2008 |
107 | EE | Jakob Nordström,
Johan Håstad:
Towards an optimal separation of space and length in resolution.
STOC 2008: 701-710 |
106 | EE | Jakob Nordström,
Johan Håstad:
Towards an Optimal Separation of Space and Length in Resolution
CoRR abs/0803.0661: (2008) |
105 | EE | Jakob Nordström,
Johan Håstad:
Towards an Optimal Separation of Space and Length in Resolution.
Electronic Colloquium on Computational Complexity (ECCC) 15(026): (2008) |
104 | EE | Johan Håstad,
Mats Näslund:
Practical Construction and Analysis of Pseudo-Randomness Primitives.
J. Cryptology 21(1): 1-26 (2008) |
2007 |
103 | EE | Johan Håstad:
On the Approximation Resistance of a Random Predicate.
APPROX-RANDOM 2007: 149-163 |
102 | EE | Johan Håstad,
Svante Linusson,
Johan Wästlund:
A Smaller Sleeping Bag for a Baby Snake.
Discrete & Computational Geometry 38(1): 171 (2007) |
101 | EE | Johan Håstad:
The Security of the IAPM and IACBC Modes.
J. Cryptology 20(2): 153-163 (2007) |
100 | EE | Johan Håstad,
Avi Wigderson:
The Randomized Communication Complexity of Set Disjointness.
Theory of Computing 3(1): 211-219 (2007) |
2006 |
99 | EE | Johan Håstad:
On Nontrivial Approximation of CSPs.
APPROX-RANDOM 2006: 1 |
98 | EE | Johan Håstad:
The square lattice shuffle.
Random Struct. Algorithms 29(4): 466-474 (2006) |
2005 |
97 | EE | Johan Håstad:
Every 2-CSP allows nontrivial approximation.
STOC 2005: 740-746 |
96 | EE | Johan Håstad,
Subhash Khot:
Query Efficient PCPs with Perfect Completeness.
Theory of Computing 1(1): 119-148 (2005) |
2004 |
95 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
94 | EE | Johan Håstad,
Mats Näslund:
The security of all RSA and discrete log bits.
J. ACM 51(2): 187-230 (2004) |
93 | EE | Johan Håstad,
Srinivasan Venkatesh:
On the advantage over a random assignment.
Random Struct. Algorithms 25(2): 117-149 (2004) |
2003 |
92 | EE | Johan Håstad:
Inapproximability Some history and some open problems.
IEEE Conference on Computational Complexity 2003: 265- |
91 | EE | Johan Håstad,
Lars Ivansson,
Jens Lagergren:
Fitting points on the real line and its application to RH mapping.
J. Algorithms 49(1): 42-62 (2003) |
90 | EE | Johan Håstad,
Avi Wigderson:
Simple analysis of graph tests for linearity and PCP.
Random Struct. Algorithms 22(2): 139-160 (2003) |
2002 |
89 | EE | Johan Håstad,
Srinivasan Venkatesh:
On the advantage over a random assignment.
STOC 2002: 43-52 |
88 | | Venkatesan Guruswami,
Johan Håstad,
Madhu Sudan,
David Zuckerman:
Combinatorial bounds for list decoding.
IEEE Transactions on Information Theory 48(5): 1021-1034 (2002) |
87 | EE | Venkatesan Guruswami,
Johan Håstad,
Madhu Sudan:
Hardness of Approximate Hypergraph Coloring.
SIAM J. Comput. 31(6): 1663-1686 (2002) |
2001 |
86 | EE | Johan Håstad,
Mats Näslund:
Practical Construction and Analysis of Pseudo-Randomness Primitives.
ASIACRYPT 2001: 442-459 |
85 | | Johan Håstad,
Subhash Khot:
Query Efficient PCPs with Perfect Completeness.
FOCS 2001: 610-619 |
84 | EE | Johan Håstad,
Avi Wigderson:
Simple Analysis of Graph Tests for Linearity and PCP.
IEEE Conference on Computational Complexity 2001: 244-254 |
83 | EE | Johan Håstad,
Svante Linusson,
Johan Wästlund:
A Smaller Sleeping Bag for a Baby Snake.
Discrete & Computational Geometry 26(1): 173-181 (2001) |
82 | EE | Johan Håstad:
Some optimal inapproximability results.
J. ACM 48(4): 798-859 (2001) |
81 | | Gunnar Andersson,
Lars Engebretsen,
Johan Håstad:
A New Way of Using Semidefinite Programming with Applications to Linear Equations mod p.
J. Algorithms 39(2): 162-204 (2001) |
80 | | Yonatan Aumann,
Johan Håstad,
Michael O. Rabin,
Madhu Sudan:
Linear-Consistency Testing.
J. Comput. Syst. Sci. 62(4): 589-607 (2001) |
79 | EE | Johan Håstad:
A Slight Sharpening of LMN.
J. Comput. Syst. Sci. 63(3): 498-508 (2001) |
78 | EE | Dorit Dor,
Johan Håstad,
Staffan Ulfberg,
Uri Zwick:
On Lower Bounds for Selecting the Median.
SIAM J. Discrete Math. 14(3): 299-311 (2001) |
2000 |
77 | EE | Johan Håstad,
Jakob Jonsson,
Ari Juels,
Moti Yung:
Funkspiel schemes: an alternative to conventional tamper resistance.
ACM Conference on Computer and Communications Security 2000: 125-133 |
76 | | Venkatesan Guruswami,
Johan Håstad,
Madhu Sudan:
Hardness of Approximate Hypergraph Coloring.
FOCS 2000: 149-158 |
75 | EE | Johan Håstad:
Which NP-Hard Optimization Problems Admit Non-trivial Efficient Approximation Algorithms?
ICALP 2000: 235 |
74 | EE | Venkatesan Guruswami,
Johan Håstad,
Madhu Sudan:
Hardness of approximate hypergraph coloring
Electronic Colloquium on Computational Complexity (ECCC) 7(62): (2000) |
73 | EE | Johan Håstad:
On bounded occurrence constraint satisfaction.
Inf. Process. Lett. 74(1-2): 1-6 (2000) |
72 | EE | Arne Andersson,
Torben Hagerup,
Johan Håstad,
Ola Petersson:
Tight Bounds for Searching a Sorted Array of Strings.
SIAM J. Comput. 30(5): 1552-1578 (2000) |
1999 |
71 | | Yonatan Aumann,
Johan Håstad,
Michael O. Rabin,
Madhu Sudan:
Linear Consistency Testing.
RANDOM-APPROX 1999: 109-120 |
70 | EE | Gunnar Andersson,
Lars Engebretsen,
Johan Håstad:
A New Way to Use Semidefinite Programming with Applications to Linear Equations mod p.
SODA 1999: 41-50 |
69 | EE | Yonatan Aumann,
Johan Håstad,
Michael O. Rabin,
Madhu Sudan:
Linear Consistency Testing
Electronic Colloquium on Computational Complexity (ECCC) 6(25): (1999) |
68 | EE | Johan Håstad,
Mats Näslund:
The Security of all RSA and Discrete Log Bits
Electronic Colloquium on Computational Complexity (ECCC) 6(37): (1999) |
67 | EE | Johan Håstad:
On approximating CSP-B
Electronic Colloquium on Computational Complexity (ECCC) 6(39): (1999) |
66 | | Johan Håstad,
Russell Impagliazzo,
Leonid A. Levin,
Michael Luby:
A Pseudorandom Generator from any One-way Function.
SIAM J. Comput. 28(4): 1364-1396 (1999) |
1998 |
65 | EE | Johan Håstad,
Lars Ivansson,
Jens Lagergren:
Fitting Points on the Real Line and Its Application to RH Mapping.
