Search the dblp DataBase
Silvio Micali :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Baruch Awerbuch , Silvio Micali Dynamic deadlock resolution protocols (Extended Abstract) [Citation Graph (3, 0)][DBLP ] FOCS, 1986, pp:196-207 [Conf ] Moses Liskov , Anna Lysyanskaya , Silvio Micali , Leonid Reyzin , Adam Smith Mutually Independent Commitments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:385-401 [Conf ] Silvio Micali , Kazuo Ohta , Leonid Reyzin Accountable-subgroup multisignatures: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:245-254 [Conf ] Silvio Micali , Leonid Reyzin Improving the Exact Security of Fiat-Shamir Signature Schemes. [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:167-182 [Conf ] Mihir Bellare , Silvio Micali How To Sign Given Any Trapdoor Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:200-215 [Conf ] Mihir Bellare , Silvio Micali Non-Interactive Oblivious Transfer and Spplications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:547-557 [Conf ] Manuel Blum , Paul Feldman , Silvio Micali Proving Security Against Chosen Cyphertext Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:256-268 [Conf ] Michael Ben-Or , Oded Goldreich , Shafi Goldwasser , Johan Håstad , Joe Kilian , Silvio Micali , Phillip Rogaway Everything Provable is Provable in Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:37-56 [Conf ] Amos Beimel , Tal Malkin , Silvio Micali The All-or-Nothing Nature of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:80-97 [Conf ] Yevgeniy Dodis , Silvio Micali Parallel Reducibility for Information-Theoretically Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:74-92 [Conf ] Shimon Even , Oded Goldreich , Silvio Micali On-Line/Off-Line Digital Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:263-275 [Conf ] Oded Goldreich , Shafi Goldwasser , Silvio Micali On the Cryptographic Applications of Random Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:276-288 [Conf ] Oded Goldreich , Silvio Micali , Avi Wigderson How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:171-185 [Conf ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A "Paradoxical'"Solution to the Signature Problem (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:467- [Conf ] Shai Halevi , Silvio Micali Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:201-215 [Conf ] Jonathan Herzog , Moses Liskov , Silvio Micali Plaintext Awareness via Key Registration. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:548-564 [Conf ] Joe Kilian , Silvio Micali , Rafail Ostrovsky Minimum Resource Zero-Knowledge Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:545-546 [Conf ] Silvio Micali Fair Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:113-138 [Conf ] Silvio Micali , Leonid Reyzin Soundness in the Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:542-565 [Conf ] Silvio Micali , Tal Rabin Collective Coin Tossing Without Assumptions nor Broadcasting. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:253-266 [Conf ] Silvio Micali , Phillip Rogaway Secure Computation (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:392-404 [Conf ] Silvio Micali , Charles Rackoff , Bob Sloan The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:381-392 [Conf ] Silvio Micali , Claus-Peter Schnorr Efficient, Perfect Random Number Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:173-198 [Conf ] Silvio Micali , Adi Shamir An Improvement of the Fiat-Shamir Identification and Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:244-247 [Conf ] Silvio Micali , Ray Sidney A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:185-196 [Conf ] Frank Thomson Leighton , Silvio Micali Secret-Key Agreement without Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:456-479 [Conf ] Alfredo De Santis , Silvio Micali , Giuseppe Persiano Non-Interactive Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:52-72 [Conf ] Alfredo De Santis , Silvio Micali , Giuseppe Persiano Non-Interactive Zero-Knowledge with Preprocessing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:269-282 [Conf ] Shafi Goldwasser , Silvio Micali , Andrew Chi-Chih Yao On Signatures and Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:211-215 [Conf ] Silvio Micali , Ronald L. Rivest Micropayments Revisited. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:149-163 [Conf ] Silvio Micali , Ronald L. Rivest Transitive Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:236-243 [Conf ] Markus Jakobsson , Frank Thomson Leighton , Silvio Micali , Michael Szydlo Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:314-326 [Conf ] Mihir Bellare , Alexandra Boldyreva , Silvio Micali Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:259-274 [Conf ] Mihir Bellare , Marc Fischlin , Shafi Goldwasser , Silvio Micali Identification Protocols Secure against Reset Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:495-511 [Conf ] Christian Cachin , Silvio Micali , Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:402-414 [Conf ] Yevgeniy Dodis , Silvio Micali Lower Bounds for Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:42-55 [Conf ] Rosario Gennaro , Silvio Micali Verifiable Secret Sharing as Secure Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:168-182 [Conf ] Anna Lysyanskaya , Silvio Micali , Leonid Reyzin , Hovav Shacham Sequential Aggregate Signatures from Trapdoor Permutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:74-90 [Conf ] Silvio Micali , Leonid Reyzin Min-round Resettable Zero-Knowledge in the Public-Key Model. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:373-393 [Conf ] Moses Liskov , Silvio Micali Amortized E-Cash. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:1-20 [Conf ] Manuel Blum , Silvio Micali How to Generate Cryptographically Strong Sequences of Pseudo Random Bits [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:112-117 [Conf ] Benny Chor , Shafi Goldwasser , Silvio Micali , Baruch Awerbuch Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:383-395 [Conf ] Paul Feldman , Silvio Micali Byzantine Agreement in Constant Expected Time (and Trusting No One) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:267-276 [Conf ] Zvi Galil , Silvio Micali , Harold N. Gabow Priority Queues with Variable Priority and an O(EV log V) Algorithm for Finding a Maximal Weighted Matching in General Graphs [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:255-261 [Conf ] Oded Goldreich , Shafi Goldwasser , Silvio Micali How to Construct Random Functions (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1984, pp:464-479 [Conf ] Oded Goldreich , Silvio Micali , Avi Wigderson Proofs that Yield Nothing But their Validity and a Methodology of Cryptographic Protocol Design (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1986, pp:174-187 [Conf ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A ``Paradoxical'' Solution to the Signature Problem (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1984, pp:441-448 [Conf ] Shafi Goldwasser , Silvio Micali , Po Tong Why and How to Establish a Private Code on a Public Network (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:134-144 [Conf ] Sergei Izmalkov , Silvio Micali , Matt Lepinski Rational Secure Computation and Ideal Mechanism Design. [Citation Graph (0, 0)][DBLP ] FOCS, 2005, pp:585-595 [Conf ] Joe Kilian , Silvio Micali , Rafail Ostrovsky Minimum Resource Zero-Knowledge Proofs (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1989, pp:474-479 [Conf ] Eyal Kushilevitz , Silvio Micali , Rafail Ostrovsky Reducibility and Completeness in Multi-Party Private Computations [Citation Graph (0, 0)][DBLP ] FOCS, 1994, pp:478-489 [Conf ] Michael Luby , Silvio Micali , Charles Rackoff How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin [Citation Graph (0, 0)][DBLP ] FOCS, 1983, pp:11-21 [Conf ] Silvio Micali CS Proofs (Extended Abstracts) [Citation Graph (0, 0)][DBLP ] FOCS, 1994, pp:436-453 [Conf ] Silvio Micali , Michael O. Rabin , Joe Kilian Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP ] FOCS, 2003, pp:80-91 [Conf ] Silvio Micali , Michael O. Rabin , Salil P. Vadhan Verifiable Random Functions. [Citation