Dolev, Shlomi; Petig, Thomas; Schiller, Elad M. Self-stabilizing and private distributed shared atomic memory in seldomly fair message passing networks. (English) Zbl 07677083 Algorithmica 85, No. 1, 216-276 (2023). MSC: 68Wxx 05Cxx PDFBibTeX XMLCite \textit{S. Dolev} et al., Algorithmica 85, No. 1, 216--276 (2023; Zbl 07677083) Full Text: DOI arXiv
Lopes, Miles E.; Erichson, N. Benjamin; Mahoney, Michael W. Bootstrapping the operator norm in high dimensions: error estimation for covariance matrices and sketching. (English) Zbl 07634398 Bernoulli 29, No. 1, 428-450 (2023). MSC: 65Fxx 62Hxx 62Gxx PDFBibTeX XMLCite \textit{M. E. Lopes} et al., Bernoulli 29, No. 1, 428--450 (2023; Zbl 07634398) Full Text: DOI arXiv Link
Raskhodnikova, Sofya; Ron-Zewi, Noga; Varma, Nithin Erasures versus errors in local decoding and property testing. (English) Zbl 1522.68750 Random Struct. Algorithms 59, No. 4, 640-670 (2021). MSC: 68W20 94B35 PDFBibTeX XMLCite \textit{S. Raskhodnikova} et al., Random Struct. Algorithms 59, No. 4, 640--670 (2021; Zbl 1522.68750) Full Text: DOI
Devevey, Julien; Libert, Benoît; Nguyen, Khoa; Peters, Thomas; Yung, Moti Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings. (English) Zbl 1479.94154 Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 659-690 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Devevey} et al., Lect. Notes Comput. Sci. 12710, 659--690 (2021; Zbl 1479.94154) Full Text: DOI Link
Gamarnik, David; Kızıldağ, Eren C. Computing the partition function of the Sherrington-Kirkpatrick model is hard on average. (English) Zbl 1474.68161 Ann. Appl. Probab. 31, No. 3, 1474-1504 (2021). MSC: 68Q17 60C05 82D30 PDFBibTeX XMLCite \textit{D. Gamarnik} and \textit{E. C. Kızıldağ}, Ann. Appl. Probab. 31, No. 3, 1474--1504 (2021; Zbl 1474.68161) Full Text: DOI arXiv Link
Boix-Adserà, Enric; Brennan, Matthew; Bresler, Guy The average-case complexity of counting cliques in Erdös-Rényi hypergraphs. (English) Zbl 1528.68276 SIAM J. Comput. 50, No. 5, FOCS19-39-FOCS19-80 (2021). MSC: 68R10 05C65 05C80 05C85 68Q25 PDFBibTeX XMLCite \textit{E. Boix-Adserà} et al., SIAM J. Comput. 50, No. 5, FOCS19--39-FOCS19--80 (2021; Zbl 1528.68276) Full Text: DOI arXiv
Reingold, Omer; Rothblum, Guy N.; Rothblum, Ron D. Constant-round interactive proofs for delegating computation. (English) Zbl 1464.68128 SIAM J. Comput. 50, No. 3, STOC16-255-STOC16-340 (2021). MSC: 68Q25 68Q10 68Q17 PDFBibTeX XMLCite \textit{O. Reingold} et al., SIAM J. Comput. 50, No. 3, STOC16--255-STOC16--340 (2021; Zbl 1464.68128) Full Text: DOI
Gur, Tom; Ramnarayan, Govind; Rothblum, Ron Relaxed locally correctable codes. (English) Zbl 1477.68110 Theory Comput. 16, Paper No. 18, 68 p. (2020). MSC: 68Q10 68P30 PDFBibTeX XMLCite \textit{T. Gur} et al., Theory Comput. 16, Paper No. 18, 68 p. (2020; Zbl 1477.68110) Full Text: DOI
Couvreur, Alain; Panaccione, Isabella Power error locating pairs. (English) Zbl 1443.14027 Des. Codes Cryptography 88, No. 8, 1561-1593 (2020). Reviewer: Felipe Zaldívar (Ciudad de México) MSC: 14G50 94B35 94B27 11T71 PDFBibTeX XMLCite \textit{A. Couvreur} and \textit{I. Panaccione}, Des. Codes Cryptography 88, No. 8, 1561--1593 (2020; Zbl 1443.14027) Full Text: DOI arXiv
