The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ronald L. Rivest: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ronald L. Rivest
    Partial-Match Retrieval Algorithms. [Citation Graph (36, 0)][DBLP]
    SIAM J. Comput., 1976, v:5, n:1, pp:19-50 [Journal]
  2. Ronald L. Rivest, Adi Shamir, Leonard M. Adleman
    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. [Citation Graph (7, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:2, pp:120-126 [Journal]
  3. J. Ross Quinlan, Ronald L. Rivest
    Inferring Decision Trees Using the Minimum Description Length Principle [Citation Graph (7, 0)][DBLP]
    Inf. Comput., 1989, v:80, n:3, pp:227-248 [Journal]
  4. Ronald L. Rivest
    On Self-Organizing Sequential Search Heuristics. [Citation Graph (6, 0)][DBLP]
    Commun. ACM, 1976, v:19, n:2, pp:63-67 [Journal]
  5. Laurent Hyafil, Ronald L. Rivest
    Constructing Optimal Binary Decision Trees is NP-Complete. [Citation Graph (4, 0)][DBLP]
    Inf. Process. Lett., 1976, v:5, n:1, pp:15-17 [Journal]
  6. Benny Chor, Charles E. Leiserson, Ronald L. Rivest, James B. Shearer
    An application of number theory to the organization of raster-graphics memory. [Citation Graph (4, 0)][DBLP]
    J. ACM, 1986, v:33, n:1, pp:86-104 [Journal]
  7. Manuel Blum, Robert W. Floyd, Vaughan R. Pratt, Ronald L. Rivest, Robert Endre Tarjan
    Time Bounds for Selection. [Citation Graph (4, 0)][DBLP]
    J. Comput. Syst. Sci., 1973, v:7, n:4, pp:448-461 [Journal]
  8. Ronald L. Rivest
    The MD4 Message Digest Algorithm. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1990, pp:303-311 [Conf]
  9. Andrea S. LaPaugh, Ronald L. Rivest
    The Subgraph Homeomorphism Problem [Citation Graph (1, 0)][DBLP]
    STOC, 1978, pp:40-50 [Conf]
  10. Robert W. Floyd, Ronald L. Rivest
    Expected Time Bounds for Selection. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1975, v:18, n:3, pp:165-172 [Journal]
  11. Ronald L. Rivest, Adi Shamir
    How to Reuse a ``Write-Once'' Memory [Citation Graph (1, 0)][DBLP]
    Information and Control, 1982, v:55, n:1-3, pp:1-19 [Journal]
  12. Ronald L. Rivest
    Learning Decision Lists. [Citation Graph (1, 0)][DBLP]
    Machine Learning, 1987, v:2, n:3, pp:229-246 [Journal]
  13. Brenda S. Baker, Edward G. Coffman Jr., Ronald L. Rivest
    Orthogonal Packings in Two Dimensions. [Citation Graph (1, 0)][DBLP]
    SIAM J. Comput., 1980, v:9, n:4, pp:846-855 [Journal]
  14. Ronald L. Rivest, Robert H. Sloan
    Learning Complicated Concepts Reliably and Usefully. [Citation Graph (0, 0)][DBLP]
    AAAI, 1988, pp:635-640 [Conf]
  15. Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    RC6 as the AES. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:337-342 [Conf]
  16. Ronald L. Rivest
    Cryptography and Machine Learning. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:427-439 [Conf]
  17. Ronald L. Rivest
    On NIST's Proposed Digital Signature Standard. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:481-484 [Conf]
  18. Ronald L. Rivest, Adi Shamir, Yael Tauman
    How to Leak a Secret. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:552-565 [Conf]
  19. Ronald L. Rivest, Adi Shamir, Yael Tauman
    How to Leak a Secret: Theory and Applications of Ring Signatures. [Citation Graph (0, 0)][DBLP]
    Essays in Memory of Shimon Even, 2006, pp:164-186 [Conf]
  20. Ari Juels, Ronald L. Rivest, Michael Szydlo
    The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf]
  21. John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
    Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf]
  22. Javed A. Aslam, Ronald L. Rivest
    Inferring Graphs from Walks. [Citation Graph (0, 0)][DBLP]
    COLT, 1990, pp:359-370 [Conf]
  23. Margrit Betke, Ronald L. Rivest, Mona Singh
    Piecemeal Learning of an Unknown Environment. [Citation Graph (0, 0)][DBLP]
    COLT, 1993, pp:277-286 [Conf]
  24. Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, Mona Singh
    Piecemeal Graph Exploration by a Mobile Robot (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:321-328 [Conf]
  25. Avrim Blum, Ronald L. Rivest
    Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP]
    COLT, 1988, pp:9-18 [Conf]
  26. Bonnie Eisenberg, Ronald L. Rivest
    On the Sample Complexity of PAC-Learning Using Random and Chosen Examples. [Citation Graph (0, 0)][DBLP]
    COLT, 1990, pp:154-162 [Conf]
  27. Nathan Linial, Yishay Mansour, Ronald L. Rivest
    Results on Learnability and the Vapnick-Chervonenkis Dimension. [Citation Graph (0, 0)][DBLP]