ESA 1998: 465-476 |
64 | EE | Johan Håstad,
Mats Näslund:
The Security of Individual RSA Bits.
FOCS 1998: 510-521 |
63 | EE | Johan Håstad:
Some Recent Strong Inapproximability Results.
SWAT 1998: 205-209 |
62 | EE | Oded Goldreich,
Johan Håstad:
On the Complexity of Interactive Proofs with Bounded Communication.
Inf. Process. Lett. 67(4): 205-214 (1998) |
61 | | Johan Håstad:
The Shrinkage Exponent of de Morgan Formulas is 2.
SIAM J. Comput. 27(1): 48-64 (1998) |
60 | | Liming Cai,
Jianer Chen,
Johan Håstad:
Circuit Bottom Fan-In and Computational Power.
SIAM J. Comput. 27(2): 341-355 (1998) |
59 | EE | Mikael Goldmann,
Johan Håstad:
Monotone Circuits for Connectivity Have Depth (log n)2-o(1).
SIAM J. Comput. 27(5): 1283-1294 (1998) |
1997 |
58 | EE | Liming Cai,
Jianer Chen,
Johan Håstad:
Circuit Bottom Fan-in and Computational Power.
IEEE Conference on Computational Complexity 1997: 158-164 |
57 | EE | Johan Håstad:
Some Optimal Inapproximability Results.
STOC 1997: 1-10 |
56 | EE | Johan Håstad:
Some optimal inapproximability results
Electronic Colloquium on Computational Complexity (ECCC) 4(37): (1997) |
55 | EE | Johan Håstad:
Clique is hard to approximate within n1-epsilon
Electronic Colloquium on Computational Complexity (ECCC) 4(38): (1997) |
1996 |
54 | | Johan Håstad:
Clique is Hard to Approximate Within n1-epsilon.
FOCS 1996: 627-636 |
53 | EE | Johan Håstad:
Testing of the Long Code and Hardness for Clique.
STOC 1996: 11-19 |
52 | EE | Oded Goldreich,
Johan Håstad:
On the Message Complexity of Interactive Proof Systems
Electronic Colloquium on Computational Complexity (ECCC) 3(18): (1996) |
51 | | Mihir Bellare,
Don Coppersmith,
Johan Håstad,
Marcos A. Kiwi,
Madhu Sudan:
Linearity testing in characteristic two.
IEEE Transactions on Information Theory 42(6): 1781-1795 (1996) |
50 | | Johan Håstad,
Frank Thomson Leighton,
Brian Rogoff:
Analysis of Backoff Protocols for Multiple Access Channels.
SIAM J. Comput. 25(4): 740-774 (1996) |
1995 |
49 | | Mihir Bellare,
Don Coppersmith,
Johan Håstad,
Marcos A. Kiwi,
Madhu Sudan:
Linearity Testing in Characteristic Two.
FOCS 1995: 432-441 |
48 | EE | Arne Andersson,
Johan Håstad,
Ola Petersson:
A tight lower bound for searching a sorted array.
STOC 1995: 417-426 |
47 | EE | Mikael Goldmann,
Johan Håstad:
Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract).
STOC 1995: 569-574 |
46 | | Johan Håstad,
Stasys Jukna,
Pavel Pudlák:
Top-Down Lower Bounds for Depth-Three Circuits.
Computational Complexity 5(2): 99-112 (1995) |
45 | EE | Johan Håstad,
Alexander A. Razborov,
Andrew Chi-Chih Yao:
On the Shrinkage Exponent for Read-Once Formulae.
Theor. Comput. Sci. 141(1&2): 269-282 (1995) |
1994 |
44 | EE | Arne Andersson,
Torben Hagerup,
Johan Håstad,
Ola Petersson:
The complexity of searching a sorted array of strings.
STOC 1994: 317-325 |
43 | | Johan Håstad:
Recent Results in Hardness of Approximation.