Hulett, Reyna Single-elimination brackets fail to approximate copeland winner. (English) Zbl 07650080 Achlioptas, Dimitris (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques, 22nd international conference, APPROX 2019, and 23rd international conference, RANDOM 2019, Massachusetts Institute of Technology, Cambridge, MA, USA, September 20–22, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 145, Article 13, 20 p. (2019). MSC: 68W20 68W25 90C27 PDFBibTeX XMLCite \textit{R. Hulett}, LIPIcs -- Leibniz Int. Proc. Inform. 145, Article 13, 20 p. (2019; Zbl 07650080) Full Text: DOI
Raskhodnikova, Sofya; Ron-Zewi, Noga; Varma, Nithin Erasures vs. errors in local decoding and property testing. (English) Zbl 1502.68365 Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 63, 21 p. (2019). MSC: 68W20 68P30 94B35 PDFBibTeX XMLCite \textit{S. Raskhodnikova} et al., LIPIcs -- Leibniz Int. Proc. Inform. 124, Article 63, 21 p. (2019; Zbl 1502.68365) Full Text: DOI
Lopes, Miles E.; Wang, Shusen; Mahoney, Michael W. A bootstrap method for error estimation in randomized matrix multiplication. (English) Zbl 1484.62037 J. Mach. Learn. Res. 20, Paper No. 39, 40 p. (2019). MSC: 62F99 15B52 62G09 PDFBibTeX XMLCite \textit{M. E. Lopes} et al., J. Mach. Learn. Res. 20, Paper No. 39, 40 p. (2019; Zbl 1484.62037) Full Text: arXiv Link
Acharya, Jayadev; Falahatgar, Moein; Jafarpour, Ashkan; Orlitsky, Alon; Suresh, Ananda Theertha Maximum selection and sorting with adversarial comparators. (English) Zbl 1407.68118 J. Mach. Learn. Res. 19, Paper No. 59, 31 p. (2018). MSC: 68P10 62G07 68Q25 PDFBibTeX XMLCite \textit{J. Acharya} et al., J. Mach. Learn. Res. 19, Paper No. 59, 31 p. (2018; Zbl 1407.68118) Full Text: Link
Augot, Daniel; Loidreau, Pierre; Robert, Gwezheneg Generalized Gabidulin codes over fields of any characteristic. (English) Zbl 1402.94122 Des. Codes Cryptography 86, No. 8, 1807-1848 (2018). MSC: 94B60 PDFBibTeX XMLCite \textit{D. Augot} et al., Des. Codes Cryptography 86, No. 8, 1807--1848 (2018; Zbl 1402.94122) Full Text: DOI arXiv
Gur, Tom; Rothblum, Ron D. Non-interactive proofs of proximity. (English) Zbl 1391.68098 Comput. Complexity 27, No. 1, 99-207 (2018). MSC: 68T15 03F20 68Q25 PDFBibTeX XMLCite \textit{T. Gur} and \textit{R. D. Rothblum}, Comput. Complexity 27, No. 1, 99--207 (2018; Zbl 1391.68098) Full Text: DOI Link
Gur, Tom; Rothblum, Ron D. A hierarchy theorem for interactive proofs of proximity. (English) Zbl 1402.68096 Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 39, 43 p. (2017). MSC: 68Q25 68Q05 68Q10 68W20 PDFBibTeX XMLCite \textit{T. Gur} and \textit{R. D. Rothblum}, LIPIcs -- Leibniz Int. Proc. Inform. 67, Article 39, 43 p. (2017; Zbl 1402.68096) Full Text: DOI
Baron, Joshua; Defrawy, Karim El; Lampkins, Joshua; Ostrovsky, Rafail Communication-optimal proactive secret sharing for dynamic groups. (English) Zbl 1459.94157 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 23-41 (2015). MSC: 94A62 68Q10 PDFBibTeX XMLCite \textit{J. Baron} et al., Lect. Notes Comput. Sci. 9092, 23--41 (2015; Zbl 1459.94157) Full Text: DOI
