Follow
Xin Li
Title
Cited by
Cited by
Year
Non-malleable extractors and codes, with their many tampered extensions
E Chattopadhyay, V Goyal, X Li
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1312016
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing …, 2017
1192017
Privacy amplification and nonmalleable extractors via character sums
Y Dodis, X Li, TD Wooley, D Zuckerman
SIAM Journal on Computing 43 (2), 800-830, 2014
872014
Deterministic document exchange protocols, and almost optimal binary codes for edit errors
K Cheng, Z Jin, X Li, K Wu
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
732018
Improved two-source extractors, and affine extractors for polylogarithmic entropy
X Li
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS …, 2016
722016
Non-malleable extractors, two-source extractors and privacy amplification
X Li
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 688-697, 2012
692012
Non-malleable extractors and non-malleable codes: Partially optimal constructions
X Li
arXiv preprint arXiv:1804.04005, 2018
652018
Three-source extractors for polylogarithmic min-entropy
X Li
2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 863-882, 2015
632015
Limitations of autoregressive models and their alternatives
CC Lin, A Jaech, X Li, MR Gormley, J Eisner
arXiv preprint arXiv:2010.11939, 2020
582020
Multiple-copy entanglement transformation and entanglement catalysis
R Duan, Y Feng, X Li, M Ying
Physical Review A—Atomic, Molecular, and Optical Physics 71 (4), 042319, 2005
562005
Non-malleable codes and extractors for small-depth circuits, and affine functions
E Chattopadhyay, X Li
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing …, 2017
522017
Extractors for a constant number of independent sources with polylogarithmic min-entropy
X Li
2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 100-109, 2013
512013
2-source extractors under computational assumptions and cryptography with defective randomness
YT Kalai, X Li, A Rao
2009 50th Annual IEEE Symposium on Foundations of Computer Science, 617-626, 2009
492009
Improved constructions of three source extractors
X Li
2011 IEEE 26th Annual Conference on Computational Complexity, 126-136, 2011
462011
Network extractor protocols
YT Kalai, X Li, A Rao, D Zuckerman
2008 49th Annual IEEE Symposium on Foundations of Computer Science, 654-663, 2008
442008
Explicit non-malleable extractors, multi-source extractors, and almost optimal privacy amplification protocols
E Chattopadhyay, X Li
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS …, 2016
422016
Design extractors, non-malleable condensers and privacy amplification
X Li
Proceedings of the forty-fourth annual ACM Symposium on Theory of Computing …, 2012
422012
New independent source extractors with exponential improvement
X Li
Proceedings of the forty-fifth annual ACM Symposium on Theory of Computing …, 2013
402013
Robust pseudorandom generators
Y Ishai, E Kushilevitz, X Li, R Ostrovsky, M Prabhakaran, A Sahai, ...
Automata, Languages, and Programming: 40th International Colloquium, ICALP …, 2013
402013
A new approach to affine extractors and dispersers
X Li
2011 IEEE 26th Annual Conference on Computational Complexity, 137-147, 2011
392011
The system can't perform the operation now. Try again later.
Articles 1–20