Non-malleable extractors and codes, with their many tampered extensions E Chattopadhyay, V Goyal, X Li Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 131 | 2016 |
Improved non-malleable extractors, non-malleable codes and independent source extractors X Li Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing …, 2017 | 119 | 2017 |
Privacy amplification and nonmalleable extractors via character sums Y Dodis, X Li, TD Wooley, D Zuckerman SIAM Journal on Computing 43 (2), 800-830, 2014 | 87 | 2014 |
Deterministic document exchange protocols, and almost optimal binary codes for edit errors K Cheng, Z Jin, X Li, K Wu 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 73 | 2018 |
Improved two-source extractors, and affine extractors for polylogarithmic entropy X Li 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS …, 2016 | 72 | 2016 |
Non-malleable extractors, two-source extractors and privacy amplification X Li 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 688-697, 2012 | 69 | 2012 |
Non-malleable extractors and non-malleable codes: Partially optimal constructions X Li arXiv preprint arXiv:1804.04005, 2018 | 65 | 2018 |
Three-source extractors for polylogarithmic min-entropy X Li 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 863-882, 2015 | 63 | 2015 |
Limitations of autoregressive models and their alternatives CC Lin, A Jaech, X Li, MR Gormley, J Eisner arXiv preprint arXiv:2010.11939, 2020 | 58 | 2020 |
Multiple-copy entanglement transformation and entanglement catalysis R Duan, Y Feng, X Li, M Ying Physical Review A—Atomic, Molecular, and Optical Physics 71 (4), 042319, 2005 | 56 | 2005 |
Non-malleable codes and extractors for small-depth circuits, and affine functions E Chattopadhyay, X Li Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing …, 2017 | 52 | 2017 |
Extractors for a constant number of independent sources with polylogarithmic min-entropy X Li 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 100-109, 2013 | 51 | 2013 |
2-source extractors under computational assumptions and cryptography with defective randomness YT Kalai, X Li, A Rao 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 617-626, 2009 | 49 | 2009 |
Improved constructions of three source extractors X Li 2011 IEEE 26th Annual Conference on Computational Complexity, 126-136, 2011 | 46 | 2011 |
Network extractor protocols YT Kalai, X Li, A Rao, D Zuckerman 2008 49th Annual IEEE Symposium on Foundations of Computer Science, 654-663, 2008 | 44 | 2008 |
Explicit non-malleable extractors, multi-source extractors, and almost optimal privacy amplification protocols E Chattopadhyay, X Li 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS …, 2016 | 42 | 2016 |
Design extractors, non-malleable condensers and privacy amplification X Li Proceedings of the forty-fourth annual ACM Symposium on Theory of Computing …, 2012 | 42 | 2012 |
New independent source extractors with exponential improvement X Li Proceedings of the forty-fifth annual ACM Symposium on Theory of Computing …, 2013 | 40 | 2013 |
Robust pseudorandom generators Y Ishai, E Kushilevitz, X Li, R Ostrovsky, M Prabhakaran, A Sahai, ... Automata, Languages, and Programming: 40th International Colloquium, ICALP …, 2013 | 40 | 2013 |
A new approach to affine extractors and dispersers X Li 2011 IEEE 26th Annual Conference on Computational Complexity, 137-147, 2011 | 39 | 2011 |