Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1097580 - MaRDI portal

scientific article; zbMATH DE number 1097580

From MaRDI portal
Publication:4372786

DOI<345::AID-RSA4>3.0.CO;2-Z 10.1002/(SICI)1098-2418(199712)11:4<345::AID-RSA4>3.0.CO;2-ZzbMath0891.60100MaRDI QIDQ4372786

David Zuckerman

Publication date: 19 July 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani SourcesExtractors for weak random sources and their applicationsPseudorandomness via the Discrete Fourier TransformDerandomized parallel repetition theorems for free gamesLow-degree test with polynomially small errorDeterministic Randomness Extraction from Generalized and Distributed Santha--Vazirani SourcesUnnamed ItemUnnamed ItemUnnamed ItemWeak derandomization of weak algorithms: explicit versions of Yao's lemmaNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsComputational indistinguishability: A sample hierarchyPseudorandom Pseudo-distributions with Near-Optimal Error for Read-Once Branching ProgramsInnovative approaches for security of small artefactsMust the communication graph of MPC protocols be an expander?An Introduction to Randomness ExtractorsPseudorandom generators without the XOR lemmaExtractors from Reed-Muller codesExtracting Kolmogorov complexity with applications to dimension zero-one lawsUnnamed ItemOn derandomized composition of Boolean functionsExtracting all the randomness and reducing the error in Trevisan's extractorsAlmost Optimal Explicit Johnson-Lindenstrauss FamiliesA Sample of Samplers: A Computational Perspective on SamplingTypically-correct derandomization for small time and spaceExplicit two-source extractors and resilient functionsAdditive Combinatorics: With a View Towards Computer Science and Cryptography—An ExpositionTargeted Pseudorandom Generators, Simulation Advice Generators, and Derandomizing LogspaceList-Decoding with Double SamplersPerfect information leader election in \(\log^*n+O(1)\) rounds