    COLT, 1988, pp:56-68 [Conf]
  28. Ronald L. Rivest, Robert H. Sloan
    Learning Complicated Concepts Reliably and Usefully. [Citation Graph (0, 0)][DBLP]
    COLT, 1988, pp:69-79 [Conf]
  29. Ronald L. Rivest, Yiqun Lisa Yin
    Being Taught can be Faster than Asking Questions. [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:144-151 [Conf]
  30. Benny Chor, Ronald L. Rivest
    A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:54-65 [Conf]
  31. Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
    Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:153-168 [Conf]
  32. Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
    A "Paradoxical'"Solution to the Signature Problem (Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:467- [Conf]
  33. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
    Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:212-226 [Conf]
  34. Moses Liskov, Ronald L. Rivest, David Wagner
    Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:31-46 [Conf]
  35. Ronald L. Rivest
    A Short Report on the RSA Chip. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:327- [Conf]
  36. Ronald L. Rivest
    Finding Four Million Large Random Primes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:625-626 [Conf]
  37. Ronald L. Rivest, Alan T. Sherman
    Randomized Encryption Techniques. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1982, pp:145-163 [Conf]
  38. Silvio Micali, Ronald L. Rivest
    Micropayments Revisited. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:149-163 [Conf]
  39. Silvio Micali, Ronald L. Rivest
    Transitive Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:236-243 [Conf]
  40. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
    Is the Data Encryption Standard a Group? (Preliminary Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:81-95 [Conf]
  41. Ronald L. Rivest
    RSA Chips (Past/Present/Future). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:159-165 [Conf]
  42. Ronald L. Rivest, Adi Shamir
    Efficient Factoring Based on Partial Information. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:31-34 [Conf]
  43. Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung
    The Business of Electronic Voting. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:234-259 [Conf]
  44. Ronald L. Rivest
    Peppercoin Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:2-8 [Conf]
  45. Ronald L. Rivest
    Perspectives on Financial Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:145-150 [Conf]
  46. Ronald L. Rivest
    Electronic Lottery Tickets as Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:307-314 [Conf]
  47. Ronald L. Rivest
    Can We Eliminate Certificate Revocations Lists? [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:178-183 [Conf]
  48. Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot
    Does Anyone Really Need MicroPayments? [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:69-76 [Conf]
  49. Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood
    Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:147-151 [Conf]
  50. Frank Thomson Leighton, Ronald L. Rivest
    Estimating a Probability Using Finite Memory (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    FCT, 1983, pp:255-269 [Conf]
  51. Benny Chor, Charles E. Leiserson, Ronald L. Rivest
    An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1982, pp:92-99 [Conf]
  52. Sally A. Goldman, Ronald L. Rivest, Robert E. Schapire
    Learning Binary Relations and Total Orders (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:46-51 [Conf]
  53. Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
    A ``Paradoxical'' Solution to the Signature Problem (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1984, pp:441-448 [Conf]
  54. Richard M. Karp, Frank Thomson Leighton, Ronald L. Rivest, Clark D. Thompson, Umesh V. Vazirani, Vijay V. Vazirani
    Global Wire Routing in Two-Dimensional Arrays (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1983, pp:453-459 [Conf]
  55. Nathan Linial, Yishay Mansour, Ronald L. Rivest
    Results on learnability and the Vapnik-Chervonenkis dimension (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1988, pp:120-129 [Conf]
  56. Ronald L. Rivest, Vaughan R. Pratt
    The Mutual Exclusion Problem for Unreliable Processes: Preliminary Report [Citation Graph (0, 0)][DBLP]
    FOCS, 1976, pp:1-8 [Conf]
  57. Ronald L. Rivest, Robert E. Schapire
