2008 | ||
---|---|---|
107 | EE | Jakob Nordström, Johan Håstad: Towards an optimal separation of space and length in resolution. STOC 2008: 701-710 |
106 | EE | Jakob Nordström, Johan Håstad: Towards an Optimal Separation of Space and Length in Resolution CoRR abs/0803.0661: (2008) |
105 | EE | Jakob Nordström, Johan Håstad: Towards an Optimal Separation of Space and Length in Resolution. Electronic Colloquium on Computational Complexity (ECCC) 15(026): (2008) |
104 | EE | Johan Håstad, Mats Näslund: Practical Construction and Analysis of Pseudo-Randomness Primitives. J. Cryptology 21(1): 1-26 (2008) |
2007 | ||
103 | EE | Johan Håstad: On the Approximation Resistance of a Random Predicate. APPROX-RANDOM 2007: 149-163 |
102 | EE | Johan Håstad, Svante Linusson, Johan Wästlund: A Smaller Sleeping Bag for a Baby Snake. Discrete & Computational Geometry 38(1): 171 (2007) |
101 | EE | Johan Håstad: The Security of the IAPM and IACBC Modes. J. Cryptology 20(2): 153-163 (2007) |
100 | EE | Johan Håstad, Avi Wigderson: The Randomized Communication Complexity of Set Disjointness. Theory of Computing 3(1): 211-219 (2007) |
2006 | ||
99 | EE | Johan Håstad: On Nontrivial Approximation of CSPs. APPROX-RANDOM 2006: 1 |
98 | EE | Johan Håstad: The square lattice shuffle. Random Struct. Algorithms 29(4): 466-474 (2006) |
2005 | ||
97 | EE | Johan Håstad: Every 2-CSP allows nontrivial approximation. STOC 2005: 740-746 |
96 | EE | Johan Håstad, Subhash Khot: Query Efficient PCPs with Perfect Completeness. Theory of Computing 1(1): 119-148 (2005) |
2004 | ||
95 | EE | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 |
94 | EE | Johan Håstad, Mats Näslund: The security of all RSA and discrete log bits. J. ACM 51(2): 187-230 (2004) |
93 | EE | Johan Håstad, Srinivasan Venkatesh: On the advantage over a random assignment. Random Struct. Algorithms 25(2): 117-149 (2004) |
2003 | ||
92 | EE | Johan Håstad: Inapproximability Some history and some open problems. IEEE Conference on Computational Complexity 2003: 265- |
91 | EE | Johan Håstad, Lars Ivansson, Jens Lagergren: Fitting points on the real line and its application to RH mapping. J. Algorithms 49(1): 42-62 (2003) |
90 | EE | Johan Håstad, Avi Wigderson: Simple analysis of graph tests for linearity and PCP. Random Struct. Algorithms 22(2): 139-160 (2003) |
2002 | ||
89 | EE | Johan Håstad, Srinivasan Venkatesh: On the advantage over a random assignment. STOC 2002: 43-52 |
88 | Venkatesan Guruswami, Johan Håstad, Madhu Sudan, David Zuckerman: Combinatorial bounds for list decoding. IEEE Transactions on Information Theory 48(5): 1021-1034 (2002) | |
87 | EE | Venkatesan Guruswami, Johan Håstad, Madhu Sudan: Hardness of Approximate Hypergraph Coloring. SIAM J. Comput. 31(6): 1663-1686 (2002) |
2001 | ||
86 | EE | Johan Håstad, Mats Näslund: Practical Construction and Analysis of Pseudo-Randomness Primitives. ASIACRYPT 2001: 442-459 |
85 | Johan Håstad, Subhash Khot: Query Efficient PCPs with Perfect Completeness. FOCS 2001: 610-619 | |
84 | EE | Johan Håstad, Avi Wigderson: Simple Analysis of Graph Tests for Linearity and PCP. IEEE Conference on Computational Complexity 2001: 244-254 |
83 | EE | Johan Håstad, Svante Linusson, Johan Wästlund: A Smaller Sleeping Bag for a Baby Snake. Discrete & Computational Geometry 26(1): 173-181 (2001) |
82 | EE | Johan Håstad: Some optimal inapproximability results. J. ACM 48(4): 798-859 (2001) |
81 | Gunnar Andersson, Lars Engebretsen, Johan Håstad: A New Way of Using Semidefinite Programming with Applications to Linear Equations mod p. J. Algorithms 39(2): 162-204 (2001) | |
