Hidden progress in deep learning: Sgd learns parities near the computational limit

B Barak, B Edelman, S Goel… - Advances in …, 2022 - proceedings.neurips.cc
There is mounting evidence of emergent phenomena in the capabilities of deep learning
methods as we scale up datasets, model sizes, and training times. While there are some …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

New algorithms for learning in presence of errors

S Arora, R Ge - International Colloquium on Automata, Languages …, 2011 - Springer
We give new algorithms for a variety of randomly-generated instances of computational
problems using a linearization technique that reduces to solving a system of linear …

Detecting high log-densities: an O(n¼) approximation for densest k-subgraph

A Bhaskara, M Charikar, E Chlamtac, U Feige… - Proceedings of the forty …, 2010 - dl.acm.org
In the Densest k-Subgraph problem, given a graph G and a parameter k, one needs to find a
subgraph of G induced on k vertices that contains the largest number of edges. There is a …

Statistical algorithms and a lower bound for detecting planted cliques

V Feldman, E Grigorescu, L Reyzin… - Journal of the ACM …, 2017 - dl.acm.org
We introduce a framework for proving lower bounds on computational problems over
distributions against algorithms that can be implemented using access to a statistical query …

A nearly tight sum-of-squares lower bound for the planted clique problem

B Barak, S Hopkins, J Kelner, PK Kothari, A Moitra… - SIAM Journal on …, 2019 - SIAM
We prove that with high probability over the choice of a random graph G from the Erdös--
Rényi distribution G(n,1/2), the n^O(d)-time degree d sum-of-squares (SOS) semidefinite …

[PDF][PDF] BIKE: bit flipping key encapsulation

N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy… - 2022 - inria.hal.science
4 Design Rationale and Considerations (2. B. 6) 11 4.1 What is BIKE and how should it be
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …

Computationally volume-hiding structured encryption

S Kamara, T Moataz - Advances in Cryptology–EUROCRYPT 2019: 38th …, 2019 - Springer
We initiate the study of structured encryption schemes with computationally-secure leakage.
Specifically, we focus on the design of volume-hiding encrypted multi-maps; that is, of …

Incoherence-optimal matrix completion

Y Chen - IEEE Transactions on Information Theory, 2015 - ieeexplore.ieee.org
This paper considers the matrix completion problem. We show that it is not necessary to
assume joint incoherence, which is a standard but unintuitive and restrictive condition that is …

[HTML][HTML] Reducibility and computational lower bounds for problems with planted sparse structure

M Brennan, G Bresler… - Conference On Learning …, 2018 - proceedings.mlr.press
Recently, research in unsupervised learning has gravitated towards exploring statistical-
computational gaps induced by sparsity. A line of work initiated in Berthet and Rigollet …