Brauchle, Joschi On the error-correcting radius of folded Reed-Solomon code designs. (English) Zbl 1360.94434 Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international Castle Meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 77-86 (2015). MSC: 94B35 PDFBibTeX XMLCite \textit{J. Brauchle}, CIM Ser. Math. Sci 3, 77--86 (2015; Zbl 1360.94434) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail; Wootters, Mary Local correctability of expander codes. (English) Zbl 1329.94090 Inf. Comput. 243, 178-190 (2015). MSC: 94B05 94B35 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Inf. Comput. 243, 178--190 (2015; Zbl 1329.94090) Full Text: DOI
Özbudak, Ferruh; Yayla, Oğuz Improved probabilistic decoding of interleaved Reed-Solomon codes and folded Hermitian codes. (English) Zbl 1350.94068 Theor. Comput. Sci. 520, 111-123 (2014). MSC: 94B27 PDFBibTeX XMLCite \textit{F. Özbudak} and \textit{O. Yayla}, Theor. Comput. Sci. 520, 111--123 (2014; Zbl 1350.94068) Full Text: DOI
Yue, Yisong; Broder, Josef; Kleinberg, Robert; Joachims, Thorsten The \(K\)-armed dueling bandits problem. (English) Zbl 1283.68181 J. Comput. Syst. Sci. 78, No. 5, 1538-1556 (2012). MSC: 68Q32 68T05 68W27 91A60 PDFBibTeX XMLCite \textit{Y. Yue} et al., J. Comput. Syst. Sci. 78, No. 5, 1538--1556 (2012; Zbl 1283.68181) Full Text: DOI
Guruswami, Venkatesan; Wang, Carol Optimal rate list decoding via derivative codes. (English) Zbl 1343.94101 Goldberg, Leslie Ann (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 14th international workshop, APPROX 2011, and 15th international workshop, RANDOM 2011, Princeton, NJ, USA, August 17–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22934-3/pbk). Lecture Notes in Computer Science 6845, 593-604 (2011). MSC: 94B35 94B15 PDFBibTeX XMLCite \textit{V. Guruswami} and \textit{C. Wang}, Lect. Notes Comput. Sci. 6845, 593--604 (2011; Zbl 1343.94101) Full Text: DOI arXiv
Goodrich, Michael T.; Tamassia, Roberto; Triandopoulos, Nikos Efficient authenticated data structures for graph connectivity and geometric search problems. (English) Zbl 1218.68081 Algorithmica 60, No. 3, 505-552 (2011). MSC: 68P30 68P05 05C40 94A60 PDFBibTeX XMLCite \textit{M. T. Goodrich} et al., Algorithmica 60, No. 3, 505--552 (2011; Zbl 1218.68081) Full Text: DOI arXiv
Wu, Tsu-Yang; Tseng, Yuh-Min A pairing-based publicly verifiable secret sharing scheme. (English) Zbl 1217.94111 J. Syst. Sci. Complex. 24, No. 1, 186-194 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T.-Y. Wu} and \textit{Y.-M. Tseng}, J. Syst. Sci. Complex. 24, No. 1, 186--194 (2011; Zbl 1217.94111) Full Text: DOI
Guo, Hua; Li, Zhoujun; Mu, Yi; Zhang, Xiyong Provably secure identity-based authenticated key agreement protocols with malicious private key generators. (English) Zbl 1204.94087 Inf. Sci. 181, No. 3, 628-647 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{H. Guo} et al., Inf. Sci. 181, No. 3, 628--647 (2011; Zbl 1204.94087) Full Text: DOI
Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei Efficient certificateless threshold signatures without random oracles. (English) Zbl 1217.94130 J. Syst. Sci. Complex. 23, No. 6, 1167-1182 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{P. Yang} et al., J. Syst. Sci. Complex. 23, No. 6, 1167--1182 (2010; Zbl 1217.94130) Full Text: DOI
