Pseudorandomness

SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …

[图书][B] Boolean function complexity: advances and frontiers

S Jukna - 2012 - Springer
Boolean circuit complexity is the combinatorics of computer science and involves many
intriguing problems that are easy to state and explain, even for the layman. This book is a …

An introduction to randomness extractors

R Shaltiel - International colloquium on automata, languages, and …, 2011 - Springer
We give an introduction to the area of “randomness extraction” and survey the main
concepts of this area: deterministic extractors, seeded extractors and multiple sources …

Affine extractors for almost logarithmic entropy

E Chattopadhyay, J Goodman… - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
We give an explicit construction of an affine extractor (over F_2) that works for affine sources
on n bits with min-entropy k≧\logn⋅(\log\logn)^1+o(1). This improves prior work of Li …

Recent advances on the log-rank conjecture in communication complexity

S Lovett - arXiv preprint arXiv:1403.8106, 2014 - arxiv.org
The log-rank conjecture is one of the fundamental open problems in communication
complexity. It speculates that the deterministic communication complexity of any two-party …

Subspace evasive sets

Z Dvir, S Lovett - Proceedings of the forty-fourth annual ACM symposium …, 2012 - dl.acm.org
We construct explicit subspace-evasive sets. These are subsets of Fn of size| F|(1-ε) n
whose intersection with any k-dimensional subspace is bounded by a constant c (k, ε). This …

Two-source dispersers for polylogarithmic entropy and improved Ramsey graphs

G Cohen - Proceedings of the forty-eighth annual ACM …, 2016 - dl.acm.org
In his influential 1947 paper that inaugurated the probabilistic method, Erdős proved the
existence of 2log n-Ramsey graphs on n vertices. Matching Erdős' result with a constructive …

Non-malleable extractors, two-source extractors and privacy amplification

X Li - 2012 IEEE 53rd Annual Symposium on Foundations of …, 2012 - ieeexplore.ieee.org
In [1], Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable
extractor is a much stronger version of a seeded extractor. Dodis and Wichs showed that …

Communication is bounded by root of rank

S Lovett - Journal of the ACM (JACM), 2016 - dl.acm.org
We prove that any total boolean function of rank r can be computed by a deterministic
communication protocol of complexity O (√ ċ log (r)). Equivalently, any graph whose …

Making the most of advice: New correlation breakers and their applications

G Cohen - 2016 IEEE 57th Annual Symposium on Foundations …, 2016 - ieeexplore.ieee.org
A typical obstacle one faces when constructing pseudorandom objects is undesired
correlations between random variables. Identifying this obstacle and constructing certain …