- Bazzi, L.M.J. Polylogarithmic independence can fool dnf formulas. SIAM J. Comput. 38, 6 (2009), 2220--2272. Google ScholarDigital Library
- Blum, M. and Micali, S. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. on Computing 13, 4 (Nov. 1984), 850--864. Google ScholarDigital Library
- Linial, N. and Nisan, N. Approximate inclusion-exclusion. Combinatorica 10, 4 (1990), 349--365.Google ScholarCross Ref
- Nisan, N. Pseudorandom generators for space-bounded computation. Combinatorica 12, 4 (1992), 449--461.Google ScholarCross Ref
- Yao, A.C-C. Theory and applications of trapdoor functions (extended abstract). In Proceedings of FOCS (1982). IEEE, 80--91. Google ScholarCross Ref
Index Terms
- Patterns hidden from simple algorithms: technical perspective
Recommendations
Hidden digital watermarks in images
An image authentication technique by embedding digital “watermarks” into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a ...
Comments