Silvio Micali
Affiliations: | Computer Science | Massachusetts Institute of Technology, Cambridge, MA, United States |
Area:
CryptographyWebsite:
https://people.csail.mit.edu/silvio/Google:
"Silvio Micali"Bio:
https://people.csail.mit.edu/silvio/CV.pdf
https://books.google.com/books?id=M3hJAQAAMAAJ
Parents
Sign in to add mentorManuel Blum | grad student | 1983 | UC Berkeley | |
(Randomness Versus Hardness) |
Children
Sign in to add traineeBonnie Berger | grad student | 1990 | MIT (Computational Biology Tree) |
Claude Crepeau | grad student | 1990 | MIT |
Phillip Rogaway | grad student | 1991 | MIT |
Mihir Bellare | grad student | 1988-1991 | MIT |
Rafail Ostrovsky | grad student | 1992 | MIT |
Leonid Reyzin | grad student | 2001 | MIT |
Rafael Pass | grad student | 2006 | MIT |
Alessandro Chiesa | grad student | 2014 | MIT |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Chen J, Micali S. (2019) Algorand: A secure and efficient distributed ledger Theoretical Computer Science. 777: 155-183 |
Chiesa A, Micali S, Zhu ZA. (2015) Knightian Analysis of the Vickrey Mechanism Econometrica. 83: 1727-1754 |
Micali S, Rabin MO. (2014) Cryptography miracles, secure auctions, matching problem verification Communications of the Acm. 57: 85-93 |
Micali S, Reyzin L. (2002) Improving the exact security of digital signature schemes Journal of Cryptology. 15: 1-18 |
Kilian J, Kushilevitz E, Micali S, et al. (2000) Reducibility and Completeness in Private Computations Siam Journal On Computing. 29: 1189-1208 |
Micali S. (2000) Computationally Sound Proofs Siam Journal On Computing. 30: 1253-1298 |
Micali S, Reyzin L. (1999) Improving the Exact Security of Fiat-Shamir Signature Schemes Lecture Notes in Computer Science. 167-182 |
Feldman P, Micali S. (1997) An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement Siam Journal On Computing. 26: 873-933 |
Fischer MJ, Micali S, Rackoff C. (1996) A secure protocol for the oblivious transfer (extended abstract) Journal of Cryptology. 9: 191-195 |
Bellare M, Micali S. (1992) How to sign given any trapdoor permutation Journal of the Acm. 39: 214-233 |