Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Opening Up the Distinguisher: A Hardness to Randomness Approach for BPL=L That Uses Properties of BPL
STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of ComputingPages 2039–2049https://doi.org/10.1145/3618260.3649772We provide compelling evidence for the potential of hardness-vs.-randomness approaches to make progress on the long-standing problem of derandomizing space-bounded computation. Our first contribution is a derandomization of bounded-space machines from ...
- ArticleNovember 2023
Pseudorandomness with Proof of Destruction and Applications
AbstractTwo fundamental properties of quantum states that quantum information theory explores are pseudorandomness and provability of destruction. We introduce the notion of quantum pseudorandom states with proofs of destruction (PRSPD) that combines both ...
- research-articleJune 2023
Extractors for Images of Varieties
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of ComputingPages 46–59https://doi.org/10.1145/3564246.3585109We construct explicit deterministic extractors for polynomial images of varieties, that is, distributions sampled by applying a low-degree polynomial map f : Fqr → Fqn to an element sampled uniformly at random from a k-dimensional variety V ⊆ Fqr. ...
- research-articleJune 2023
Near-Optimal Derandomization of Medium-Width Branching Programs
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of ComputingPages 23–34https://doi.org/10.1145/3564246.3585108We give a deterministic white-box algorithm to estimate the expectation of a read-once branching program of length n and width w in space Õ(logn+√logn·logw). In particular, we obtain an almost optimal space Õ(logn) derandomization of programs up to ...
-
- research-articleFebruary 2023
Superfast coloring in CONGEST via efficient color sampling
AbstractWe present a procedure for efficiently sampling colors in the CONGEST model. It allows nodes whose number of colors exceeds their number of neighbors by a constant fraction to sample up to Θ ( log n ) semi-random colors unused by ...
Highlights- Ultrafast distributed coloring is possible even with bandwidth constraints.
- ...
- research-articleJuly 2022
Pseudorandom sequences derived from automatic sequences
Cryptography and Communications (SPCC), Volume 14, Issue 4Pages 783–815https://doi.org/10.1007/s12095-022-00556-9AbstractMany automatic sequences, such as the Thue-Morse sequence or the Rudin-Shapiro sequence, have some desirable features of pseudorandomness such as a large linear complexity and a small well-distribution measure. However, they also have some ...
- ArticleSeptember 2021
How Do the Arbiter PUFs Sample the Boolean Function Class?
AbstractArbiter based Physical Unclonable Function (sometimes called Physically Unclonable Function, or in short PUF) is a hardware based pseudorandom bit generator. The pseudorandomness in the output bits depends on device specific parameters. For ...
- research-articleSeptember 2021
Maximum order complexity of the sum of digits function in Zeckendorf base and polynomial subsequences
Cryptography and Communications (SPCC), Volume 13, Issue 5Pages 791–814https://doi.org/10.1007/s12095-021-00507-wAbstractAutomatic sequences are not suitable sequences for cryptographic applications since both their subword complexity and their expansion complexity are small, and their correlation measure of order 2 is large. These sequences are highly predictable ...
- research-articleJuly 2019
Bounded Independence versus Symmetric Tests
ACM Transactions on Computation Theory (TOCT), Volume 11, Issue 4Article No.: 21, Pages 1–27https://doi.org/10.1145/3337783For a test T ⊆ {0, 1}n, define k*(T) to be the maximum k such that there exists a k-wise uniform distribution over {0, 1}n whose support is a subset of T.
For Ht = {x ∈ {0, 1}n : | ∑ixi − n/2| ≤ t}, we prove k*(Ht) = Θ (t2/n + 1).
For Sm, c = {x ∈ {0, 1}...
- articleDecember 2018
Analysis of the single-permutation encrypted Davies---Meyer construction
Designs, Codes and Cryptography (DCAC), Volume 86, Issue 12Pages 2703–2723We consider the so-called Encrypted Davies---Meyer (EDM) construction, which turns a permutation P on $$\{0,1\}^n$${0,1}n into a function from $$\{0,1\}^n$${0,1}n to $$\{0,1\}^n$${0,1}n defined as $$P(P(x)\oplus x)$$P(P(x)?x). A similar construction ...
- research-articleJune 2017
Non-malleable codes and extractors for small-depth circuits, and affine functions
STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of ComputingPages 1171–1184https://doi.org/10.1145/3055399.3055483Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs as an elegant relaxation of error correcting codes, where the motivation is to handle more general forms of tampering while still providing meaningful guarantees. This has led to ...
- research-articleApril 2017
Pseudorandom Generators with Optimal Seed Length for Non-Boolean Poly-Size Circuits
ACM Transactions on Computation Theory (TOCT), Volume 9, Issue 2Article No.: 6, Pages 1–26https://doi.org/10.1145/3018057A sampling procedure for a distribution P over {0, 1}ℓ is a function C: {0, 1}n → {0, 1}ℓ such that the distribution C(Un) (obtained by applying C on the uniform distribution Un) is the “desired distribution” P. Let n > r ≥ ℓ = nΩ(1). An ϵ-nb-PRG (...
- articleApril 2017
Partition Expanders
Theory of Computing Systems (TOCSYS), Volume 60, Issue 3Pages 378–395https://doi.org/10.1007/s00224-016-9738-5We introduce a new concept, which we call partition expanders. The basic idea is to study quantitative properties of graphs in a slightly different way than it is in the standard definition of expanders. While in the definition of expanders it is ...
- articleFebruary 2017
Small-Bias is Not Enough to Hit Read-Once CNF
Theory of Computing Systems (TOCSYS), Volume 60, Issue 2Pages 324–345https://doi.org/10.1007/s00224-016-9680-6Small-bias probability spaces have wide applications in pseudorandomness which naturally leads to the study of their limitations. Constructing a polynomial complexity hitting set for read-once CNF formulas is a basic open problem in pseudorandomness. We ...
- research-articleJanuary 2017
On finite pseudorandom binary lattices
Discrete Applied Mathematics (DAMA), Volume 216, Issue P3Pages 589–597https://doi.org/10.1016/j.dam.2015.07.012Pseudorandom binary sequences play a crucial role in cryptography. The classical approach to pseudorandomness of binary sequences is based on computational complexity. This approach has certain weak points thus in the last two decades a new, more ...
- research-articleNovember 2016
New techniques and tighter bounds for local computation algorithms
Journal of Computer and System Sciences (JCSS), Volume 82, Issue 7Pages 1180–1200https://doi.org/10.1016/j.jcss.2016.05.007Given an input x and a search problem F, local computation algorithms (LCAs) implement access to specified locations of y in a legal output y ź F ( x ) , using polylogarithmic time and space. Parnas and Ron 27 and Mansour et al. 19 showed how to convert ...
- research-articleJune 2016
Extractors for sumset sources
STOC '16: Proceedings of the forty-eighth annual ACM symposium on Theory of ComputingPages 299–311https://doi.org/10.1145/2897518.2897643We propose a new model of weak random sources which we call sumset sources. A sumset source X is the sum of C independent sources, with each source on n bits source having min-entropy k. We show that extractors for this class of sources can be used to ...
- research-articleJune 2016
Non-malleable extractors and codes, with their many tampered extensions
STOC '16: Proceedings of the forty-eighth annual ACM symposium on Theory of ComputingPages 285–298https://doi.org/10.1145/2897518.2897547Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are seeded non-...