80 | Yonatan Aumann, Johan Håstad, Michael O. Rabin, Madhu Sudan: Linear-Consistency Testing. J. Comput. Syst. Sci. 62(4): 589-607 (2001) | |
79 | EE | Johan Håstad: A Slight Sharpening of LMN. J. Comput. Syst. Sci. 63(3): 498-508 (2001) |
78 | EE | Dorit Dor, Johan Håstad, Staffan Ulfberg, Uri Zwick: On Lower Bounds for Selecting the Median. SIAM J. Discrete Math. 14(3): 299-311 (2001) |
2000 | ||
77 | EE | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung: Funkspiel schemes: an alternative to conventional tamper resistance. ACM Conference on Computer and Communications Security 2000: 125-133 |
76 | Venkatesan Guruswami, Johan Håstad, Madhu Sudan: Hardness of Approximate Hypergraph Coloring. FOCS 2000: 149-158 | |
75 | EE | Johan Håstad: Which NP-Hard Optimization Problems Admit Non-trivial Efficient Approximation Algorithms? ICALP 2000: 235 |
74 | EE | Venkatesan Guruswami, Johan Håstad, Madhu Sudan: Hardness of approximate hypergraph coloring Electronic Colloquium on Computational Complexity (ECCC) 7(62): (2000) |
73 | EE | Johan Håstad: On bounded occurrence constraint satisfaction. Inf. Process. Lett. 74(1-2): 1-6 (2000) |
72 | EE | Arne Andersson, Torben Hagerup, Johan Håstad, Ola Petersson: Tight Bounds for Searching a Sorted Array of Strings. SIAM J. Comput. 30(5): 1552-1578 (2000) |
1999 | ||
71 | Yonatan Aumann, Johan Håstad, Michael O. Rabin, Madhu Sudan: Linear Consistency Testing. RANDOM-APPROX 1999: 109-120 | |
70 | EE | Gunnar Andersson, Lars Engebretsen, Johan Håstad: A New Way to Use Semidefinite Programming with Applications to Linear Equations mod p. SODA 1999: 41-50 |
69 | EE | Yonatan Aumann, Johan Håstad, Michael O. Rabin, Madhu Sudan: Linear Consistency Testing Electronic Colloquium on Computational Complexity (ECCC) 6(25): (1999) |
68 | EE | Johan Håstad, Mats Näslund: The Security of all RSA and Discrete Log Bits Electronic Colloquium on Computational Complexity (ECCC) 6(37): (1999) |
67 | EE | Johan Håstad: On approximating CSP-B Electronic Colloquium on Computational Complexity (ECCC) 6(39): (1999) |
66 | Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby: A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 28(4): 1364-1396 (1999) | |
1998 | ||
65 | EE | Johan Håstad, Lars Ivansson, Jens Lagergren: Fitting Points on the Real Line and Its Application to RH Mapping. ESA 1998: 465-476 |
64 | EE | Johan Håstad, Mats Näslund: The Security of Individual RSA Bits. FOCS 1998: 510-521 |
63 | EE | Johan Håstad: Some Recent Strong Inapproximability Results. SWAT 1998: 205-209 |
62 | EE | Oded Goldreich, Johan Håstad: On the Complexity of Interactive Proofs with Bounded Communication. Inf. Process. Lett. 67(4): 205-214 (1998) |
61 | Johan Håstad: The Shrinkage Exponent of de Morgan Formulas is 2. SIAM J. Comput. 27(1): 48-64 (1998) | |
60 | Liming Cai, Jianer Chen, Johan Håstad: Circuit Bottom Fan-In and Computational Power. SIAM J. Comput. 27(2): 341-355 (1998) | |
59 | EE | Mikael Goldmann, Johan Håstad: Monotone Circuits for Connectivity Have Depth (log n)2-o(1). SIAM J. Comput. 27(5): 1283-1294 (1998) |
1997 | ||
58 | EE | Liming Cai, Jianer Chen, Johan Håstad: Circuit Bottom Fan-in and Computational Power. IEEE Conference on Computational Complexity 1997: 158-164 |
57 | EE | Johan Håstad: Some Optimal Inapproximability Results. STOC 1997: 1-10 |
56 | EE | Johan Håstad: Some optimal inapproximability results Electronic Colloquium on Computational Complexity (ECCC) 4(37): (1997) |
55 | EE | Johan Håstad: Clique is hard to approximate within n1-epsilon Electronic Colloquium on Computational Complexity (ECCC) 4(38): (1997) |
1996 | ||
54 | Johan Håstad: Clique is Hard to Approximate Within n1-epsilon. FOCS 1996: 627-636 | |
53 | EE | Johan Håstad: Testing of the Long Code and Hardness for Clique. STOC 1996: 11-19 |
52 | EE | Oded Goldreich, Johan Håstad: On the Message Complexity of Interactive Proof Systems Electronic Colloquium on Computational Complexity (ECCC) 3(18): (1996) |
51 | Mihir Bellare, Don Coppersmith, Johan Håstad, Marcos A. Kiwi, Madhu Sudan: Linearity testing in characteristic two. IEEE Transactions on Information Theory 42(6): 1781-1795 (1996) | |
50 | Johan Håstad, Frank Thomson Leighton, Brian Rogoff: Analysis of Backoff Protocols for Multiple Access Channels. SIAM J. Comput. 25(4): 740-774 (1996) | |
1995 | ||
49 | Mihir Bellare, Don Coppersmith, Johan Håstad, Marcos A. Kiwi, Madhu Sudan: Linearity Testing in Characteristic Two. FOCS 1995: 432-441 | |
48 | EE | Arne Andersson, Johan Håstad, Ola Petersson: A tight lower bound for searching a sorted array. STOC 1995: 417-426 |
47 | EE | Mikael Goldmann, Johan Håstad: Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract). STOC 1995: 569-574 |
46 | Johan Håstad, Stasys Jukna, Pavel Pudlák: Top-Down Lower Bounds for Depth-Three Circuits. Computational Complexity 5(2): 99-112 (1995) | |
45 | EE | Johan Håstad, Alexander A. Razborov, Andrew Chi-Chih Yao: On the Shrinkage Exponent for Read-Once Formulae. Theor. Comput. Sci. 141(1&2): 269-282 (1995) |
1994 | ||
44 | EE | Arne Andersson, Torben Hagerup, Johan Håstad, Ola Petersson: The complexity of searching a sorted array of strings. STOC 1994: 317-325 |
43 | Johan Håstad: Recent Results in Hardness of Approximation. SWAT 1994: 231-239 | |
42 | Johan Håstad, Ingo Wegener, Norbert Wurm, Sang-Zin Yi: Optimal Depth, Very Small Size Circuits for Symmetric Functions in AC0. Inf. Comput. 108(2): 200-211 (1994) | |
41 | Mikael Goldmann, Per Grape, Johan Håstad: On Average Time Hierarchies. Inf. Process. Lett. 49(1): 15-20 (1994) | |
40 | Richard Chang, Benny Chor, Oded Goldreich, Juris Hartmanis, Johan Håstad, Desh Ranjan, Pankaj Rohatgi: The Random Oracle Hypothesis Is False. J. Comput. Syst. Sci. 49(1): 24-39 (1994) | |
39 | EE | Johan Håstad: On the Size of Weights for Threshold Gates. SIAM J. Discrete Math. 7(3): 484-492 (1994) |
1993 | ||
38 | Johan Håstad: The shrinkage exponent is 2 FOCS 1993: 114-123 | |
37 | Johan Håstad, Stasys Jukna, Pavel Pudlák: Top-Down Lower Bounds for Depth 3 Circuits FOCS 1993: 124-129 | |
36 | Johan Håstad, Steven Phillips, Shmuel Safra: A Well-Characterized Approximation Problem. ISTCS 1993: 261-265 | |
35 | Johan Håstad, Steven Phillips, Shmuel Safra: A Well-Characterized Approximation Problem. Inf. Process. Lett. 47(6): 301-305 (1993) | |
34 | Johan Håstad, A. W. Schrift, Adi Shamir: The Discrete Logarithm Modulo a Composite Hides O(n) Bits. J. Comput. Syst. Sci. 47(3): 376-404 (1993) | |
33 | Noga Alon, Oded Goldreich, Johan Håstad, René Peralta: Addendum to "Simple Construction of Almost k-wise Independent Random Variables". Random Struct. Algorithms 4(1): 119-120 (1993) | |
1992 | ||
32 | Mikael Goldmann, Johan Håstad, Alexander A. Razborov: Majority Gates vs. General Weighted Threshold Gates. Structure in Complexity Theory Conference 1992: 2-13 | |
31 | Mikael Goldmann, Johan Håstad, Alexander A. Razborov: Majority Gates VS. General Weighted Threshold Gates. Computational Complexity 2: 277-300 (1992) | |
30 | Mikael Goldmann, Johan Håstad: A Simple Lower Bound for Monotone Clique Using a Communication Game. Inf. Process. Lett. 41(4): 221-226 (1992) | |
29 | Noga Alon, Oded Goldreich, Johan Håstad, René Peralta: Simple Construction of Almost k-wise Independent Random Variables. Random Struct. Algorithms 3(3): 289-304 (1992) | |
