Search the dblp DataBase
Johan Håstad :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ravi B. Boppana , Johan Håstad , Stathis Zachos Does co-NP Have Short Interactive Proofs? [Citation Graph (1, 0)][DBLP ] Inf. Process. Lett., 1987, v:25, n:2, pp:127-132 [Journal ] Johan Håstad On Nontrivial Approximation of CSPs. [Citation Graph (0, 0)][DBLP ] APPROX-RANDOM, 2006, pp:1- [Conf ] Johan Håstad , Mats Näslund Practical Construction and Analysis of Pseudo-Randomness Primitives. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:442-459 [Conf ] Johan Håstad , Jakob Jonsson , Ari Juels , Moti Yung Funkspiel schemes: an alternative to conventional tamper resistance. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:125-133 [Conf ] Liming Cai , Jianer Chen , Johan Håstad Circuit Bottom Fan-in and Computational Power. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 1997, pp:158-164 [Conf ] Mikael Goldmann , Johan Håstad , Alexander A. Razborov Majority Gates vs. General Weighted Threshold Gates. [Citation Graph (0, 0)][DBLP ] Structure in Complexity Theory Conference, 1992, pp:2-13 [Conf ] Johan Håstad Inapproximability Some history and some open problems. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 2003, pp:265-0 [Conf ] Johan Håstad , Avi Wigderson Simple Analysis of Graph Tests for Linearity and PCP. [Citation Graph (0, 0)][DBLP ] IEEE Conference on Computational Complexity, 2001, pp:244-254 [Conf ] Michael Ben-Or , Oded Goldreich , Shafi Goldwasser , Johan Håstad , Joe Kilian , Silvio Micali , Phillip Rogaway Everything Provable is Provable in Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:37-56 [Conf ] Yevgeniy Dodis , Rosario Gennaro , Johan Håstad , Hugo Krawczyk , Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:494-510 [Conf ] Johan Håstad On Using RSA with Low Exponent in a Public Key Network. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:403-408 [Conf ] Johan Håstad , Lars Ivansson , Jens Lagergren Fitting Points on the Real Line and Its Application to RH Mapping. [Citation Graph (0, 0)][DBLP ] ESA, 1998, pp:465-476 [Conf ] Noga Alon , Oded Goldreich , Johan Håstad , René Peralta Simple Constructions of Almost k-Wise Independent Random Variables [Citation Graph (0, 0)][DBLP ] FOCS, 1990, pp:544-553 [Conf ] William Aiello , Shafi Goldwasser , Johan Håstad On the Power of Interaction [Citation Graph (0, 0)][DBLP ] FOCS, 1986, pp:368-379 [Conf ] William Aiello , Johan Håstad Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds [Citation Graph (0, 0)][DBLP ] FOCS, 1987, pp:439-448 [Conf ] Mihir Bellare , Don Coppersmith , Johan Håstad , Marcos A. Kiwi , Madhu Sudan Linearity Testing in Characteristic Two. [Citation Graph (0, 0)][DBLP ] FOCS, 1995, pp:432-441 [Conf ] Benny Chor , Oded Goldreich , Johan Håstad , Joel Friedman , Steven Rudich , Roman Smolensky The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:396-407 [Conf ] Venkatesan Guruswami , Johan Håstad , Madhu Sudan Hardness of Approximate Hypergraph Coloring. [Citation Graph (0, 0)][DBLP ] FOCS, 2000, pp:149-158 [Conf ] Johan Håstad The shrinkage exponent is 2 [Citation Graph (0, 0)][DBLP ] FOCS, 1993, pp:114-123 [Conf ] Johan Håstad Clique is Hard to Approximate Within n1-epsilon . [Citation Graph (0, 0)][DBLP ] FOCS, 1996, pp:627-636 [Conf ] Johan Håstad , Mikael Goldmann On the Power of Small-Depth Threshold Circuits [Citation Graph (0, 0)][DBLP ] FOCS, 1990, pp:610-618 [Conf ] Johan Håstad , Stasys Jukna , Pavel Pudlák Top-Down Lower Bounds for Depth 3 Circuits [Citation Graph (0, 0)][DBLP ] FOCS, 1993, pp:124-129 [Conf ] Johan Håstad , Subhash Khot Query Efficient PCPs with Perfect Completeness. [Citation Graph (0, 0)][DBLP ] FOCS, 2001, pp:610-619 [Conf ] Johan Håstad , Mats Näslund The Security of Individual RSA Bits. [Citation Graph (0, 0)][DBLP ] FOCS, 1998, pp:510-521 [Conf ] Johan Håstad Which NP-Hard Optimization Problems Admit Non-trivial Efficient Approximation Algorithms? [Citation Graph (0, 0)][DBLP ] ICALP, 2000, pp:235- [Conf ] Johan Håstad Tensor Rank is NP-Complete. [Citation Graph (0, 0)][DBLP ] ICALP, 1989, pp:451-460 [Conf ] Johan Håstad , Steven Phillips , Shmuel Safra A Well-Characterized Approximation Problem. [Citation Graph (0, 0)][DBLP ] ISTCS, 1993, pp:261-265 [Conf ] Yonatan Aumann , Johan Håstad , Michael O. Rabin , Madhu Sudan Linear Consistency Testing. [Citation Graph (0, 0)][DBLP ] RANDOM-APPROX, 1999, pp:109-120 [Conf ] Gunnar Andersson , Lars Engebretsen , Johan Håstad A New Way to Use Semidefinite Programming with Applications to Linear Equations mod p . [Citation Graph (0, 0)][DBLP ] SODA, 1999, pp:41-50 [Conf ] Johan Håstad , Bettina Helfrich , J. C. Lagarias , Claus-Peter Schnorr Polynomial Time Algorithms for Finding Integer Relations Among Real Numbers. [Citation Graph (0, 0)][DBLP ] STACS, 1986, pp:105-118 [Conf ] Arne Andersson , Torben Hagerup , Johan Håstad , Ola Petersson The complexity of searching a sorted array of strings. [Citation Graph (0, 0)][DBLP ] STOC, 1994, pp:317-325 [Conf ] Arne Andersson , Johan Håstad , Ola Petersson A tight lower bound for searching a sorted array. [Citation Graph (0, 0)][DBLP ] STOC, 1995, pp:417-426 [Conf ] Paul Beame , Johan Håstad Optimal Bounds for Decision Problems on the CRCW PRAM [Citation Graph (0, 0)][DBLP ] STOC, 1987, pp:83-93 [Conf ] Mikael Goldmann , Johan Håstad Monotone circuits for connectivity have depth (log n)2-o(1) (Extended Abstract). [Citation Graph (0, 0)][DBLP ] STOC, 1995, pp:569-574 [Conf ] Johan Håstad Every 2-CSP allows nontrivial approximation. [Citation Graph (0, 0)][DBLP ] STOC, 2005, pp:740-746 [Conf ] Johan Håstad Almost Optimal Lower Bounds for Small Depth Circuits [Citation Graph (0, 0)][DBLP ] STOC, 1986, pp:6-20 [Conf ] Johan Håstad Pseudo-Random Generators under Uniform Assumptions [Citation Graph (0, 0)][DBLP ] STOC, 1990, pp:395-404 [Conf ] Johan Håstad Testing of the Long Code and Hardness for Clique. [Citation Graph (0, 0)][DBLP ] STOC, 1996, pp:11-19 [Conf ] Johan Håstad Some Optimal Inapproximability Results. [Citation Graph (0, 0)][DBLP ] STOC, 1997, pp:1-10 [Conf ] Johan Håstad , Frank Thomson Leighton , Mark Newman Reconfiguring a Hypercube in the Presence of Faults (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1987, pp:274-284 [Conf ] Johan Håstad , Frank Thomson Leighton , Mark Newman Fast Computation Using Faulty Hypercubes (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1989, pp:251-263 [Conf ] Johan Håstad , Frank Thomson Leighton , Brian Rogoff Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1987, pp:241-253 [Conf ] Johan Håstad , Adi Shamir The Cryptographic Security of Truncated Linearly Related Variables [Citation Graph (0, 0)][DBLP ] STOC, 1985, pp:356-362 [Conf ] Johan Håstad , Srinivasan Venkatesh On the advantage over a random assignment. [Citation Graph (0, 0)][DBLP ] STOC, 2002, pp:43-52 [Conf ] Johan Håstad Recent Results in Hardness of Approximation. [Citation Graph (0, 0)][DBLP ] SWAT, 1994, pp:231-239 [Conf ] Johan Håstad Some Recent Strong Inapproximability Results. [Citation Graph (0, 0)][DBLP ] SWAT, 1998, pp:205-209 [Conf ] Mikael Goldmann , Johan Håstad , Alexander A. Razborov Majority Gates VS. General Weighted Threshold Gates. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1992, v:2, n:, pp:277-300 [Journal ] Johan Håstad , Mikael Goldmann On the Power of Small-Depth Threshold Circuits. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1991, v:1, n:, pp:113-129 [Journal ] Johan Håstad , Stasys Jukna , Pavel Pudlák Top-Down Lower Bounds for Depth-Three Circuits. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1995, v:5, n:2, pp:99-112 [Journal ] William Aiello , Shafi Goldwasser , Johan Håstad On the power of interaction. [Citation Graph (0, 0)][DBLP ] Combinatorica, 1990, v:10, n:1, pp:3-25 [Journal ] Johan Håstad Dual vectors and lower bounds for the nearest lattice point problem. [Citation Graph (0, 0)][DBLP ] Combinatorica, 1988, v:8, n:1, pp:75-81 [Journal ] Johan Håstad , Svante Linusson , Johan Wästlund A Smaller Sleeping Bag for a Baby Snake. [Citation Graph (0, 0)][DBLP ] Discrete & Computational Geometry, 2001, v:26, n:1, pp:173-181 [Journal ] Venkatesan Guruswami , Johan Håstad , Madhu Sudan Hardness of approximate hypergraph coloring [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:62, pp:- [Journal ] Johan Håstad Some optimal inapproximability results [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:37, pp:- [Journal ] Johan Håstad Clique is hard to approximate within n1-epsilon [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:38, pp:- [Journal ] Yonatan Aumann , Johan Håstad , Michael O. Rabin , Madhu Sudan Linear Consistency Testing [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:25, pp:- [Journal ] Johan Håstad , Mats Näslund The Security of all RSA and Discrete Log Bits [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:37, pp:- [Journal ] Johan Håstad On approximating CSP-B [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:39, pp:- [Journal ] William Aiello , Johan Håstad Relativized Perfect Zero Knowledge Is Not BPP [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1991, v:93, n:2, pp:223-240 [Journal ] Johan Håstad , Ingo Wegener , Norbert Wurm , Sang-Zin Yi Optimal Depth, Very Small Size Circuits for Symmetric Functions in AC0 . [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1994, v:108, n:2, pp:200-211 [Journal ] Mikael Goldmann , Per Grape , Johan Håstad On Average Time Hierarchies. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:49, n:1, pp:15-20 [Journal ] Mikael Goldmann , Johan Håstad A Simple Lower Bound for Monotone Clique Using a Communication Game. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1992, v:41, n:4, pp:221-226 [Journal ] Oded Goldreich , Johan Håstad On the Complexity of Interactive Proofs with Bounded Communication. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:67, n:4, pp:205-214 [Journal ] Johan Håstad On bounded occurrence constraint satisfaction. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2000, v:74, n:1-2, pp:1-6 [Journal ] Johan Håstad One-Way Permutations in NC0. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1987, v:26, n:3, pp:153-155 [Journal ] Johan Håstad , Steven Phillips , Shmuel Safra A Well-Characterized Approximation Problem. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1993, v:47, n:6, pp:301-305 [Journal ] Paul Beame , Johan Håstad Optimal bounds for decision problems on the CRCW PRAM. [Citation Graph (0, 0)][DBLP ] J. ACM, 1989, v:36, n:3, pp:643-670 [Journal ] Johan Håstad Some optimal inapproximability results. [Citation Graph (0, 0)][DBLP ] J. ACM, 2001, v:48, n:4, pp:798-859 [Journal ] Johan Håstad , Mats Näslund The security of all RSA and discrete log bits. [Citation Graph (0, 0)][DBLP ] J. ACM, 2004, v:51, n:2, pp:187-230 [Journal ] Gunnar Andersson , Lars Engebretsen , Johan Håstad A New Way of Using Semidefinite Programming with Applications to Linear Equations mod p. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 2001, v:39, n:2, pp:162-204 [Journal ] Johan Håstad Tensor Rank is NP-Complete. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1990, v:11, n:4, pp:644-654 [Journal ] Johan Håstad , Lars Ivansson , Jens Lagergren Fitting points on the real line and its application to RH mapping. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 2003, v:49, n:1, pp:42-62 [Journal ] William Aiello , Johan Håstad Statistical Zero-Knowledge Languages can be Recognized in Two Rounds. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1991, v:42, n:3, pp:327-345 [Journal ] Yonatan Aumann , Johan Håstad , Michael O. Rabin , Madhu Sudan Linear-Consistency Testing. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2001, v:62, n:4, pp:589-607 [Journal ] Richard Chang , Benny Chor , Oded Goldreich , Juris Hartmanis , Johan Håstad , Desh Ranjan , Pankaj Rohatgi The Random Oracle Hypothesis Is False. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1994, v:49, n:1, pp:24-39 [Journal ] Johan Håstad A Slight Sharpening of LMN. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2001, v:63, n:3, pp:498-508 [Journal ] Johan Håstad , A. W. Schrift , Adi Shamir The Discrete Logarithm Modulo a Composite Hides O(n) Bits. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1993, v:47, n:3, pp:376-404 [Journal ] Noga Alon , Oded Goldreich , Johan Håstad , René Peralta Simple Construction of Almost k-wise Independent Random Variables. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1992, v:3, n:3, pp:289-304 [Journal ] Noga Alon , Oded Goldreich , Johan Håstad , Rene Paralta Addendum to "Simple Construction of Almost k-wise Independent Random Variables". [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1993, v:4, n:1, pp:119-120 [Journal ] Johan Håstad The square lattice shuffle. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 2006, v:29, n:4, pp:466-474 [Journal ] Johan Håstad , Srinivasan Venkatesh On the advantage over a random assignment. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 2004, v:25, n:2, pp:117-149 [Journal ] Johan Håstad , Avi Wigderson Simple analysis of graph tests for linearity and PCP. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 2003, v:22, n:2, pp:139-160 [Journal ] Arne Andersson , Torben Hagerup , Johan Håstad , Ola Petersson Tight Bounds for Searching a Sorted Array of Strings. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2000, v:30, n:5, pp:1552-1578 [Journal ] Liming Cai , Jianer Chen , Johan Håstad Circuit Bottom Fan-In and Computational Power. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1998, v:27, n:2, pp:341-355 [Journal ] Alan M. Frieze , Johan Håstad , Ravi Kannan , J. C. Lagarias , Adi Shamir Reconstructing Truncated Integer Variables Satisfying Linear Congruences. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:262-280 [Journal ] Mikael Goldmann , Johan Håstad Monotone Circuits for Connectivity Have Depth (log n )2-o (1) . [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1998, v:27, n:5, pp:1283-1294 [Journal ] Venkatesan Guruswami , Johan Håstad , Madhu Sudan Hardness of Approximate Hypergraph Coloring. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2002, v:31, n:6, pp:1663-1686 [Journal ] Johan Håstad Solving Simultaneous Modular Equations of Low Degree. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:336-341 [Journal ] Johan Håstad The Shrinkage Exponent of de Morgan Formulas is 2. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1998, v:27, n:1, pp:48-64 [Journal ] Johan Håstad , Russell Impagliazzo , Leonid A. Levin , Michael Luby A Pseudorandom Generator from any One-way Function. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1999, v:28, n:4, pp:1364-1396 [Journal ] Johan Håstad , Bettina Just , J. C. Lagarias , Claus-Peter Schnorr Polynomial Time Algorithms for Finding Integer Relations among Real Numbers. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1989, v:18, n:5, pp:859-881 [Journal ] Johan Håstad , Frank Thomson Leighton , Brian Rogoff Analysis of Backoff Protocols for Multiple Access Channels. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1996, v:25, n:4, pp:740-774 [Journal ] Dorit Dor , Johan Håstad , Staffan Ulfberg , Uri Zwick On Lower Bounds for Selecting the Median. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 2001, v:14, n:3, pp:299-311 [Journal ] Johan Håstad On the Size of Weights for Threshold Gates. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 1994, v:7, n:3, pp:484-492 [Journal ] Johan Håstad , Alexander A. Razborov , Andrew Chi-Chih Yao On the Shrinkage Exponent for Read-Once Formulae. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1995, v:141, n:1&2, pp:269-282 [Journal ] Mihir Bellare , Don Coppersmith , Johan Håstad , Marcos A. Kiwi , Madhu Sudan Linearity testing in characteristic two. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:6, pp:1781-1795 [Journal ] Venkatesan Guruswami , Johan Håstad , Madhu Sudan , David Zuckerman Combinatorial bounds for list decoding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:5, pp:1021-1034 [Journal ] Johan Håstad On the Approximation Resistance of a Random Predicate. [Citation Graph (0, 0)][DBLP ] APPROX-RANDOM, 2007, pp:149-163 [Conf ] Johan Håstad , Svante Linusson , Johan Wästlund A Smaller Sleeping Bag for a Baby Snake. [Citation Graph (0, 0)][DBLP ] Discrete & Computational Geometry, 2007, v:38, n:1, pp:171- [Journal ] Johan Håstad The Security of the IAPM and IACBC Modes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:2, pp:153-163 [Journal ] Approximating Linear Threshold Predicates. [Citation Graph (, )][DBLP ] Towards an optimal separation of space and length in resolution. [Citation Graph (, )][DBLP ] Randomly supported independence and resistance. [Citation Graph (, )][DBLP ] On the list-decodability of random linear codes. [Citation Graph (, )][DBLP ] An Efficient Parallel Repetition Theorem. [Citation Graph (, )][DBLP ] Every 2-csp Allows Nontrivial Approximation. [Citation Graph (, )][DBLP ] On the Approximation Resistance of a Random Predicate. [Citation Graph (, )][DBLP ] Special Issue "Conference on Computational Complexity 2009" Guest Editor's Foreword. [Citation Graph (, )][DBLP ] Towards an Optimal Separation of Space and Length in Resolution [Citation Graph (, )][DBLP ] On the List-Decodability of Random Linear Codes [Citation Graph (, )][DBLP ] Towards an Optimal Separation of Space and Length in Resolution. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.042secs