Name
Papers
Collaborators
MICHAEL O. RABIN
57
45
Citations 
PageRank 
Referers 
3471
3060.62
5069
Referees 
References 
466
392
Search Limit
1001000
Title
Citations
PageRank
Year
Cryptography miracles, secure auctions, matching problem verification20.362014
Strictly-black-box zero-knowledge and efficient validation of financial transactions50.462012
Never too early to begin: computer science for high-school students00.342012
An interview with Michael Rabin00.342010
Cryptographic Combinatorial Clock-Proxy Auctions10.372009
DISC 20th Anniversary: Invited Talk Provably Unbreakable Hyper-Encryption Using Distributed Systems00.342007
Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications80.502007
How To Exchange Secrets with Oblivious Transfer.16134.762005
Provably unbreakable hyper-encryption in the limited access model70.672005
Identity-based zero-knowledge10.352004
Zero-knowledge sets893.072003
Online Scheduling of Parallel Programs on Heterogeneous Systems with Applications to Cilk361.872002
Hyper Encryption and Everlasting Secrets10.382002
Everlasting security in the bounded storage model694.512002
Scheduling Cilk multithreaded parallel programs on processors of different speeds161.672000
Verifiable random functions1335.241999
Linear-consistency testing70.891999
Information Theoretically Secure Communication in the Limited Storage Space Model382.181999
Lower Bounds for Randomized Mutual Exclusion70.871998
Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract)192.231998
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography20110.631998
Hashing on Strings, Cryptography, and Protection of Privacy10.401997
Correctness of Programs and Protocols through Randomization (Extended Abstract)00.341997
Computationally Hard Algebraic Problems (extended abstract)00.341996
Parallel processing on networks of workstations: a fault-tolerant, high performance approach253.801995
On Lotteries with Unique Winners20.861995
Clock construction in fully asynchronous parallel systems and PRAM simulation271.721994
Highly efficient asynchronous execution of large-grained parallel programs254.861993
Clock Construction in Fully Asynchronous Parallel Systems and PRAM Simulation (Extended Abstract)101.041992
Efficient program transformations for resilient parallel computation via randomization (preliminary version)201.081992
Randomized mutual exclusion algorithms revisited202.581992
Dependable Parallel Computing by Randomization (Abstract)00.341992
Set systems with no union of cardinality 0 modulo<Emphasis Type="Italic">m</Emphasis>30.661991
Biased coins and randomized algorithms61.501989
Efficient dispersal of information for security, load balancing, and fault tolerance423138.881989
ITOSS: an integrated toolkit for operating systems security44.061989
Maximum matchings in general graphs through randomization5312.831989
Achieving independence in logarithmic number of rounds239.181987
A logic to reason about likelihood4017.861987
Efficient randomized pattern-matching algorithms38858.801987
Randomized byzantine generals18867.181983
Transaction protection by beacons6119.991983
N-Process mutual exclusion with bounded waiting by 4 · Log2 N-valued shared variable253.561982
The choice coordination problem6125.921982
On the advantages of free choice: a symmetric and fully distributed solution to the dining philosophers problem11039.171981
N-Process Synchronization by 4 log _2 N-Valued Shared Variables720.481980
PROBABILISTIC ALGORITHM IN FINITE FIELDS8152.271980
A characterization of the power of vector machines2636.441974
Theoretical Impediments to Artificial Intelligence1914.961974
Solving linear equations by means of scalar products219.771972
  • 1
  • 2