Author of the publication

On Testing Expansion in Bounded-Degree Graphs.

, and . Studies in Complexity and Cryptography, volume 6650 of Lecture Notes in Computer Science, Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On our duties as scientists.. SIGACT News, 40 (3): 53-59 (2009)A taxonomy of proof systems (part 2).. SIGACT News, 25 (1): 22-30 (1994)Towards a Theory of Software Protection and Simulation by Oblivious RAMs. STOC, page 182-194. ACM, (1987)Adaptively Secure Multi-Party Computation., , , and . STOC, page 639-648. ACM, (1996)On the Limits of Non-Approximability of Lattice Problems., and . STOC, page 1-9. ACM, (1998)Property Testing in Bounded Degree Graphs., and . STOC, page 406-415. ACM, (1997)On derandomizing algorithms that err extremely rarely., and . STOC, page 109-118. ACM, (2014)Pseudorandomness.. ICALP, volume 1853 of Lecture Notes in Computer Science, page 687-704. Springer, (2000)On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.. TCC, volume 4392 of Lecture Notes in Computer Science, page 174-193. Springer, (2007)Improved Derandomization of BPP Using a Hitting Set Generator., and . RANDOM-APPROX, volume 1671 of Lecture Notes in Computer Science, page 131-137. Springer, (1999)