Beating brute force for systems of polynomial equations over finite fields

D Lokshtanov, R Paturi, S Tamaki, R Williams… - Proceedings of the Twenty …, 2017 - SIAM
We consider the problem of solving systems of multivariate polynomial equations of degree
k over a finite field. For every integer k≤ 2 and finite field q where q= pd for a prime p, we …

Beyond natural proofs: Hardness magnification and locality

L Chen, S Hirahara, IC Oliveira, J Pich… - ACM Journal of the …, 2022 - dl.acm.org
Hardness magnification reduces major complexity separations (such as EXP⊈ NC 1) to
proving lower bounds for some natural problem Q against weak circuit models. Several …

Probabilistic rank and matrix rigidity

J Alman, R Williams - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
We consider a notion of probabilistic rank and probabilistic sign-rank of a matrix, which
measure the extent to which a matrix can be probabilistically represented by low-rank …

Affine extractors and ac0-parity

X Huang, P Ivanov, E Viola - Approximation, Randomization, and …, 2022 - drops.dagstuhl.de
We study a simple and general template for constructing affine extractors by composing a
linear transformation with resilient functions. Using this we show that good affine extractors …

Improved bounds on Fourier entropy and min-entropy

S Arunachalam, S Chakraborty, M Koucký… - ACM Transactions on …, 2021 - dl.acm.org
Given a Boolean function f:{-1, 1}^{n}→{-1, 1, define the Fourier distribution to be the
distribution on subsets of [n], where each S⊆[n] is sampled with probability f ˆ (S) 2. The …

Quantum algorithms and approximating polynomials for composed functions with shared inputs

M Bun, R Kothari, J Thaler - Quantum, 2021 - quantum-journal.org
We give new quantum algorithms for evaluating composed functions whose inputs may be
shared between bottom-level gates. Let $ f $ be an $ m $-bit Boolean function and consider …

Linear branching programs and directional affine extractors

S Gryaznov, P Pudlák, N Talebanfard - arxiv preprint arxiv:2201.10997, 2022 - arxiv.org
A natural model of read-once linear branching programs is a branching program where
queries are $\mathbb {F} _2 $ linear forms, and along each path, the queries are linearly …

On the power of border of depth-3 arithmetic circuits

M Kumar - ACM Transactions on Computation Theory (TOCT), 2020 - dl.acm.org
We show that over the field of complex numbers, every homogeneous polynomial of degree
d can be approximated (in the border complexity sense) by a depth-3 arithmetic circuit of top …

Approximate degree in classical and quantum computing

M Bun, J Thaler - Foundations and Trends® in Theoretical …, 2022 - nowpublishers.com
Approximate Degree in Classical and Quantum Computing Page 1 Approximate Degree in
Classical and Quantum Computing Page 2 Other titles in Foundations and Trends® in …

[PDF][PDF] Learning the coefficients: A presentable version of border complexity and applications to circuit factoring

CS Bhargav, P Dwivedi, N Saxena - Proceedings of the 56th Annual …, 2024 - dl.acm.org
The border, or the approximative, model of algebraic computation (VP) is quite popular due
to the Geometric Complexity Theory (GCT) approach to P≠ NP conjecture, and its complex …