Skinner, G. K.; Freeman, G. H. Soccer matches as experiments: how often does the ‘best’ team win? (English) Zbl 1511.62493 J. Appl. Stat. 36, No. 10, 1087-1095 (2009). MSC: 62P99 PDFBibTeX XMLCite \textit{G. K. Skinner} and \textit{G. H. Freeman}, J. Appl. Stat. 36, No. 10, 1087--1095 (2009; Zbl 1511.62493) Full Text: DOI arXiv
Beygelzimer, Alina; Langford, John; Ravikumar, Pradeep Error-correcting tournaments. (English) Zbl 1262.68148 Gavaldà, Ricard (ed.) et al., Algorithmic learning theory. 20th international conference, ALT 2009, Porto, Portugal, October 3–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04413-7/pbk). Lecture Notes in Computer Science 5809. Lecture Notes in Artificial Intelligence, 247-262 (2009). MSC: 68T05 62H30 PDFBibTeX XMLCite \textit{A. Beygelzimer} et al., Lect. Notes Comput. Sci. 5809, 247--262 (2009; Zbl 1262.68148) Full Text: DOI
Johnston, Anna M. Trace formulae for irreducible polynomials over \(\mathbb F_P\) with minimal order roots in \(\mathbb F_{P^q}\). (English) Zbl 1178.11074 Finite Fields Appl. 14, No. 4, 1002-1009 (2008). Reviewer: Wilfried Meidl (Istanbul) MSC: 11T06 PDFBibTeX XMLCite \textit{A. M. Johnston}, Finite Fields Appl. 14, No. 4, 1002--1009 (2008; Zbl 1178.11074) Full Text: DOI
Woolfe, Franco; Liberty, Edo; Rokhlin, Vladimir; Tygert, Mark A fast randomized algorithm for the approximation of matrices. (English) Zbl 1155.65035 Appl. Comput. Harmon. Anal. 25, No. 3, 335-366 (2008). Reviewer: Răzvan Răducanu (Iaşi) MSC: 65F30 15B52 PDFBibTeX XMLCite \textit{F. Woolfe} et al., Appl. Comput. Harmon. Anal. 25, No. 3, 335--366 (2008; Zbl 1155.65035) Full Text: DOI
Patra, Arpita; Choudhary, Ashish; Vaidyanathan, Madhu; Rangan, C. Pandu Efficient perfectly reliable and secure message transmission tolerating mobile adversary. (English) Zbl 1279.94111 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 170-186 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Patra} et al., Lect. Notes Comput. Sci. 5107, 170--186 (2008; Zbl 1279.94111) Full Text: DOI
Pavan, A.; Vinodchandran, N. V. Relations between average-case and worst-case complexity. (English) Zbl 1140.68023 Theory Comput. Syst. 42, No. 4, 596-607 (2008). MSC: 68Q15 PDFBibTeX XMLCite \textit{A. Pavan} and \textit{N. V. Vinodchandran}, Theory Comput. Syst. 42, No. 4, 596--607 (2008; Zbl 1140.68023) Full Text: DOI
Goodrich, Michael T.; Tamassia, Roberto; Triandopoulos, Nikos Super-efficient verification of dynamic outsourced databases. (English) Zbl 1153.68368 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 407-424 (2008). MSC: 68P15 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. T. Goodrich} et al., Lect. Notes Comput. Sci. 4964, 407--424 (2008; Zbl 1153.68368) Full Text: DOI
Gennaro, Rosario; Halevi, Shai; Krawczyk, Hugo; Rabin, Tal Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 4965, 88--107 (2008; Zbl 1149.94316) Full Text: DOI
De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara An attack on a payment scheme. (English) Zbl 1132.68374 Inf. Sci. 178, No. 5, 1418-1421 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{A. De Santis} et al., Inf. Sci. 178, No. 5, 1418--1421 (2008; Zbl 1132.68374) Full Text: DOI
Di Pietro, Roberto; Mancini, Luigi Vincenzo; Zanin, Giorgio Efficient and adaptive threshold signatures for ad hoc networks. (English) Zbl 1277.68036 Di Crescenzo, Giovanni (ed.) et al., Proceedings of the second workshop on cryptography for ad-hoc networks (WCAN 2006), Venice, Italy, July 16, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 171, No. 1, 93-105 (2007). MSC: 68M12 94A62 68M14 PDFBibTeX XMLCite \textit{R. Di Pietro} et al., Electron. Notes Theor. Comput. Sci. 171, No. 1, 93--105 (2007; Zbl 1277.68036) Full Text: DOI
Alon, Noga; Kaplan, Haim; Krivelevich, Michael; Malkhi, Dahlia; Stern, Julien Addendum to “Scalable secure storage when half the system is faulty” [inform. comput. 174 (2)(2002) 203-213]. (English) Zbl 1185.68304 Inf. Comput. 205, No. 7, 1114-1116 (2007). MSC: 68P20 68P30 68R10 PDFBibTeX XMLCite \textit{N. Alon} et al., Inf. Comput. 205, No. 7, 1114--1116 (2007; Zbl 1185.68304) Full Text: DOI
Chu, Cheng-Kang; Tzeng, Wen-Guey Optimal resilient threshold GQ signatures. (English) Zbl 1110.94027 Inf. Sci. 177, No. 8, 1834-1851 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{C.-K. Chu} and \textit{W.-G. Tzeng}, Inf. Sci. 177, No. 8, 1834--1851 (2007; Zbl 1110.94027) Full Text: DOI
Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus Simplified threshold RSA with adaptive and proactive security. (English) Zbl 1140.94319 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 593-611 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. F. Almansa} et al., Lect. Notes Comput. Sci. 4004, 593--611 (2006; Zbl 1140.94319) Full Text: DOI
Qiu, Weidong Converting normal DLP-based signatures into blind. (English) Zbl 1076.94036 Appl. Math. Comput. 170, No. 1, 657-665 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{W. Qiu}, Appl. Math. Comput. 170, No. 1, 657--665 (2005; Zbl 1076.94036) Full Text: DOI
Ku, Cheng-Yuan; Tsao, Chang-Jinn; Lin, Yi-Hsien; Chen, Chien-Yuan An escrow electronic cash system with limited traceability. (English) Zbl 1078.68632 Inf. Sci. 164, No. 1-4, 17-30 (2004). MSC: 68P25 PDFBibTeX XMLCite \textit{C.-Y. Ku} et al., Inf. Sci. 164, No. 1--4, 17--30 (2004; Zbl 1078.68632) Full Text: DOI
Kerenidis, Iordanis; de Wolf, Ronald Exponential lower bound for 2-query locally decodable codes via a quantum argument. (English) Zbl 1084.68044 J. Comput. Syst. Sci. 69, No. 3, 395-420 (2004). MSC: 68P20 68P30 81P68 PDFBibTeX XMLCite \textit{I. Kerenidis} and \textit{R. de Wolf}, J. Comput. Syst. Sci. 69, No. 3, 395--420 (2004; Zbl 1084.68044) Full Text: DOI
Köbler, Johannes; Schuler, Rainer Average-case intractability vs. worst-case intractability. (English) Zbl 1085.68057 Inf. Comput. 190, No. 1, 1-17 (2004). MSC: 68Q15 PDFBibTeX XMLCite \textit{J. Köbler} and \textit{R. Schuler}, Inf. Comput. 190, No. 1, 1--17 (2004; Zbl 1085.68057) Full Text: DOI Link
Kiwi, Marcos; Magniez, Frédéric; Santha, Miklos Approximate testing with error relative to input size. (English) Zbl 1053.68061 J. Comput. Syst. Sci. 66, No. 2, 371-392 (2003). MSC: 68Q60 PDFBibTeX XMLCite \textit{M. Kiwi} et al., J. Comput. Syst. Sci. 66, No. 2, 371--392 (2003; Zbl 1053.68061) Full Text: DOI
Frankel, Yair; MacKenzie, Philip; Yung, Moti Adaptively secure distributed public-key systems. (English) Zbl 1061.94047 Theor. Comput. Sci. 287, No. 2, 535-561 (2002). MSC: 94A60 68M14 PDFBibTeX XMLCite \textit{Y. Frankel} et al., Theor. Comput. Sci. 287, No. 2, 535--561 (2002; Zbl 1061.94047) Full Text: DOI
Alon, Noga; Kaplan, Haim; Krivelevich, Michael; Malkhi, Dahlia; Stern, Julien Scalable secure storage when half the system is faulty. (English) Zbl 1009.68039 Inf. Comput. 174, No. 2, 203-213 (2002). MSC: 68P20 68P30 68R10 PDFBibTeX XMLCite \textit{N. Alon} et al., Inf. Comput. 174, No. 2, 203--213 (2002; Zbl 1009.68039) Full Text: DOI Link
Pelc, Andrzej Searching games with errors – fifty years of coping with liars. (English) Zbl 0984.68041 Theor. Comput. Sci. 270, No. 1-2, 71-109 (2002). MSC: 68P10 PDFBibTeX XMLCite \textit{A. Pelc}, Theor. Comput. Sci. 270, No. 1--2, 71--109 (2002; Zbl 0984.68041) Full Text: DOI
Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal Robust threshold DSS signatures. (English) Zbl 1021.94527 Inf. Comput. 164, No. 1, 54-84 (2001). MSC: 94A62 68P25 91A12 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Inf. Comput. 164, No. 1, 54--84 (2001; Zbl 1021.94527) Full Text: DOI
Wen, Wu; Mizoguchi, Fumio Web security: Authentication protocols and their analysis. (English) Zbl 0980.68045 New Generation Comput. 19, No. 3, 283-299 (2001). MSC: 68P25 PDFBibTeX XMLCite \textit{W. Wen} and \textit{F. Mizoguchi}, New Generation Comput. 19, No. 3, 283--299 (2001; Zbl 0980.68045) Full Text: DOI
Sudan, Madhu; Trevisan, Luca; Vadhan, Salil Pseudorandom generators without the XOR lemma. (English) Zbl 1005.65006 J. Comput. Syst. Sci. 62, No. 2, 236-266 (2001). Reviewer: Jaroslav Král’ (Praha) MSC: 65C10 11K45 65Y20 68Q25 PDFBibTeX XMLCite \textit{M. Sudan} et al., J. Comput. Syst. Sci. 62, No. 2, 236--266 (2001; Zbl 1005.65006) Full Text: DOI Link
Catalano, Dario; Gennaro, Rosario New efficient and secure protocols for verifiable signature sharing and other applications. (English) Zbl 0961.68014 J. Comput. Syst. Sci. 61, No. 1, 51-80 (2000). MSC: 68M12 68P25 PDFBibTeX XMLCite \textit{D. Catalano} and \textit{R. Gennaro}, J. Comput. Syst. Sci. 61, No. 1, 51--80 (2000; Zbl 0961.68014) Full Text: DOI
Kumar, S. Ravi; Rubinfeld, Ronitt; Viswanathan, Mahesh Spot-checkers. (English) Zbl 0961.68036 J. Comput. Syst. Sci. 60, No. 3, 717-751 (2000). MSC: 68N99 PDFBibTeX XMLCite \textit{S. R. Kumar} et al., J. Comput. Syst. Sci. 60, No. 3, 717--751 (2000; Zbl 0961.68036) Full Text: DOI
Garay, J. A.; Gennaro, R.; Jutla, C.; Rabin, T. Secure distributed storage and retrieval. (English) Zbl 0944.68055 Theor. Comput. Sci. 243, No. 1-2, 363-389 (2000). MSC: 68P20 PDFBibTeX XMLCite \textit{J. A. Garay} et al., Theor. Comput. Sci. 243, No. 1--2, 363--389 (2000; Zbl 0944.68055) Full Text: DOI
Ar, Sigal; Lipton, Richard J.; Rubinfeld, Ronitt; Sudan, Madhu Reconstructing algebraic functions from mixed data. (English) Zbl 0915.68088 SIAM J. Comput. 28, No. 2, 487-510 (1998). MSC: 68Q25 68Q60 68W30 PDFBibTeX XMLCite \textit{S. Ar} et al., SIAM J. Comput. 28, No. 2, 487--510 (1998; Zbl 0915.68088) Full Text: DOI
