2003
DOI: 10.1007/978-3-540-24597-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Constructions of Sparse Asymmetric Connectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2005
2005
2006
2006

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Hwang and Richards [7] gave an explicit construction for (n, N, 2)-connectors of size (1+o(1))N √ n if n ≤ √ N . Baltz, Jäger and Srivastav [1], [2] showed by a probabilistic argument the existence of (n, N, 2)-connectors of size O(N ), if n ≤ N 1/2−ε , ε > 0. They also extended the result of Hwang and Richards and improved it by a constant factor.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Hwang and Richards [7] gave an explicit construction for (n, N, 2)-connectors of size (1+o(1))N √ n if n ≤ √ N . Baltz, Jäger and Srivastav [1], [2] showed by a probabilistic argument the existence of (n, N, 2)-connectors of size O(N ), if n ≤ N 1/2−ε , ε > 0. They also extended the result of Hwang and Richards and improved it by a constant factor.…”
Section: Introductionmentioning
confidence: 99%
“…Such connectors with d = 2 are of particular interest (refering to [1,2]) in the design of sparse electronic switches. A challenging problem is to construct linear-sized (n, N, 2)-connectors.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Beyond the theoretical interest in the question, the need for such systems occurs in reality, e.g., in multicast switch design [K03]. This motivated the work of Baltz, Jäger, and Srivastav [BJS03] who gave explicit (N, K) depth two connectors with O(N √ K) edges, for K ≤ √ N . This was followed by an entirely different combinatorial approach of Ahlswede and Aydinian [AA03], based on the Kruskal-Katona theorem, that yields explicit depth two connectors with O(N log K) edges, given that K ≤ N O(1/ √ log N ) .…”
Section: Introductionmentioning
confidence: 99%
“…Such a proof implies the absence of a generic (black-box) attack against C(F), i.e., an attack which does not exploit specific properties of F, but uses it merely as a black-box. 3 Such a generic proof is not an ultimate security proof for C(F), but it proves that the construction C(·) itself has no weakness. A main advantage of such a proof is that it applies to every cryptographic property of interest (which a random function has), not just to specific properties like collision-resistance.…”
Section: Significance Of Domain Extension For Public Random Functionsmentioning
confidence: 99%