    Diversity-Based Inference of Finite Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1987, pp:78-87 [Conf]
  58. Ronald L. Rivest
    On Hash-Coding Algorithms for Partial-Match Retrieval (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1974, pp:95-103 [Conf]
  59. Ronald L. Rivest
    On Self-Organizing Sequential Search Heuristics [Citation Graph (0, 0)][DBLP]
    FOCS, 1974, pp:122-126 [Conf]
  60. Andrew Chi-Chih Yao, Ronald L. Rivest
    k+1 Heads Are Better than k [Citation Graph (0, 0)][DBLP]
    FOCS, 1976, pp:67-70 [Conf]
  61. Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:1-15 [Conf]
  62. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw
    On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:206-221 [Conf]
  63. Ronald L. Rivest
    The RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:86-96 [Conf]
  64. Ronald L. Rivest
    All-or-Nothing Encryption and the Package Transform. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:210-218 [Conf]
  65. Michael Ben-Or, Oded Goldreich, Silvio Micali, Ronald L. Rivest
    A Fair Protocol for Signing Contracts (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1985, pp:43-52 [Conf]
  66. Ronald L. Rivest
    On the Optimality of Elia's Algorithm for Performing Best-Match Searches. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1974, pp:678-681 [Conf]
  67. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  68. Avrim Blum, Ronald L. Rivest
    Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP]
    NIPS, 1988, pp:494-501 [Conf]
  69. Anthony Kuh, Thomas Petsche, Ronald L. Rivest
    Learning Time-Varying Concepts. [Citation Graph (0, 0)][DBLP]
    NIPS, 1990, pp:183-189 [Conf]
  70. Anthony Kuh, Thomas Petsche, Ronald L. Rivest
    Incrementally Learning Time-Varying Half Planes. [Citation Graph (0, 0)][DBLP]
    NIPS, 1991, pp:920-927 [Conf]
  71. Dwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest
    The Untrusted Computer Problem and Camera-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:114-124 [Conf]
  72. Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest
    Proxy-based security protocols in networked mobile devices. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:265-272 [Conf]
  73. Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest
    Access-Controlled Resource Discovery for Pervasive Networks. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:338-345 [Conf]
  74. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf
    Pseudonym Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:184-199 [Conf]
  75. Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest
    Lightweight Email Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:288-302 [Conf]
  76. Avrim Blum, Ronald L. Rivest
    Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP]
    Machine Learning: From Theory to Applications, 1993, pp:9-28 [Conf]
  77. Stephen Jose Hanson, Werner Remmele, Ronald L. Rivest
    Strategic Directions in Machine Learning. [Citation Graph (0, 0)][DBLP]
    Machine Learning: From Theory to Applications, 1993, pp:1-4 [Conf]
  78. Ronald L. Rivest
    Introduction. [Citation Graph (0, 0)][DBLP]
    Machine Learning: From Theory to Applications, 1993, pp:7-7 [Conf]
  79. Ronald L. Rivest, Robert E. Schapire
    Inference of Finite Automata Using Homing Sequences. [Citation Graph (0, 0)][DBLP]
    Machine Learning: From Theory to Applications, 1993, pp:51-73 [Conf]
  80. Igal Galperin, Ronald L. Rivest
    Scapegoat Trees. [Citation Graph (0, 0)][DBLP]
    SODA, 1993, pp:165-174 [Conf]
  81. Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels
    Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:201-212 [Conf]
  82. Ronald L. Rivest, Adi Shamir
    PayWord and MicroMint: Two Simple Micropayment Schemes. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:69-87 [Conf]
  83. Manuel Blum, Robert W. Floyd, Vaughan R. Pratt, Ronald L. Rivest, Robert Endre Tarjan
    Linear Time Bounds for Median Computations [Citation Graph (0, 0)][DBLP]
    STOC, 1972, pp:119-124 [Conf]
  84. Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, Karl Winklmann, Joel Spencer
    Coping with Errors in Binary Search Procedures (Preliminary Report) [Citation Graph (0, 0)][DBLP]
    STOC, 1978, pp:227-232 [Conf]
  85. Ronald L. Rivest, Adi Shamir
    How to Reuse a ``Write-Once'' Memory (Preliminary Version) [Citation Graph (0, 0)][DBLP]
    STOC, 1982, pp:105-113 [Conf]
  86. Ronald L. Rivest, Robert E. Schapire