Codenotti, Bruno; Ergün, Funda; Gemmell, Peter; Kumar, S. Ravi Checking properties of polynomials. (English) Zbl 1401.68191 Degano, Pierpaolo (ed.) et al., Automata, languages and programming. 24th international colloquium, ICALP ’97, Bologna, Italy, July 7–11, 1997. Proceedings. Berlin: Springer-Verlag (ISBN 978-3-540-63165-1/pbk; 978-3-540-69194-5/ebook). Lecture Notes in Computer Science 1256, 203-213 (1997). MSC: 68Q60 68Q25 68W30 PDFBibTeX XMLCite \textit{B. Codenotti} et al., Lect. Notes Comput. Sci. 1256, 203--213 (1997; Zbl 1401.68191) Full Text: DOI
Sudan, Madhu Decoding of Reed Solomon codes beyond the error-correction bound. (English) Zbl 0872.68026 J. Complexity 13, No. 1, 180-193 (1997). MSC: 94B35 68W20 94B15 68Q15 PDFBibTeX XMLCite \textit{M. Sudan}, J. Complexity 13, No. 1, 180--193 (1997; Zbl 0872.68026) Full Text: DOI Link
Feige, Uriel; Lund, Carsten On the hardness of computing the permanent of random matrices. (English) Zbl 0956.65037 Comput. Complexity 6(1996-97), No. 2, 101-132 (1997). MSC: 65F40 68Q15 68Q25 15A15 15B52 65Y20 PDFBibTeX XMLCite \textit{U. Feige} and \textit{C. Lund}, Comput. Complexity 6, No. 2, 101--132 (1997; Zbl 0956.65037) Full Text: DOI
Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal Robust and efficient sharing of RSA functions. (English) Zbl 1329.94060 Koblitz, Neal (ed.), Advances in cryptology – CRYPTO 1996. 16th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 1996. Proceedings. Berlin: Springer (ISBN 3-540-61512-1/pbk). Lect. Notes Comput. Sci. 1109, 157-172 (1996). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 1109, 157--172 (1996; Zbl 1329.94060) Full Text: DOI
Brands, Stefan Off-line electronic cash based on secret-key certificates. (English) Zbl 1495.94046 Baeza-Yates, Ricardo (ed.) et al., LATIN ’95: Theoretical informatics. 2nd Latin American symposium, Valparaíso, Chile, April 3–7, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 911, 131-166 (1995). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Brands}, Lect. Notes Comput. Sci. 911, 131--166 (1995; Zbl 1495.94046) Full Text: DOI Link
Frieze, Alan; Jerrum, Mark An analysis of Monte Carlo algorithm for estimating the permanent. (English) Zbl 0817.68087 Combinatorica 15, No. 1, 67-83 (1995). MSC: 68Q25 PDFBibTeX XMLCite \textit{A. Frieze} and \textit{M. Jerrum}, Combinatorica 15, No. 1, 67--83 (1995; Zbl 0817.68087) Full Text: DOI
Blum, Manuel; Codenotti, Bruno; Gemmell, Peter; Shahoumian, Troy Self-correcting for function fields of finite transcendental degree. (English) Zbl 1412.68303 Fülöp, Zoltán (ed.) et al., Automata, languages and programming. 22nd international colloquium, ICALP ’95, Szeged, Hungary, July 10–14, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 944, 547-557 (1995). MSC: 68W30 12F05 12H20 68N30 PDFBibTeX XMLCite \textit{M. Blum} et al., Lect. Notes Comput. Sci. 944, 547--557 (1995; Zbl 1412.68303) Full Text: DOI
Blum, Manuel Program result checking: a new approach to making programs more reliable. (English) Zbl 1418.68089 Lingas, Andrzej (ed.) et al., Automata, languages and programming. 20th international colloquium, ICALP 93, Lund, Sweden, July 5–9, 1993. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 700, 1-14 (1993). MSC: 68Q05 05C60 11Y16 68N30 68Q25 PDFBibTeX XMLCite \textit{M. Blum}, Lect. Notes Comput. Sci. 700, 1--14 (1993; Zbl 1418.68089) Full Text: DOI