Johan Håstad

Orcid: 0000-0002-5379-345X

Affiliations:
  • Royal Institute of Technology, Stockholm, Sweden


According to our database1, Johan Håstad authored at least 124 papers between 1985 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

ACM Fellow

ACM Fellow 2018, "For contributions in circuit complexity, approximability and inapproximability, and foundations of pseudorandomness".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Logarithmic Approximation of Linearly-Ordered Colourings.
Proceedings of the Approximation, 2024

2023
On small-depth Frege proofs for PHP.
Electron. Colloquium Comput. Complex., 2023

The EATCS Award 2023 - Laudatio for Amos Fiat.
Bull. EATCS, 2023

2022
The EATCS Award 2023 - Call for Nominations.
Bull. EATCS, 2022

On Bounded Depth Proofs for Tseitin Formulas on the Grid; Revisited.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

2021
Explicit Two-Deletion Codes With Redundancy Matching the Existential Bound.
IEEE Trans. Inf. Theory, 2021

2020
The EATCS Award 2021 - Call for Nominations.
Bull. EATCS, 2020

d-Galvin Families.
Electron. J. Comb., 2020

2019
Bounded Independence versus Symmetric Tests.
ACM Trans. Comput. Theory, 2019

Optimal Inapproximability with Universal Factor Graphs.
Electron. Colloquium Comput. Complex., 2019

Following a tangent of proofs.
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019

2018
Knuth Prize Lecture: On the Difficulty of Approximating Boolean Max-CSPs.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

2017
On the Hardness of Approximating Balanced Homogenous 3-Lin.
Theory Comput., 2017

Improved NP-Inapproximability for 2-Variable Linear Equations.
Theory Comput., 2017

An Improved Bound on the Fraction of Correctable Deletions.
IEEE Trans. Inf. Theory, 2017

Super-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long Codes.
SIAM J. Comput., 2017

(2+ε)-Sat Is NP-hard.
SIAM J. Comput., 2017

An Average-Case Depth Hierarchy Theorem for Boolean Circuits.
J. ACM, 2017

Quantum algorithms for computing short discrete logarithms and factoring RSA integers.
IACR Cryptol. ePrint Arch., 2017

On small-depth Frege proofs for Tseitin for grids.
Electron. Colloquium Comput. Complex., 2017

2016
The square lattice shuffle, correction.
Random Struct. Algorithms, 2016

An average-case depth hierarchy theorem for higher depth.
Electron. Colloquium Comput. Complex., 2016

Bounded independence vs. moduli.
Electron. Colloquium Comput. Complex., 2016

2015
Making the Long Code Shorter.
SIAM J. Comput., 2015

2014
Erratum: Polynomial Time Algorithms for Finding Integer Relations Among Real Numbers.
SIAM J. Comput., 2014

On the Correlation of Parity and Small-Depth Circuits.
SIAM J. Comput., 2014

On the NP-Hardness of Max-Not-2.
SIAM J. Comput., 2014

On DNF Approximators for Monotone Boolean Functions.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

(2 + epsilon)-Sat Is NP-Hard.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

2013
On the usefulness of predicates.
ACM Trans. Comput. Theory, 2013

Satisfying Degree-d Equations over GF[2]<sup>n</sup>.
Theory Comput., 2013

On the power of many one-bit provers.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
The Constraint Satisfaction Problem: Complexity and Approximability (Dagstuhl Seminar 12451).
Dagstuhl Reports, 2012

2011
Beating the Random Ordering Is Hard: Every Ordering CSP Is Approximation Resistant.
SIAM J. Comput., 2011

Randomly Supported Independence and Resistance.
SIAM J. Comput., 2011

Making the long code shorter, with applications to the Unique Games Conjecture.
Electron. Colloquium Comput. Complex., 2011

Satisfying Degree-d Equations over GF[2] n.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2011

2010
On the List-Decodability of Random Linear Codes.
Electron. Colloquium Comput. Complex., 2010

Approximating Linear Threshold Predicates.
Electron. Colloquium Comput. Complex., 2010

Special Issue "Conference on Computational Complexity 2009" Guest Editor's Foreword.
Comput. Complex., 2010

An Efficient Parallel Repetition Theorem.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2009
On the Approximation Resistance of a Random Predicate.
Comput. Complex., 2009

2008
Practical Construction and Analysis of Pseudo-Randomness Primitives.
J. Cryptol., 2008

Towards an Optimal Separation of Space and Length in Resolution.
Electron. Colloquium Comput. Complex., 2008

Every 2-csp Allows Nontrivial Approximation.
Comput. Complex., 2008

2007
The Randomized Communication Complexity of Set Disjointness.
Theory Comput., 2007

The Security of the IAPM and IACBC Modes.
J. Cryptol., 2007

A Smaller Sleeping Bag for a Baby Snake.
Discret. Comput. Geom., 2007

2006
The square lattice shuffle.
Random Struct. Algorithms, 2006

On Nontrivial Approximation of CSPs.
Proceedings of the Approximation, 2006

2005
Query Efficient PCPs with Perfect Completeness.
Theory Comput., 2005

2004
On the advantage over a random assignment.
Random Struct. Algorithms, 2004

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Proceedings of the Advances in Cryptology, 2004

2003
Simple analysis of graph tests for linearity and PCP.
Random Struct. Algorithms, 2003

Fitting points on the real line and its application to RH mapping.
J. Algorithms, 2003

Inapproximability Some history and some open problems.
Proceedings of the 18th Annual IEEE Conference on Computational Complexity (Complexity 2003), 2003

2002
Combinatorial bounds for list decoding.
IEEE Trans. Inf. Theory, 2002

Hardness of Approximate Hypergraph Coloring.
SIAM J. Comput., 2002

2001
On Lower Bounds for Selecting the Median.
SIAM J. Discret. Math., 2001

A Slight Sharpening of LMN.
J. Comput. Syst. Sci., 2001

Linear-Consistency Testing.
J. Comput. Syst. Sci., 2001

A New Way of Using Semidefinite Programming with Applications to Linear Equations mod p.
J. Algorithms, 2001

2000
Tight Bounds for Searching a Sorted Array of Strings.
SIAM J. Comput., 2000

On bounded occurrence constraint satisfaction.
Inf. Process. Lett., 2000

Which NP-Hard Optimization Problems Admit Non-trivial Efficient Approximation Algorithms?
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Funkspiel schemes: an alternative to conventional tamper resistance.
Proceedings of the CCS 2000, 2000

1999
A Pseudorandom Generator from any One-way Function.
SIAM J. Comput., 1999

On approximating CSP-B
Electron. Colloquium Comput. Complex., 1999

The Security of all RSA and Discrete Log Bits
Electron. Colloquium Comput. Complex., 1999

A New Way to Use Semidefinite Programming with Applications to Linear Equations mod <i>p</i>.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

1998
The Shrinkage Exponent of de Morgan Formulas is 2.
SIAM J. Comput., 1998

Monotone Circuits for Connectivity Have Depth (log <i>n</i>)<sup>2-<i>o</i>(1)</sup>.
SIAM J. Comput., 1998

Circuit Bottom Fan-In and Computational Power.
SIAM J. Comput., 1998

On the Complexity of Interactive Proofs with Bounded Communication.
Inf. Process. Lett., 1998

Some Recent Strong Inapproximability Results.
Proceedings of the Algorithm Theory, 1998

The Security of Individual RSA Bits.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998

1997
Clique is hard to approximate within n<sup>1-epsilon</sup>
Electron. Colloquium Comput. Complex., 1997

Some optimal inapproximability results
Electron. Colloquium Comput. Complex., 1997

1996
Linearity testing in characteristic two.
IEEE Trans. Inf. Theory, 1996

Analysis of Backoff Protocols for Multiple Access Channels.
SIAM J. Comput., 1996

On the Message Complexity of Interactive Proof Systems
Electron. Colloquium Comput. Complex., 1996

Testing of the Long Code and Hardness for Clique.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

1995
On the Shrinkage Exponent for Read-Once Formulae.
Theor. Comput. Sci., 1995

Top-Down Lower Bounds for Depth-Three Circuits.
Comput. Complex., 1995

Monotone circuits for connectivity have depth (log n)<sup>2-o(1)</sup> (Extended Abstract).
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

A tight lower bound for searching a sorted array.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995

1994
Optimal Depth, Very Small Size Circuits for Symmetric Functions in AC<sup>0</sup>.
Inf. Comput., February, 1994

On the Size of Weights for Threshold Gates.
SIAM J. Discret. Math., 1994

The Random Oracle Hypothesis Is False.
J. Comput. Syst. Sci., 1994

On Average Time Hierarchies.
Inf. Process. Lett., 1994

Recent Results in Hardness of Approximation.
Proceedings of the Algorithm Theory, 1994

The complexity of searching a sorted array of strings.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

1993
Addendum to "Simple Construction of Almost k-wise Independent Random Variables".
Random Struct. Algorithms, 1993

The Discrete Logarithm Modulo a Composite Hides O(n) Bits.
J. Comput. Syst. Sci., 1993

A Well-Characterized Approximation Problem.
Inf. Process. Lett., 1993

Top-Down Lower Bounds for Depth 3 Circuits
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993

The shrinkage exponent is 2
Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 1993

1992
Simple Construction of Almost k-wise Independent Random Variables.
Random Struct. Algorithms, 1992

A Simple Lower Bound for Monotone Clique Using a Communication Game.
Inf. Process. Lett., 1992

Majority Gates VS. General Weighted Threshold Gates.
Comput. Complex., 1992

1991
Relativized Perfect Zero Knowledge Is Not BPP
Inf. Comput., August, 1991

Statistical Zero-Knowledge Languages can be Recognized in Two Rounds.
J. Comput. Syst. Sci., 1991

On the Power of Small-Depth Threshold Circuits.
Comput. Complex., 1991

1990
Tensor Rank is NP-Complete.
J. Algorithms, 1990

On the power of interaction.
Comb., 1990

Pseudo-Random Generators under Uniform Assumptions
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990

Simple Constructions of Almost k-Wise Independent Random Variables
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990

Composition of the Universal Relation.
Proceedings of the Advances In Computational Complexity Theory, 1990

1989
Polynomial Time Algorithms for Finding Integer Relations among Real Numbers.
SIAM J. Comput., 1989

Optimal bounds for decision problems on the CRCW PRAM.
J. ACM, 1989

Fast Computation Using Faulty Hypercubes (Extended Abstract)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989

1988
Solving Simultaneous Modular Equations of Low Degree.
SIAM J. Comput., 1988

Reconstructing Truncated Integer Variables Satisfying Linear Congruences.
SIAM J. Comput., 1988

Dual vectors and lower bounds for the nearest lattice point problem.
Comb., 1988

Everything Provable is Provable in Zero-Knowledge.
Proceedings of the Advances in Cryptology, 1988

1987
One-Way Permutations in NC0.
Inf. Process. Lett., 1987

Does co-NP Have Short Interactive Proofs?
Inf. Process. Lett., 1987

Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987

Reconfiguring a Hypercube in the Presence of Faults (Extended Abstract)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987

Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds
Proceedings of the 28th Annual Symposium on Foundations of Computer Science, 1987

1986
Almost Optimal Lower Bounds for Small Depth Circuits
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986

1985
The Cryptographic Security of Truncated Linearly Related Variables
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985

The Bit Extraction Problem of t-Resilient Functions (Preliminary Version)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985

On Using RSA with Low Exponent in a Public Key Network.
Proceedings of the Advances in Cryptology, 1985


  Loading...