    Inference of Finite Automata Using Homing Sequences (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1989, pp:411-420 [Conf]
  87. Ronald L. Rivest, Jean Vuillemin
    A Generalization and Proof of the Aanderaa-Rosenberg Conjecture [Citation Graph (0, 0)][DBLP]
    STOC, 1975, pp:6-11 [Conf]
  88. Andrew Chi-Chih Yao, David Avis, Ronald L. Rivest
    An Omega(n^2 log n) Lower Bound to the Shortest Paths Problem [Citation Graph (0, 0)][DBLP]
    STOC, 1977, pp:11-17 [Conf]
  89. Ronald L. Rivest, Robert H. Sloan
    A New Model for Inductive Inference. [Citation Graph (0, 0)][DBLP]
    TARK, 1988, pp:13-28 [Conf]
  90. Ronald L. Rivest
    On the Notion of Pseudo-Free Groups. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:505-521 [Conf]
  91. Sally A. Goldman, Ronald L. Rivest
    A non-iterative maximum entropy algorithm. [Citation Graph (0, 0)][DBLP]
    UAI, 1986, pp:133-148 [Conf]
  92. Markus Jakobsson, Ari Juels, Ronald L. Rivest
    Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:339-353 [Conf]
  93. Ronald L. Rivest
    Game Tree Searching by Min/Max Approximation. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1987, v:34, n:1, pp:77-96 [Journal]
  94. Richard M. Karp, Frank Thomson Leighton, Ronald L. Rivest, Clark D. Thompson, Umesh V. Vazirani, Vijay V. Vazirani
    Global Wire Routing in Two-Dimensional Arrays. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1987, v:2, n:, pp:113-129 [Journal]
  95. Dorothy E. Denning, Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, Gary T. Marx
    To Tap or not to Tap. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1993, v:36, n:3, pp:24-44 [Journal]
  96. Robert W. Floyd, Ronald L. Rivest
    The Algorithm SELECT - for Finding the ith Smallest of n Elements [M1] (Algorithm 489). [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1975, v:18, n:3, pp:173- [Journal]
  97. Ronald L. Rivest, Martin E. Hellman, John C. Anderson, John W. Lyons
    Responses to NIST's Proposal. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1992, v:35, n:7, pp:41-54 [Journal]
  98. Ronald L. Rivest, Adi Shamir
    How to Expose an Eavesdropper. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1984, v:27, n:4, pp:393-395 [Journal]
  99. Ronald L. Rivest, Adi Shamir, Leonard M. Adleman
    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1983, v:26, n:1, pp:96-99 [Journal]
  100. Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest
    Access-controlled resource discovery in pervasive networks. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1099-1120 [Journal]
  101. David Gillman, Ronald L. Rivest
    Complete Variable-Length ``Fix-Free'' Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1995, v:5, n:2, pp:109-114 [Journal]
  102. Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, Mona Singh
    Piecemeal Graph Exploration by a Mobile Robot. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1999, v:152, n:2, pp:155-172 [Journal]
  103. Nathan Linial, Yishay Mansour, Ronald L. Rivest
    Results on Learnability and the Vapnik-Chervonenkis Dimension [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1991, v:90, n:1, pp:33-49 [Journal]
  104. Ronald L. Rivest, Robert E. Schapire
    Inference of Finite Automata Using Homing Sequences [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1993, v:103, n:2, pp:299-347 [Journal]
  105. Ronald L. Rivest, Robert H. Sloan
    On Choosing between Experimenting and Thinking when Learning [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1993, v:106, n:1, pp:1-25 [Journal]
  106. Ronald L. Rivest, Robert H. Sloan
    A Formal Model of Hierarchical Concept Learning [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1994, v:114, n:1, pp:88-114 [Journal]
  107. Jon Doyle, Ronald L. Rivest
    Linear Expected Time of a Simple Union-Find Algorithm. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1976, v:5, n:5, pp:146-148 [Journal]
  108. Ronald L. Rivest, Jean-Paul Van de Wiele
    An Omega(n/lg n)1/2 Lower Bound on the Number of Additions Necessary to Compute 0-1 Polynomials over the Ring of Integer Polynomials. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1979, v:8, n:4, pp:178-180 [Journal]
  109. Ronald L. Rivest
    Optimal Arrangement of Keys in a Hash Table. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1978, v:25, n:2, pp:200-209 [Journal]
  110. Ronald L. Rivest, Robert E. Schapire
    Diversity-Based Inference of Finite Automata. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1994, v:41, n:3, pp:555-589 [Journal]
