Michael Luby
Information theorist and cryptographer
Michael Luby's AcademicInfluence.com Rankings
Download Badge
Computer Science
Michael Luby's Degrees
- PhD Theoretical Computer Science University of California, Berkeley
- Bachelors Applied Mathematics Massachusetts Institute of Technology
Why Is Michael Luby Influential?
(Suggest an Edit or Addition)According to Wikipedia, Michael George Luby is a mathematician and computer scientist, CEO of BitRipple, senior research scientist at the International Computer Science Institute , former VP Technology at Qualcomm, co-founder and former chief technology officer of Digital Fountain. In coding theory he is known for leading the invention of the Tornado codes and the LT codes. In cryptography he is known for his contributions showing that any one-way function can be used as the basis for private cryptography, and for his analysis, in collaboration with Charles Rackoff, of the Feistel cipher construction. His distributed algorithm to find a maximal independent set in a computer network has also been influential.
Michael Luby's Published Works
Published Works
- LT codes (2002) (2943)
- A Pseudorandom Generator from any One-way Function (1999) (1534)
- A simple parallel algorithm for the maximal independent set problem (1985) (1448)
- A digital fountain approach to reliable distribution of bulk data (1998) (1388)
- Efficient erasure correcting codes (2001) (1237)
- How to Construct Pseudorandom Permutations from Pseudorandom Functions (1988) (974)
- Self-testing/correcting with applications to numerical problems (1990) (964)
- Improved low-density parity-check codes using irregular graphs (2001) (842)
- Practical loss-resilient codes (1997) (796)
- Approximating Probabilistic Inference in Bayesian Belief Networks is NP-Hard (1993) (760)
- Priority encoding transmission (1994) (705)
- Pseudo-random generation from one-way functions (1989) (663)
- A digital fountain approach to asynchronous reliable multicast (2002) (627)
- Optimal speedup of Las Vegas algorithms (1993) (556)
- An XOR-based erasure-resilient coding scheme (1995) (472)
- Competitive Paging Algorithms (1991) (463)
- Pseudorandomness and cryptographic applications (1996) (411)
- One-way functions are essential for complexity based cryptography (1989) (397)
- Monte-Carlo Approximation Algorithms for Enumeration Problems (1989) (350)
- Analysis of low density codes and improved designs using irregular graphs (1998) (344)
- Analysis of random processes via And-Or tree evaluation (1998) (344)
- Monte-Carlo algorithms for enumeration and reliability problems (1983) (337)
- Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads (1999) (331)
- Raptor Forward Error Correction Scheme for Object Delivery (2007) (321)
- Network decomposition and locality in distributed computation (1989) (320)
- An optimal algorithm for Monte Carlo estimation (1995) (276)
- Reliable Multimedia Download Delivery in Cellular Broadcast Networks (2007) (247)
- On the theory of average case complexity (1989) (241)
- PGM Reliable Transport Protocol Specification (2001) (237)
- FLID-DL: congestion control for layered multicast (2000) (226)
- Efficient PRAM simulation on a distributed memory machine (1992) (226)
- FLUTE - File Delivery over Unidirectional Transport (2012) (220)
- Markov chain algorithms for planar lattice structures (1995) (210)
- Removing randomness in parallel computation without a processor penalty (1988) (207)
- A parallel approximation algorithm for positive linear programming (1993) (206)
- RaptorQ Forward Error Correction Scheme for Object Delivery (2011) (202)
- Construction of a pseudo-random generator from any one-way function (1989) (201)
- Security of blind digital signatures (1997) (190)
- Raptor codes for reliable download delivery in wireless broadcast systems (2006) (187)
- Pseudo-random Generation from one-way functions (Extended Abstracts) (1989) (180)
- On the existence of pseudorandom generators (1988) (173)
- The Use of Forward Error Correction (FEC) in Reliable Multicast (2002) (171)
- Improved low-density parity-check codes using irregular graphs and belief propagation (1998) (166)
- Combinatorial Bounds for Broadcast Encryption (1998) (159)
- Security of Blind Digital Signatures (Extended Abstract) (1997) (156)
- Forward Error Correction (FEC) Building Block (2002) (154)
- A linear time erasure-resilient code with nearly optimal recovery (1996) (149)
- Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer (2001) (123)
- Asynchronous Layered Coding (ALC) Protocol Instantiation (2002) (122)
- An Optimal Approximation Algorithm for Bayesian Inference (1997) (121)
- Pairwise Independence and Derandomization (2006) (116)
- Fine-grained layered multicast (2001) (115)
- Deriving and Validating User Experience Model for DASH Video Streaming (2015) (114)
- Finite length analysis of LT codes (2004) (114)
- How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) (1985) (110)
- A probabilistic analysis of multidimensional bin packing problems (1984) (99)
