Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators

From MaRDI portal
Publication:4943700

DOI10.1137/S0895480197329508zbMath1023.94025OpenAlexW2035532007WikidataQ62398496 ScholiaQ62398496MaRDI QIDQ4943700

Amnon Ta-Shma, Jaikumar Radhakrishnan

Publication date: 19 March 2000

Published in: SIAM Journal on Discrete Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0895480197329508




Related Items

Sampling CorrectorsThe size‐Ramsey number of treesCondensed UnpredictabilityQuantified Derandomization: How to Find Water in the OceanShannon Entropy Versus Renyi Entropy from a Cryptographic ViewpointOn complexity of linear operators on the class of circuits of depth 2An Efficient Reduction from Two-Source to Nonmalleable Extractors: Achieving Near-Logarithmic Min-EntropyUnnamed ItemConstructions of given-depth and optimal multirate rearrangeably nonblocking distributorsMetric Pseudoentropy: Characterizations, Transformations and ApplicationsLower bounds for complexity of Boolean circuits of finite depth with arbitrary elementsLower Bounds for Depth-2 and Depth-3 Boolean Circuits with Arbitrary GatesUnnamed ItemUnnamed ItemVariations on Muchnik's conditional complexity theoremHow to get more mileage from randomness extractorsWeak derandomization of weak algorithms: explicit versions of Yao's lemmaBounded-Retrieval Model with Keys Derived from Private DataIncreasing the Output Length of Zero-Error DispersersMin-rank conjecture for log-depth circuitsLossless dimension expanders via linearized polynomials and subspace designsShort lists with short programs in short timeAn Introduction to Randomness ExtractorsExtractor Lower Bounds, RevisitedImproving the space-bounded version of Muchnik's conditional complexity theorem via ``naive derandomizationPrivacy amplification with asymptotically optimal entropy lossEntropy of operators or why matrix multiplication is hard for depth-two circuitsSimple extractors via constructions of cryptographic pseudo-random generatorsExtractors from Reed-Muller codesUnnamed ItemOptimal Sparse Designs for Process Flexibility via Probabilistic ExpandersLower bounds for matrix factorizationInapproximability of b-Matching in k-Uniform HypergraphsHow to extract useful randomness from unreliable sourcesA Sample of Samplers: A Computational Perspective on SamplingUnnamed ItemBetter short-seed quantum-proof extractorsRepresenting \((0,1)\)-matrices by Boolean circuitsLower bounds for matrix factorizationIncreasing the output length of zero-error dispersersCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?Efficient Construction of Rigid Matrices Using an NP OracleEstimating security of the quantum key distribution from the guessworkQuantum Authentication and Encryption with Key RecyclingReal \(\tau \)-conjecture for sum-of-squares: a unified approach to lower bound and derandomization