  111. Andrew Chi-Chih Yao, Ronald L. Rivest
    k+1 Heads Are Better than k. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1978, v:25, n:2, pp:337-340 [Journal]
  112. Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest
    Certificate Chain Discovery in SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:4, pp:285-322 [Journal]
  113. Andrea S. LaPaugh, Ronald L. Rivest
    The Subgraph Homeomorphism Problem. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1980, v:20, n:2, pp:133-149 [Journal]
  114. Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, Karl Winklmann, Joel Spencer
    Coping with Errors in Binary Search Procedures. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1980, v:20, n:3, pp:396-404 [Journal]
  115. Mihir Bellare, Ronald L. Rivest
    Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:2, pp:117-139 [Journal]
  116. Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman
    Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1988, v:1, n:1, pp:3-36 [Journal]
  117. Margrit Betke, Ronald L. Rivest, Mona Singh
    Piecemeal Learning of an Unknown Environment. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 1995, v:18, n:2-3, pp:231-254 [Journal]
  118. Avrim Blum, Ronald L. Rivest
    Training a 3-node neural network is NP-complete. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 1992, v:5, n:1, pp:117-127 [Journal]
  119. Sally A. Goldman, Ronald L. Rivest, Robert E. Schapire
    Learning Binary Relations and Total Orders. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1993, v:22, n:5, pp:1006-1034 [Journal]
  120. Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
    A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:281-308 [Journal]
  121. Ronald L. Rivest
    On the Worst-Case Behavior of String-Searching Algorithms. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1977, v:6, n:4, pp:669-674 [Journal]
  122. Andrew Chi-Chih Yao, Ronald L. Rivest
    On the Polyhedral Decision Problem. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1980, v:9, n:2, pp:343-347 [Journal]
  123. Ronald L. Rivest
    The Necessity of Feedback in Minimal Monotone Combinational Circuits. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1977, v:26, n:6, pp:606-607 [Journal]
  124. Ronald L. Rivest, Jean Vuillemin
    On Recognizing Graph Properties from Adjacency Matrices. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1976, v:3, n:3, pp:371-384 [Journal]
  125. Michael Ben-Or, Oded Goldreich, Silvio Micali, Ronald L. Rivest
    A fair protocol for signing contracts. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:40-46 [Journal]
  126. Benny Chor, Ronald L. Rivest
    A knapsack-type public key cryptosystem based on arithmetic in finite fields. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:901-909 [Journal]
  127. D. W. Gillman, M. Mohtashemi, Ronald L. Rivest
    On breaking a Huffman code. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:3, pp:972-976 [Journal]
  128. Frank Thomson Leighton, Ronald L. Rivest
    Estimating a probability using finite memory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1986, v:32, n:6, pp:733-742 [Journal]
  129. Ronald L. Rivest
    Network control by Bayesian broadcast. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:323-328 [Journal]
  130. Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee
    Amplifying Collision Resistance: A Complexity-Theoretic Treatment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:264-283 [Conf]
  131. Ronald L. Rivest
    Security of Voting Systems. [Citation Graph (0, 0)][DBLP]
    NSDI, 2007, pp:- [Conf]

  132. 07311 Executive Summary -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP]


  133. 07311 Abstracts Collection -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP]


  134. Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. [Citation Graph (, )][DBLP]


  135. Phish and Chips. [Citation Graph (, )][DBLP]


  136. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. [Citation Graph (, )][DBLP]


  137. On Auditing Elections When Precincts Have Different Sizes. [Citation Graph (, )][DBLP]


  138. Scratch & vote: self-contained paper-based cryptographic voting. [Citation Graph (, )][DBLP]


  139. Scantegrity Mock Election at Takoma Park. [Citation Graph (, )][DBLP]


  140. A Modular Voting Architecture ("Frog Voting"). [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.757secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002