Name
Papers
Collaborators
DAVID ZUCHERMAN
75
98
Citations 
PageRank 
Referers 
2588
266.65
2378
Referees 
References 
746
1202
Search Limit
1001000
Title
Citations
PageRank
Year
Spectral Sparsification via Bounded-Independence Sampling.00.342020
Randomness Efficient Noise Stability and Generalized Small Bias Sets.00.342020
XOR lemmas for resilient functions against polynomials00.342020
Biasing Boolean Functions and Collective Coin-Flipping Protocols over Arbitrary Product Distributions.00.342019
Improved Extractors for Recognizable and Algebraic Sources.00.342018
Simple Optimal Hitting Sets for Small-Success $\mathbf{RL}$.00.342018
Simple Optimal Hitting Sets for Small-Success RL00.342018
Existence of Simple Extractors.00.342018
Special issue "Computational Complexity Conference 2015" Guest Editors' Foreword.00.342016
New Extractors for Interleaved Sources.00.342016
Bitcoin Beacon.00.342016
Robust Fourier and Polynomial Curve Fitting20.392016
Mining Circuit Lower Bound Proofs for Meta-Algorithms130.582015
Deterministic Extractors for Additive Sources: Extended Abstract.00.342015
Deterministic Extractors for Additive Sources.00.342014
Non-malleable Codes against Constant Split-State Tampering371.252014
Privacy Amplification and Nonmalleable Extractors Via Character Sums.140.582014
Rectangles Are Nonnegative Juntas.201.112014
On Low Discrepancy Samplings in Product Spaces of Motion Groups.20.542014
Pseudorandom Generators for Combinatorial Shapes60.482013
Robust pseudorandom generators00.342013
Pseudorandom Financial Derivatives00.342011
Privacy Amplification and Non-malleable Extractors via Character Sums140.702011
Deterministic extractors for small-space sources311.212011
Non-malleable extractors via character sums10.372011
Pseudorandom generators for polynomial threshold functions291.252010
Fooling Functions of Halfspaces under Product Distributions201.022010
Can Random Coin Flips Speed Up a Computer?00.342010
Small-Bias Spaces for Group Products150.812009
Optimal Testing of Reed-Muller Codes281.142009
Extractors for Three Uneven-Length Sources40.402008
List-decoding reed-muller codes over small fields291.292008
Network Extractor Protocols120.552008
Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography693.122007
Linear degree extractors and the inapproximability of max clique and chromatic number1686.962007
Interaction in Quantum Communication110.622007
Lossless Condensers, Unbalanced Expanders, And Extractors501.872007
Random Selection with an Adversarial Majority170.862006
Extractors from Reed-Muller Codes482.252006
Compression of Samplable Sources100.602005
Testing Low-Degree Polynomials over Prime Fields321.382004
Extractor codes391.972004
Combinatorial bounds for list decoding463.162002
Lower bounds for leader election and collective coin-flipping in the perfect information model131.002002
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks382.232002
Perfect information leader election in log * n+0(1) rounds211.252001
Loss-less condensers, unbalanced expanders, and extractors743.182001
Interaction in quantum communication and the complexity of set disjointness332.232001
Interaction in Quantum Communication Complexity40.592000
Tight Analyses of Two Local Load Balancing Algorithms524.751999
  • 1
  • 2