
The border, or the approximative, model of algebraic computation (VP) is quite popular due
to the Geometric Complexity Theory (GCT) approach to P≠ NP conjecture, and its complex …
to the Geometric Complexity Theory (GCT) approach to P≠ NP conjecture, and its complex …