Graph (0, 0)][DBLP ] FOCS, 1999, pp:120-130 [Conf ] Silvio Micali , Vijay V. Vazirani An O(sqrt(|v|) |E|) Algorithm for Finding Maximum Matching in General Graphs [Citation Graph (0, 0)][DBLP ] FOCS, 1980, pp:17-27 [Conf ] Silvio Micali , Rafael Pass , Alon Rosen Input-Indistinguishable Computation. [Citation Graph (0, 0)][DBLP ] FOCS, 2006, pp:367-378 [Conf ] Michael Ben-Or , Oded Goldreich , Silvio Micali , Ronald L. Rivest A Fair Protocol for Signing Contracts (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICALP, 1985, pp:43-52 [Conf ] Paul Feldman , Silvio Micali An Optimal Probabilistic Algorithm For Synchronous Byzantine Agreement. [Citation Graph (0, 0)][DBLP ] ICALP, 1989, pp:341-378 [Conf ] Rosario Gennaro , Silvio Micali Independent Zero-Knowledge Sets. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:34-45 [Conf ] Silvio Micali "Perfect" Pseudo-Random Number Generation. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:121-126 [Conf ] Oded Goldreich , Silvio Micali , Avi Wigderson Proofs that Release Minimum Knowledge. [Citation Graph (0, 0)][DBLP ] MFCS, 1986, pp:639-650 [Conf ] Silvio Micali Computationally-Sound Checkers. [Citation Graph (0, 0)][DBLP ] MFCS, 1998, pp:94-116 [Conf ] Matt Lepinski , Silvio Micali , Chris Peikert , Abhi Shelat Completely fair SFE and coalition-safe cheap talk. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:1-10 [Conf ] Silvio Micali Simple and fast optimistic protocols for fair electronic exchange. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:12-19 [Conf ] Donald Beaver , Silvio Micali , Phillip Rogaway The Round Complexity of Secure Protocols (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1990, pp:503-513 [Conf ] Mihir Bellare , Silvio Micali How to Sign Given Any Trapdoor Function (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1988, pp:32-42 [Conf ] Mihir Bellare , Silvio Micali , Rafail Ostrovsky Perfect Zero-Knowledge in Constant Rounds [Citation Graph (0, 0)][DBLP ] STOC, 1990, pp:482-493 [Conf ] Mihir Bellare , Silvio Micali , Rafail Ostrovsky The (True) Complexity of Statistical Zero Knowledge [Citation Graph (0, 0)][DBLP ] STOC, 1990, pp:494-502 [Conf ] Manuel Blum , Paul Feldman , Silvio Micali Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1988, pp:103-112 [Conf ] Ran Canetti , Oded Goldreich , Shafi Goldwasser , Silvio Micali Resettable zero-knowledge (extended abstract). [Citation Graph (0, 0)][DBLP ] STOC, 2000, pp:235-244 [Conf ] Paul Feldman , Silvio Micali Optimal Algorithms for Byzantine Agreement [Citation Graph (0, 0)][DBLP ] STOC, 1988, pp:148-161 [Conf ] Oded Goldreich , Silvio Micali , Avi Wigderson How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority [Citation Graph (0, 0)][DBLP ] STOC, 1987, pp:218-229 [Conf ] Shafi Goldwasser , Silvio Micali Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information [Citation Graph (0, 0)][DBLP ] STOC, 1982, pp:365-377 [Conf ] Shafi Goldwasser , Silvio Micali , Charles Rackoff The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1985, pp:291-304 [Conf ] Shafi Goldwasser , Silvio Micali , Andrew Chi-Chih Yao Strong Signature Schemes [Citation Graph (0, 0)][DBLP ] STOC, 1983, pp:431-439 [Conf ] Matt Lepinski , Silvio Micali , Abhi Shelat Collusion-free protocols. [Citation Graph (0, 0)][DBLP ] STOC, 2005, pp:543-552 [Conf ] Silvio Micali , Rafael Pass Local zero knowledge. [Citation Graph (0, 0)][DBLP ] STOC, 2006, pp:306-315 [Conf ] Silvio Micali Knowledge and Efficient Computation. [Citation Graph (0, 0)][DBLP ] TARK, 1986, pp:353-362 [Conf ] Rosario Gennaro , Anna Lysyanskaya , Tal Malkin , Silvio Micali , Tal Rabin Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:258-277 [Conf ] Matt Lepinski , Silvio Micali , Abhi Shelat Fair-Zero Knowledge. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:245-263 [Conf ] Silvio Micali , Chris Peikert , Madhu Sudan , David A. Wilson Optimal Error Correction Against Computationally Bounded Noise. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:1-16 [Conf ] Silvio Micali , Leonid Reyzin Physically Observable Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:278-296 [Conf ] Oded Goldreich , Shafi Goldwasser , Silvio Micali Interleaved Zero-Knowledge in the Public-Key Model. [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:24, pp:- [Journal ] Ran Canetti , Oded Goldreich , Shafi Goldwasser , Silvio Micali Resettable Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:, n:42, pp:- [Journal ] Silvio Micali Two-Way Deterministic Finite Automata are Exponentially More Succinct Than Sweeping Automata. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1981, v:12, n:2, pp:103-105 [Journal ] Mihir Bellare , Silvio Micali How to Sign Given Any Trapdoor Permutation. [Citation Graph (0, 0)][DBLP ] J. ACM, 1992, v:39, n:1, pp:214-233 [Journal ] Oded Goldreich , Shafi Goldwasser , Silvio Micali How to construct random functions. [Citation Graph (0, 0)][DBLP ] J. ACM, 1986, v:33, n:4, pp:792-807 [Journal ] Oded Goldreich , Silvio Micali , Avi Wigderson Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] J. ACM, 1991, v:38, n:3, pp:691-729 [Journal ] Shafi Goldwasser , Silvio Micali Probabilistic Encryption. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1984, v:28, n:2, pp:270-299 [Journal ] Shimon Even , Oded Goldreich , Silvio Micali On-Line/Off-Line Digital Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:1, pp:35-67 [Journal ] Michael J. Fischer , Silvio Micali , Charles Rackoff A Secure Protocol for the Oblivious Transfer (Extended Abstract). [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:3, pp:191-195 [Journal ] Silvio Micali , Leonid Reyzin Improving the Exact Security of Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:1, pp:1-18 [Journal ] Silvio Micali , Claus-Peter Schnorr Efficient, Perfect Polynomial Random Number Generators. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:3, n:3, pp:157-172 [Journal ] Corrado Böhm , Silvio Micali Minimal Forms in lambda-Calculus Computations. [Citation Graph (0, 0)][DBLP ] J. Symb. Log., 1980, v:45, n:1, pp:165-171 [Journal ] Manuel Blum , Silvio Micali How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1984, v:13, n:4, pp:850-864 [Journal ] Manuel Blum , Alfredo De Santis , Silvio Micali , Giuseppe Persiano Noninteractive Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1991, v:20, n:6, pp:1084-1118 [Journal ] Pesech Feldman , Silvio Micali An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1997, v:26, n:4, pp:873-933 [Journal ] Zvi Galil , Silvio Micali , Harold N. Gabow An O(EV log V) Algorithm for Finding a Maximal Weighted Matching in General Graphs. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1986, v:15, n:1, pp:120-130 [Journal ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:281-308 [Journal ] Shafi Goldwasser , Silvio Micali , Charles Rackoff The Knowledge Complexity of Interactive Proof Systems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1989, v:18, n:1, pp:186-208 [Journal ] Joe Kilian , Eyal Kushilevitz , Silvio Micali , Rafail Ostrovsky Reducibility and Completeness in Private Computations. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2000, v:29, n:4, pp:1189-1208 [Journal ] Silvio Micali Computationally Sound Proofs. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2000, v:30, n:4, pp:1253-1298 [Journal ] Silvio Micali , Charles Rackoff , Bob Sloan The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:412-426 [Journal ] Michael Ben-Or , Oded Goldreich , Silvio Micali , Ronald L. Rivest A fair protocol for signing contracts. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:40-46 [Journal ] Online-Untransferable Signatures. [Citation Graph (, )][DBLP ] A new approach to auctions and resilient mechanism design. [Citation Graph (, )][DBLP ] Verifiably Secure Devices. [Citation Graph (, )][DBLP ] Purely Rational Secret Sharing (Extended Abstract). [Citation Graph (, )][DBLP ] Robustly Leveraging Collusion in Combinatorial Auctions. [Citation Graph (, )][DBLP ] Robust Perfect Revenue From Perfectly Informed Players. [Citation Graph (, )][DBLP ] Search in 0.036secs, Finished in 0.040secs