Abstract-Furthering the study of cryptography in NC 0 , we give new evidence for the security of Goldreich's candidate pseudorandom generator with near-optimal, polynomial stretch. Our evidence consists both of security against subexponential-time F2-linear attacks as well as subexponential-time attacks using SDP hierarchies such as Sherali-Adams + and Lasserre/Parrilo. More specifically, instantiating Goldreich's generator with the predicate P (x1, . . . , x5) = x1+x2+x3+x4x5 (mod 2) we get a candidate 5-local PRG which stretches n bits to n 1.499 bits and which is secure against both F2-linear attacks and attacks based on the Lasserre/Parrilo SDP hierarchy. Previous works with such small locality only gave stretch n 1.249 and were only shown to be secure against F2-linear attacks.Our result is essentially optimal, as known SDP/spectral techniques show the generator would not be secure if used with stretch Θ(n 3/2 log n). More generally, when (a slight variant of) Goldreich's generator is used with a local predicate P (x) which is (t− 1)-wise independent, we show that one can allow stretch n t/2− for any > 0 while resisting subexponentialtime attacks based on the Sherali-Adams + SDP hierarchy. Again, this is amount of stretch is (potentially) optimal due to known SDP/spectral methods which succeed at stretch Θ(n t/2 log n). Finally, for a large family of predicates we also extend this result to security against the much stronger Lasserre/Parrilo SDP hierarchy.