SWAT 1994: 231-239 |
42 | | Johan Håstad,
Ingo Wegener,
Norbert Wurm,
Sang-Zin Yi:
Optimal Depth, Very Small Size Circuits for Symmetric Functions in AC0.
Inf. Comput. 108(2): 200-211 (1994) |
41 | | Mikael Goldmann,
Per Grape,
Johan Håstad:
On Average Time Hierarchies.
Inf. Process. Lett. 49(1): 15-20 (1994) |
40 | | Richard Chang,
Benny Chor,
Oded Goldreich,
Juris Hartmanis,
Johan Håstad,
Desh Ranjan,
Pankaj Rohatgi:
The Random Oracle Hypothesis Is False.
J. Comput. Syst. Sci. 49(1): 24-39 (1994) |
39 | EE | Johan Håstad:
On the Size of Weights for Threshold Gates.
SIAM J. Discrete Math. 7(3): 484-492 (1994) |
1993 |
38 | | Johan Håstad:
The shrinkage exponent is 2
FOCS 1993: 114-123 |
37 | | Johan Håstad,
Stasys Jukna,
Pavel Pudlák:
Top-Down Lower Bounds for Depth 3 Circuits
FOCS 1993: 124-129 |
36 | | Johan Håstad,
Steven Phillips,
Shmuel Safra:
A Well-Characterized Approximation Problem.
ISTCS 1993: 261-265 |
35 | | Johan Håstad,
Steven Phillips,
Shmuel Safra:
A Well-Characterized Approximation Problem.
Inf. Process. Lett. 47(6): 301-305 (1993) |
34 | | Johan Håstad,
A. W. Schrift,
Adi Shamir:
The Discrete Logarithm Modulo a Composite Hides O(n) Bits.
J. Comput. Syst. Sci. 47(3): 376-404 (1993) |
33 | | Noga Alon,
Oded Goldreich,
Johan Håstad,
René Peralta:
Addendum to "Simple Construction of Almost k-wise Independent Random Variables".
Random Struct. Algorithms 4(1): 119-120 (1993) |
1992 |
32 | | Mikael Goldmann,
Johan Håstad,
Alexander A. Razborov:
Majority Gates vs. General Weighted Threshold Gates.
Structure in Complexity Theory Conference 1992: 2-13 |
31 | | Mikael Goldmann,
Johan Håstad,
Alexander A. Razborov:
Majority Gates VS. General Weighted Threshold Gates.
Computational Complexity 2: 277-300 (1992) |
30 | | Mikael Goldmann,
Johan Håstad:
A Simple Lower Bound for Monotone Clique Using a Communication Game.
Inf. Process. Lett. 41(4): 221-226 (1992) |
29 | | Noga Alon,
Oded Goldreich,
Johan Håstad,
René Peralta:
Simple Construction of Almost k-wise Independent Random Variables.
Random Struct. Algorithms 3(3): 289-304 (1992) |
1991 |
28 | | Johan Håstad,
Mikael Goldmann:
On the Power of Small-Depth Threshold Circuits.
Computational Complexity 1: 113-129 (1991) |
27 | | William Aiello,
Johan Håstad:
Relativized Perfect Zero Knowledge Is Not BPP
Inf. Comput. 93(2): 223-240 (1991) |
26 | | William Aiello,
Johan Håstad:
Statistical Zero-Knowledge Languages can be Recognized in Two Rounds.
J. Comput. Syst. Sci. 42(3): 327-345 (1991) |
1990 |
25 | | Noga Alon,
Oded Goldreich,
Johan Håstad,
René Peralta:
Simple Constructions of Almost k-Wise Independent Random Variables
FOCS 1990: 544-553 |
24 | | Johan Håstad,
Mikael Goldmann:
On the Power of Small-Depth Threshold Circuits
FOCS 1990: 610-618 |
23 | | Johan Håstad:
Pseudo-Random Generators under Uniform Assumptions
STOC 1990: 395-404 |
22 | | William Aiello,
Shafi Goldwasser,
Johan Håstad:
On the power of interaction.
Combinatorica 10(1): 3-25 (1990) |
21 | | Johan Håstad:
Tensor Rank is NP-Complete.
J. Algorithms 11(4): 644-654 (1990) |
1989 |
20 | | Johan Håstad:
Tensor Rank is NP-Complete.
ICALP 1989: 451-460 |
19 | | Johan Håstad,
Frank Thomson Leighton,
Mark Newman:
Fast Computation Using Faulty Hypercubes (Extended Abstract)
STOC 1989: 251-263 |
18 | EE | Paul Beame,
Johan Håstad:
Optimal bounds for decision problems on the CRCW PRAM.
J. ACM 36(3): 643-670 (1989) |
17 | | Johan Håstad,
Bettina Just,
J. C. Lagarias,
Claus-Peter Schnorr:
Polynomial Time Algorithms for Finding Integer Relations among Real Numbers.
SIAM J. Comput. 18(5): 859-881 (1989) |
1988 |
16 | EE | Michael Ben-Or,
Oded Goldreich,
Shafi Goldwasser,
Johan Håstad,
Joe Kilian,
Silvio Micali,
Phillip Rogaway:
Everything Provable is Provable in Zero-Knowledge.
CRYPTO 1988: 37-56 |
15 | | Johan Håstad:
Dual vectors and lower bounds for the nearest lattice point problem.
Combinatorica 8(1): 75-81 (1988) |
14 | | Alan M. Frieze,
Johan Håstad,
Ravi Kannan,
J. C. Lagarias,
Adi Shamir:
Reconstructing Truncated Integer Variables Satisfying Linear Congruences.
SIAM J. Comput. 17(2): 262-280 (1988) |
13 | | Johan Håstad:
Solving Simultaneous Modular Equations of Low Degree.
SIAM J. Comput. 17(2): 336-341 (1988) |
1987 |
12 | | William Aiello,
Johan Håstad:
Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds
FOCS 1987: 439-448 |
11 | | Johan Håstad,
Frank Thomson Leighton,
Brian Rogoff:
Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract)
STOC 1987: 241-253 |
10 | | Johan Håstad,
Frank Thomson Leighton,
Mark Newman:
Reconfiguring a Hypercube in the Presence of Faults (Extended Abstract)
STOC 1987: 274-284 |
9 | | Paul Beame,
Johan Håstad:
Optimal Bounds for Decision Problems on the CRCW PRAM
STOC 1987: 83-93 |
8 | | Ravi B. Boppana,
Johan Håstad,
Stathis Zachos:
Does co-NP Have Short Interactive Proofs?
Inf. Process. Lett. 25(2): 127-132 (1987) |
7 | | Johan Håstad:
One-Way Permutations in NC0.
Inf. Process. Lett. 26(3): 153-155 (1987) |
1986 |
6 | | William Aiello,
Shafi Goldwasser,
Johan Håstad:
On the Power of Interaction
FOCS 1986: 368-379 |
5 | | Johan Håstad,
Bettina Helfrich,
J. C. Lagarias,
Claus-Peter Schnorr:
Polynomial Time Algorithms for Finding Integer Relations Among Real Numbers.
STACS 1986: 105-118 |
4 | | Johan Håstad:
Almost Optimal Lower Bounds for Small Depth Circuits
STOC 1986: 6-20 |
1985 |
3 | EE | Johan Håstad:
On Using RSA with Low Exponent in a Public Key Network.
CRYPTO 1985: 403-408 |
2 | | Benny Chor,
Oded Goldreich,
Johan Håstad,
Joel Friedman,
Steven Rudich,
Roman Smolensky:
The Bit Extraction Problem of t-Resilient Functions (Preliminary Version)
FOCS 1985: 396-407 |
1 | | Johan Håstad,
Adi Shamir:
The Cryptographic Security of Truncated Linearly Related Variables
STOC 1985: 356-362 |