We present a simple new construction of a pseudorandom bit generator, based on the constant depth generators of [N]. It stretches a short string of truly random bits into a long string that looks random to any algorithm from a complexity class C (eg P, NC, PSPACE,...) using an arbitrary function that is hard for C. This construction reveals an equivalence between the problem of proving lower bounds and the problem of generating good pseudorandom sequences. Our construction has many consequences. The most direct one is that efficient deterministic simulation of randomized algorithms is possible under much weaker assumptions than previously known. The efficiency of the simulations depends on the strength of the assumptions, and may achieve P ...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
AbstractGiven a function f:{0,1}logn→{0,1} with circuit complexity s, we construct a pseudo-random g...
AbstractGiven a function f:{0,1}logn→{0,1} with circuit complexity s, we construct a pseudo-random g...
Nisan and Wigderson in their seminal work introduced a new (conditional) pseudorandom generator cons...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
We study the complexity of building pseudorandom generators (PRGs) from hard functions. We show that...
A fresh look at the question of randomness was taken in the theory of computing: A distribution is p...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
AbstractGiven a function f:{0,1}logn→{0,1} with circuit complexity s, we construct a pseudo-random g...
AbstractGiven a function f:{0,1}logn→{0,1} with circuit complexity s, we construct a pseudo-random g...
Nisan and Wigderson in their seminal work introduced a new (conditional) pseudorandom generator cons...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
A set F of n-ary Boolean functions is called a pseudorandom function generator (PRFG) if communicati...
We study the complexity of building pseudorandom generators (PRGs) from hard functions. We show that...
A fresh look at the question of randomness was taken in the theory of computing: A distribution is p...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...