- Fast convergence of the Glauber dynamics for sampling independent sets (1999) (99)
- Wave and equation based rate control using multicast round trip time (2002) (96)
- A Monte-Carlo Algorithm for Estimating the Permanent (1993) (96)
- The Reliable Multicast Design Space for Bulk Data Transfer (2000) (93)
- Linear time erasure codes with nearly optimal recovery (1995) (92)
- How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin (1983) (90)
- Approximations of general independent distributions (1992) (85)
- Approximating the Permanent of Graphs with Large Factors (1992) (81)
- Monte-Carlo algorithms for the planar multiterminal network reliability problem (1985) (81)
- Deterministic approximate counting of depth-2 circuits (1993) (80)
- On deterministic approximation of DNF (1991) (79)
- Pseudo-random permutation generators and cryptographic composition (1986) (75)
- Randomization and Approximation Techniques in Computer Science (2002) (72)
- Layered Coding Transport (LCT) Building Block (2002) (67)
- User Experience Modeling for DASH Video (2013) (65)
- Efficient approximation of product distributions (1998) (64)
- Efficient construction of a small hitting set for combinatorial rectangles in high dimension (1993) (61)
- Application Layer Forward Error Correction for Mobile Multimedia Broadcasting (2008) (61)
- Verification-based decoding for packet-based low-density parity-check codes (2005) (61)
- Polytopes, permanents and graphs with large factors (1988) (57)
- IPTV Systems, Standards and Architectures: Part II - Application Layer FEC In IPTV Services (2008) (56)
- Approximately counting up to four (extended abstract) (1997) (52)
- Optimal Parallelization of Las Vegas Algorithms (1994) (49)
- Mobile data broadcasting over MBMS tradeoffs in forward error correction (2006) (47)
- Application Layer FEC in IPTV Services (2008) (45)
- A bidirectional shortest-path algorithm with good average-case behavior (1989) (42)
- Non‐Abelian homomorphism testing, and distributions close to their self‐convolutions (2008) (38)
- Parallel search for maximal independence given minimal dependence (1990) (36)
- Wave and Equation Based Rate Control (WEBRC) Building Block (2004) (34)
- On ~ competitive algorithms for paging problems (1991) (34)
- Program Result Checking against Adaptive Programs and in Cryptographic Settings (1989) (33)
- Scheduling open shops with parallel machines (1982) (33)
- Steepest Descent Can Take Exponential Time for Symmetric Connection Networks (1988) (32)
- Tight bounds for dynamic storage allocation (1994) (32)
- Tornado Codes: Practical Erasure Codes Based on Random Irregular Graphs (1998) (29)
- A Scalable and Reliable Paradigm for Media on Demand (2001) (27)
- Approximating the number of zeroes of a GF[2] polynomial (1991) (26)
- High-Quality Video Distribution using Power Line Communication and Aplication Layer Forward Error Correction (2007) (26)
- A study of password security (1987) (25)
- Raptor Forward Error Correction (FEC) Schemes for FECFRAME (2012) (25)
- At Least (1994) (25)
- Velickovic approximations of general independent distributions (1992) (25)
- Markov Chain Algorithms for Planar Lattice Structures (Extended Abstract). (1995) (25)
- PET - priority encoding transmission (1995) (24)
- Fast, Reliable Data Transport (2003) (22)
- Asymptotically Good Codes Correcting Insertions, Deletions, and Transpositions (1999) (21)
- Pubic Randomness in Cryptography (1992) (21)
- Compact Forward Error Correction (FEC) Schemes (2004) (20)
- Liquid Cloud Storage (2017) (20)
- Grid Geometries Which Preserve Properties of Euclidean Geometry: A Study of Graphics Line Drawing Algorithms (1988) (18)
- PET—priority encoding transmission (video): a new, robust and efficient video broadcast technology (1995) (18)
- Dash in mobile networks and services (2012) (17)
- A Simple Parallel Algorithm for Finding a Satisfying Truth Assignment to a 2-CNF Formula (1988) (16)
- PET - Priority Encoding Transmission: A New, Robust and Efficient Video Broadcast Technology (Video). (1995) (16)
- RFC3208: PGM Reliable Transport Protocol Specification (2001) (16)
- Feedback-free multicast prefix protocols (1998) (16)
- Optimal Speedup of Las Vegas Algorithms y (2019) (15)
- Pairwise Independence and Derandomization (Foundations and Trends(R) in Theoretical Computer Science) (2006) (14)
- RFC 3451: Layered Coding Transport (LCT) Building Block (2002) (13)
- Monte-carlo methods for estimating system reliability (1983) (13)
- A modular analysis of network transmission protocols (1997) (12)
- An Optimal Algorithm for Monte Carlo Estimation (Extended Abstract). (1995) (12)
- Best practices for mobile broadcast delivery and playback of multimedia content (2012) (12)
- Fine-grained Layered multicast with STAIR (2006) (12)
- The use of Forward Error Correction in Reliable Multicast (2001) (10)
- Finding Shortest Paths in Very Large Networks (1983) (10)
- RFC3452: Forward Error Correction (FEC) Building Block (2002) (10)
- Verification Codes (2002) (10)
- Repeat-accumulate codes that approach the Gilbert-Varshamov bound (2005) (9)
- AL-FEC for Improved Mobile Reception of MPEG-2 DVB-T Transport Streams (2009) (9)
- FLUTE - File Delivery over Unidirectional Transport", RFC 3926 (2004) (8)
- Reliable Multicast Transport Building Block: Layered Congestion Control (2000) (8)
- On the Theory of Average Case Complexity (abstract) (1989) (7)
- Verification decoding of raptor codes (2005) (7)
- RFC3450: Asynchronous Layered Coding (ALC) Protocol Instantiation (2002) (7)
- ARA: A Wireless Living Lab Vision for Smart and Connected Rural Communities (2022) (7)
- RTP Payload Format for Raptor Forward Error Correction (FEC) (2012) (6)
- A New Monte-Carlo Method for Estimating the Failure Probability of an (1983) (6)
- Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science (1997) (5)
- Pseudo-random Generators from One-way Functions (Abstract) (1991) (5)
- Erasure Codes with a Hierarchical Bundle Structure (2017) (5)
- A digital fountain retrospective (2019) (5)
- Learning from partial correction (2017) (5)
- Approximating the Number of Solutions of a {\ G F [ 2 ]} Polynomial (1990) (4)
- A Bidirectional Shortest-Path Algorithm With Good Average-Case Behavior (Preliminary Version) (1985) (4)
- On the Existence of Pseudorandom Generators (Extended Abstract) (1988) (3)
- Traffic Jams on the Internet (1998) (3)
- Verification Codes : Simple Low-Density Parity-Check Codes for Large Alphabets (2002) (3)
- Capacity bounds for distributed storage (2016) (3)
- A survey for approximation algorithms for the permanent (1990) (3)
- Reliable Multicast Transport Building Block: Multirate Congestion Control (2000) (3)
- Repair Rate Lower Bounds for Distributed Storage (2020) (2)
- Parallel Asynchronous Connected Components in a Mesh (1991) (2)
- DVB Application Layer FEC in IPTV Services (2008) (2)
- On -Dual Binary Codes (2007) (2)
- Slepian-Wolf type problems on the erasure channel (2011) (2)
- Routing and Job-shop Scheduling in O(congestion (1996) (2)
- Liquid Data Networking (2020) (2)
- Coding theory for scalable media delivery (2014) (1)
- The Second Part of the next Claim Follows from a Standard Application of Chernoo Bounds. B General Commodity Testing (1999) (1)
- Randomization and approximation techniques in computer science : Second International Workshop, RANDOM '98, Barcelona, Spain, October 8-10, 1998 : proceedings (1998) (1)
- inear Time Erasure- esilient ith Nearly Optimal Recovery (1996) (1)
- Distributed storage algorithms with optimal tradeoffs (2021) (1)
- Traffic jams on the Internet [4] (multiple letters) (1998) (1)
- SOPI design and analysis for LDN (2020) (1)
- Real-Time Transport Object Delivery over Unidirectional Transport (ROUTE) (2022) (1)
- Keynote 1: Converged Internet and Broadcast media delivery (2015) (1)
- Interacting agents for local search (1999) (0)
- Consider the Source: Developing Primary Research Articles within an Educational Digital Library for Curriculum Enrichment and Online Collaboration (2007) (0)
- A Digital Fountain Approach to Asynchronous (2002) (0)
- Code generator and decoder based on multiple fields for communication systems (2007) (0)
- On the Exi,stence of Pseqdo'random 'generators on the Existence of Pseudorandom Generators (2013) (0)
- Proceedings of the workshop on Randomized algorithms and computation (1997) (0)
- Enabling immersive experiences in challenging network conditions (2023) (0)
- Raptor Forward Error Correction (FEC) Schemes for Objects (2004) (0)
- Advanced Standardization Solution for Digital Media Delivery (2008) (0)
- Forward Error Correction for WebRTC using FEC FRAME (2013) (0)
- Security of Blind Digital Signatures ( Revised Extended Abstract ) (2006) (0)
- IPTV Services over Power Line Communication using Application Layer Forward Error Correction (2009) (0)
- Internet Engineering Task Force (ietf) Asynchronous Layered Coding (alc) Protocol Instantiation (0)
- 2002 Information Theory Society Paper Award (2001) (0)
- Network Working Group Layered Coding Transport (lct) Building Block (2002) (0)
- Randomized Algorithms (Dagstuhl Seminar 9124) (2021) (0)
- Introduction to special issue on randomized and derandomized algorithms (1996) (0)
- 4 Concluding Remarks Acknowledgements (1994) (0)
- On Removing Randomness from aParallel Algorithm forMinimum Cuts (1993) (0)
- Linear Time Probabilistic Erasure Codes With Nearly Optimal Recovery (2014) (0)
- PET-Priority EncodingTransmission : A New , Robustand E cient Video BroadcastTechnologyBernd Lamparter (1995) (0)
- Linear Time Erasure Codes With Nearly Optimal (Extended Abstract) (1995) (0)
- Recovery process of lost packets for packet transmission protocols (1999) (0)
- Approximations of General Independent Distributions 1 (2014) (0)
- SICACT Treasurer's Report (1996) (0)
- The "Burnside process" converges slowly (1998) (0)
This paper list is powered by the following services:
Other Resources About Michael Luby
What Schools Are Affiliated With Michael Luby?
Michael Luby is affiliated with the following schools: