Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,356,483 papers from all fields of science
Search
Sign In
Create Free Account
Steven Rudich
Known as:
Rudich
Steven Rudich (born October 4, 1961) is a professor in the Carnegie Mellon School of Computer Science. In 1994, he and Alexander Razborov proved that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Computational complexity theory
DTIME
Gödel Prize
Journal of Cryptology
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Generalized matrix completion and algebraic natural proofs
M. Bläser
,
Christian Ikenmeyer
,
Gorav Jindal
,
Vladimir Lysikov
Electron. Colloquium Comput. Complex.
2018
Corpus ID: 5038787
Algebraic natural proofs were recently introduced by Forbes, Shpilka and Volk (Proc. of the 49th Annual ACM SIGACT Symposium on…
Expand
2016
2016
In vitro exposure to isoprene-derived secondary organic aerosol by direct deposition and its effects on COX-2 and IL-8 gene expression
M. Arashiro
,
Ying-Hsuan Lin
,
+6 authors
J. Surratt
2016
Corpus ID: 53320449
Abstract. Atmospheric oxidation of isoprene, the most abundant non-methane hydrocarbon emitted into Earth's atmosphere primarily…
Expand
Highly Cited
2016
Highly Cited
2016
Watermarking cryptographic capabilities
A. Cohen
,
Justin Holmgren
,
R. Nishimaki
,
V. Vaikuntanathan
,
Daniel Wichs
Symposium on the Theory of Computing
2016
Corpus ID: 5545337
A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No…
Expand
2015
2015
Publicly Verifiable Software Watermarking
A. Cohen
,
Justin Holmgren
,
V. Vaikuntanathan
IACR Cryptology ePrint Archive
2015
Corpus ID: 8258428
Software Watermarking is the process of transforming a program into a functionally equivalent “marked” program in such a way that…
Expand
Highly Cited
2010
Highly Cited
2010
Who is James Bond? : the Dark Triad as an agentic social style
P. Jonason
,
Norman P. Li
,
Emily A. Teicher
2010
Corpus ID: 145308922
If the Dark Triad are costly traits for individuals to have and individuals are predisposed to avoid interacting with selfish…
Expand
Highly Cited
2008
Highly Cited
2008
Merkle Puzzles are Optimal
B. Barak
,
Mohammad Mahmoody-Ghidary
IACR Cryptology ePrint Archive
2008
Corpus ID: 2763558
We prove that every key exchange protocol in the random oracle model in which the honest users make at most n queries to the…
Expand
2008
2008
A Practical Approach to Partiality - A Proof Based Approach
Farhad Mehta
IEEE International Conference on Formal…
2008
Corpus ID: 14258712
Partial functions are frequently used when specifying and reasoning about computer programs. Using partial functions entails…
Expand
2003
2003
Computing Elementary Symmetric Polynomials with a Subpolynomial Number of Multiplications
V. Grolmusz
SIAM journal on computing (Print)
2003
Corpus ID: 14639768
Elementary symmetric polynomials $S_n^k$ are the building blocks of symmetric polynomials. In this work we prove that for…
Expand
Highly Cited
2000
Highly Cited
2000
The relationship between public key encryption and oblivious transfer
Yael Gertner
,
Sampath Kannan
,
T. Malkin
,
Omer Reingold
,
Mahesh Viswanathan
Proceedings 41st Annual Symposium on Foundations…
2000
Corpus ID: 206560098
In this paper we study the relationships among some of the most fundamental primitives and protocols in cryptography: public-key…
Expand
2000
2000
A dual version of Reimer's inequality and a proof of Rudich's conjecture
J. Kahn
,
M. Saks
,
Clifford D. Smyth
Proceedings 15th Annual IEEE Conference on…
2000
Corpus ID: 16429609
We prove a dual version of the celebrated inequality of D. Reimer (a.k.a. the van den Berg-Kesten conjecture). We use the dual…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE