{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:22:27Z","timestamp":1772641347263,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,1,8]],"date-time":"2012-01-08T00:00:00Z","timestamp":1325980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0832797CCF-1016565DMS-0835373"],"award-info":[{"award-number":["CCF-0832797CCF-1016565DMS-0835373"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000121","name":"Division of Mathematical Sciences","doi-asserted-by":"publisher","award":["CCF-0832797CCF-1016565DMS-0835373"],"award-info":[{"award-number":["CCF-0832797CCF-1016565DMS-0835373"]}],"id":[{"id":"10.13039\/100000121","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,1,8]]},"DOI":"10.1145\/2090236.2090239","type":"proceedings-article","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T17:02:17Z","timestamp":1326214937000},"page":"19-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Restriction access"],"prefix":"10.1145","author":[{"given":"Zeev","family":"Dvir","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Anup","family":"Rao","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Avi","family":"Wigderson","sequence":"additional","affiliation":[{"name":"Institute for Advanced Study, Princeton, NJ"}]},{"given":"Amir","family":"Yehudayoff","sequence":"additional","affiliation":[{"name":"Technion - IIT, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2012,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Applied Mathematics Series","volume-title":"Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables","author":"Abramowitz M.","year":"1964","unstructured":"M. Abramowitz and I. A. Stegun , editors . Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables , volume 55 of Applied Mathematics Series . National Bureau of Standards, Washington, D. C. , 1964 . Reprinted by Dover , New York. M. Abramowitz and I. A. Stegun, editors. Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables, volume 55 of Applied Mathematics Series. National Bureau of Standards, Washington, D. C., 1964. Reprinted by Dover, New York."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/0210030"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0168-0072(83)90038-6"},{"key":"e_1_3_2_1_5_1","volume-title":"Design Principles of Biological Circuits","author":"Alon U.","year":"2006","unstructured":"U. Alon . An Introduction to Systems Biology : Design Principles of Biological Circuits . CRCpress , 2006 . U. Alon. An Introduction to Systems Biology: Design Principles of Biological Circuits. CRCpress, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132516.1132600"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/138027.138061"},{"key":"e_1_3_2_1_8_1","first-page":"66","article-title":"Propositional proof complexity: Past, present, future","volume":"65","author":"Beame P.","year":"1998","unstructured":"P. Beame and T. Pitassi . Propositional proof complexity: Past, present, future . Bulletin of the EATCS , 65 : 66 -- 89 , June 1998 . P. Beame and T. Pitassi. Propositional proof complexity: Past, present, future. Bulletin of the EATCS, 65:66--89, June 1998.","journal-title":"Bulletin of the EATCS"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365687"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology -- CRYPTO '","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-based encryption from the Weil Pairing . In J. Kilian, editor, Advances in Cryptology -- CRYPTO ' 2001 , volume 2139 of Lecture Notes in Computer Science , pages 213 -- 229 . International Association for Cryptologic Research, Springer-Verlag, Berlin Germany , 2001. D. Boneh and M. Franklin. Identity-based encryption from the Weil Pairing. In J. Kilian, editor, Advances in Cryptology -- CRYPTO ' 2001, volume 2139 of Lecture Notes in Computer Science, pages 213--229. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(89)90001-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01744431"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-5401(02)00030-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009268"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/174644.174647"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2003.07.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. C.\n      Kocher J.\n      Jaffe and \n      B.\n      Jun\n  . \n  Differential power analysis\n  . In M. J. Wiener editor CRYPTO volume \n  1666\n   of \n  Lecture Notes in Computer Science pages \n  388\n  --\n  397\n  . \n  Springer 1999\n  .   P. C. Kocher J. Jaffe and B. Jun. Differential power analysis. In M. J. Wiener editor CRYPTO volume 1666 of Lecture Notes in Computer Science pages 388--397. Springer 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_20_1","volume-title":"Synthesis of circuits from threshold logic elements. Soviet Mathematics -- Doklady, 5(1):163--166","author":"Neciporuk E.","year":"1964","unstructured":"E. Neciporuk . Synthesis of circuits from threshold logic elements. Soviet Mathematics -- Doklady, 5(1):163--166 , 1964 . E. Neciporuk. Synthesis of circuits from threshold logic elements. Soviet Mathematics -- Doklady, 5(1):163--166, 1964."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646803.705980"},{"key":"e_1_3_2_1_22_1","volume-title":"Realizations of linear functions by formulas using +,*,-. Soviet Mathematics -- Doklady","author":"Subbotovskaya B. A.","year":"1961","unstructured":"B. A. Subbotovskaya . Realizations of linear functions by formulas using +,*,-. Soviet Mathematics -- Doklady , 1961 . B. A. Subbotovskaya. Realizations of linear functions by formulas using +,*,-. Soviet Mathematics -- Doklady, 1961."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"}],"event":{"name":"ITCS '12: Innovations in Theoretical Computer Science","location":"Cambridge Massachusetts","acronym":"ITCS '12","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 3rd Innovations in Theoretical Computer Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2090236.2090239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:45Z","timestamp":1750241205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2090236.2090239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,8]]},"references-count":23,"alternative-id":["10.1145\/2090236.2090239","10.1145\/2090236"],"URL":"https:\/\/doi.org\/10.1145\/2090236.2090239","relation":{},"subject":[],"published":{"date-parts":[[2012,1,8]]},"assertion":[{"value":"2012-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}