1991 | ||
28 | Johan Håstad, Mikael Goldmann: On the Power of Small-Depth Threshold Circuits. Computational Complexity 1: 113-129 (1991) | |
27 | William Aiello, Johan Håstad: Relativized Perfect Zero Knowledge Is Not BPP Inf. Comput. 93(2): 223-240 (1991) | |
26 | William Aiello, Johan Håstad: Statistical Zero-Knowledge Languages can be Recognized in Two Rounds. J. Comput. Syst. Sci. 42(3): 327-345 (1991) | |
1990 | ||
25 | Noga Alon, Oded Goldreich, Johan Håstad, René Peralta: Simple Constructions of Almost k-Wise Independent Random Variables FOCS 1990: 544-553 | |
24 | Johan Håstad, Mikael Goldmann: On the Power of Small-Depth Threshold Circuits FOCS 1990: 610-618 | |
23 | Johan Håstad: Pseudo-Random Generators under Uniform Assumptions STOC 1990: 395-404 | |
22 | William Aiello, Shafi Goldwasser, Johan Håstad: On the power of interaction. Combinatorica 10(1): 3-25 (1990) | |
21 | Johan Håstad: Tensor Rank is NP-Complete. J. Algorithms 11(4): 644-654 (1990) | |
1989 | ||
20 | Johan Håstad: Tensor Rank is NP-Complete. ICALP 1989: 451-460 | |
19 | Johan Håstad, Frank Thomson Leighton, Mark Newman: Fast Computation Using Faulty Hypercubes (Extended Abstract) STOC 1989: 251-263 | |
18 | EE | Paul Beame, Johan Håstad: Optimal bounds for decision problems on the CRCW PRAM. J. ACM 36(3): 643-670 (1989) |
17 | Johan Håstad, Bettina Just, J. C. Lagarias, Claus-Peter Schnorr: Polynomial Time Algorithms for Finding Integer Relations among Real Numbers. SIAM J. Comput. 18(5): 859-881 (1989) | |
1988 | ||
16 | EE | Michael Ben-Or, Oded Goldreich, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway: Everything Provable is Provable in Zero-Knowledge. CRYPTO 1988: 37-56 |
15 | Johan Håstad: Dual vectors and lower bounds for the nearest lattice point problem. Combinatorica 8(1): 75-81 (1988) | |
14 | Alan M. Frieze, Johan Håstad, Ravi Kannan, J. C. Lagarias, Adi Shamir: Reconstructing Truncated Integer Variables Satisfying Linear Congruences. SIAM J. Comput. 17(2): 262-280 (1988) | |
13 | Johan Håstad: Solving Simultaneous Modular Equations of Low Degree. SIAM J. Comput. 17(2): 336-341 (1988) | |
1987 | ||
12 | William Aiello, Johan Håstad: Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds FOCS 1987: 439-448 | |
11 | Johan Håstad, Frank Thomson Leighton, Brian Rogoff: Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) STOC 1987: 241-253 | |
10 | Johan Håstad, Frank Thomson Leighton, Mark Newman: Reconfiguring a Hypercube in the Presence of Faults (Extended Abstract) STOC 1987: 274-284 | |
9 | Paul Beame, Johan Håstad: Optimal Bounds for Decision Problems on the CRCW PRAM STOC 1987: 83-93 | |
8 | Ravi B. Boppana, Johan Håstad, Stathis Zachos: Does co-NP Have Short Interactive Proofs? Inf. Process. Lett. 25(2): 127-132 (1987) | |
7 | Johan Håstad: One-Way Permutations in NC0. Inf. Process. Lett. 26(3): 153-155 (1987) | |
1986 | ||
6 | William Aiello, Shafi Goldwasser, Johan Håstad: On the Power of Interaction FOCS 1986: 368-379 | |
5 | Johan Håstad, Bettina Helfrich, J. C. Lagarias, Claus-Peter Schnorr: Polynomial Time Algorithms for Finding Integer Relations Among Real Numbers. STACS 1986: 105-118 | |
4 | Johan Håstad: Almost Optimal Lower Bounds for Small Depth Circuits STOC 1986: 6-20 | |
1985 | ||
3 | EE | Johan Håstad: On Using RSA with Low Exponent in a Public Key Network. CRYPTO 1985: 403-408 |
2 | Benny Chor, Oded Goldreich, Johan Håstad, Joel Friedman, Steven Rudich, Roman Smolensky: The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) FOCS 1985: 396-407 | |
1 | Johan Håstad, Adi Shamir: The Cryptographic Security of Truncated Linearly Related Variables STOC 1985: 356-362 |