Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,356,651 papers from all fields of science
Search
Sign In
Create Free Account
Hard-core predicate
Known as:
Trapdoor predicate
, Goldreich-Levin theorem
, Goldreich-Levin Construction
Expand
In cryptography, a hard-core predicate of a one-way function f is a predicate b (i.e., a function whose output is a single bit) which is easy to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Commitment scheme
Cryptography
Hadamard code
Information theory
Expand
Broader (1)
Pseudorandomness
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The Goldreich–Schubert–Fricke instability in stellar radiative zones
Andrea Caleo
,
S. Balbus
,
E. Tognelli
2016
Corpus ID: 119221928
The Goldreich-Schubert-Fricke (GSF) instability is a rotational instability that is thought to contribute to the transfer of…
Expand
Highly Cited
2013
Highly Cited
2013
Furious activity vs. understanding: How much expertise is needed to evaluate creative work?
J. Kaufman
,
John Baer
,
D. Cropley
,
R. Reiter‐Palmon
,
Sarah Sinnett
2013
Corpus ID: 34495653
What is the role of expertise in evaluating creative products? Novices and experts do not assess creativity similarly, indicating…
Expand
Highly Cited
2009
Highly Cited
2009
Giving, Prompting, Making: Aligning Technology and Pedagogy Within TPACK for Social Studies Instruction
Thomas Hammond
,
M. Manfra
2009
Corpus ID: 154313996
Technological pedagogical content knowledge (now known as technology, pedagogy, and content knowledge, or TPACK) has become a…
Expand
2008
2008
An improved list decoding algorithm for the second order Reed–Muller codes and its applications
R. Fourquet
,
C. Tavernier
Des. Codes Cryptogr.
2008
Corpus ID: 46648791
We propose an algorithm which is an improved version of the Kabatiansky–Tavernier list decoding algorithm for the second order…
Expand
Highly Cited
2006
Highly Cited
2006
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Phong Q. Nguyen
,
O. Regev
Journal of Cryptology
2006
Corpus ID: 2164840
Lattice-based signature schemes following the Goldreich–Goldwasser–Halevi (GGH) design have the unusual property that each…
Expand
Highly Cited
2006
Highly Cited
2006
Rotational mixing in low-mass stars: II. Self-consistent models of Pop II RGB stars
A. Palacios
,
C. Charbonnel
,
S. Talon
,
L. Siess
2006
Corpus ID: 117452131
Aims. In this paper we study the effects of rotation in low-mass, low-metallicity RGB stars. Methods. We present the first…
Expand
2004
2004
Random Thoughts on the (In)credibility of Educational-Psychological Intervention Research
J. Levin
2004
Corpus ID: 39305898
I am proud that throughout my professional career my path has crossed—if only symbolically—with that of the much-revered…
Expand
Highly Cited
2002
Highly Cited
2002
Secular Evolution of Hierarchical Planetary Systems
M. Lee
,
S. Peale
2002
Corpus ID: 18978776
We investigate the dynamical evolution of coplanar, hierarchical, two-planet systems where the ratio of the orbital semimajor…
Expand
2002
2002
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive
K. Sakurai
,
T. Takagi
International Conference on Theory and Practice…
2002
Corpus ID: 8520247
We analyze the security of the simplified Paillier (S-Paillier) cryptosystem, which was proposed by Catalano et al. We prove that…
Expand
Highly Cited
1983
Highly Cited
1983
Fast pulsations in the solar corona
B. Roberts
,
P. M. Edwin
,
A. Benz
Nature
1983
Corpus ID: 4305618
Pulsations in radio emission from the solar coronal plasma have been detected for over a decade1–9. The oscillations are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE