ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
21
views
0
references
Top references
cited by
53
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,715
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Limits on the provable consequences of one-way permutations
proceedings-article
Author(s):
R. Impagliazzo
,
S. Rudich
Publication date
(Print):
1989
Publication date
(Print):
1989
Conference name:
the twenty-first annual ACM symposium (STOC '89)
Conference date:
June 14, 1989 - June 17, 1989
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scholarly Publication Practices and Impact Factor Calculation and Manipulation
Author and article information
Conference
Publication date (Print):
1989
Publication date (Print):
1989
Pages
: 44-61
Article
DOI:
10.1145/73007.73012
SO-VID:
26dc3753-1f4b-4e86-b130-032ba29907b5
Copyright ©
© 1989
Conference name:
the twenty-first annual ACM symposium
Conference acronym:
STOC '89
Conference number:
21
Conference location:
Seattle, Washington, United States
Conference date:
June 14, 1989 - June 17, 1989
Conference sponsor:
SIGACT, ACM Special Interest Group on Algorithms and Computation Theory
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,715
Provable Risk-Sensitive Distributional Reinforcement Learning with General Function Approximation
Authors:
Yu Chen
,
Xiangcheng Zhang
,
Siwei Wang
…
Provably good moving least squares
Authors:
Ravikrishna Kolluri
A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments
Authors:
Mustapha Benssalah
,
Mustapha Djeddou
,
Karim Drouiche
See all similar
Cited by
53
On Cryptographic Assumptions and Challenges
Authors:
Moni Naor
Federated Learning
Authors:
Qiang Yang
,
Yang Liu
,
Yong Cheng
…
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Authors:
Ding Wang
,
Ping Wang
See all cited by