Search the dblp DataBase
Ronald L. Rivest :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ronald L. Rivest Partial-Match Retrieval Algorithms. [Citation Graph (36, 0)][DBLP ] SIAM J. Comput., 1976, v:5, n:1, pp:19-50 [Journal ] Ronald L. Rivest , Adi Shamir , Leonard M. Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. [Citation Graph (7, 0)][DBLP ] Commun. ACM, 1978, v:21, n:2, pp:120-126 [Journal ] J. Ross Quinlan , Ronald L. Rivest Inferring Decision Trees Using the Minimum Description Length Principle [Citation Graph (7, 0)][DBLP ] Inf. Comput., 1989, v:80, n:3, pp:227-248 [Journal ] Ronald L. Rivest On Self-Organizing Sequential Search Heuristics. [Citation Graph (6, 0)][DBLP ] Commun. ACM, 1976, v:19, n:2, pp:63-67 [Journal ] Laurent Hyafil , Ronald L. Rivest Constructing Optimal Binary Decision Trees is NP-Complete. [Citation Graph (4, 0)][DBLP ] Inf. Process. Lett., 1976, v:5, n:1, pp:15-17 [Journal ] Benny Chor , Charles E. Leiserson , Ronald L. Rivest , James B. Shearer An application of number theory to the organization of raster-graphics memory. [Citation Graph (4, 0)][DBLP ] J. ACM, 1986, v:33, n:1, pp:86-104 [Journal ] Manuel Blum , Robert W. Floyd , Vaughan R. Pratt , Ronald L. Rivest , Robert Endre Tarjan Time Bounds for Selection. [Citation Graph (4, 0)][DBLP ] J. Comput. Syst. Sci., 1973, v:7, n:4, pp:448-461 [Journal ] Ronald L. Rivest The MD4 Message Digest Algorithm. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1990, pp:303-311 [Conf ] Andrea S. LaPaugh , Ronald L. Rivest The Subgraph Homeomorphism Problem [Citation Graph (1, 0)][DBLP ] STOC, 1978, pp:40-50 [Conf ] Robert W. Floyd , Ronald L. Rivest Expected Time Bounds for Selection. [Citation Graph (1, 0)][DBLP ] Commun. ACM, 1975, v:18, n:3, pp:165-172 [Journal ] Ronald L. Rivest , Adi Shamir How to Reuse a ``Write-Once'' Memory [Citation Graph (1, 0)][DBLP ] Information and Control, 1982, v:55, n:1-3, pp:1-19 [Journal ] Ronald L. Rivest Learning Decision Lists. [Citation Graph (1, 0)][DBLP ] Machine Learning, 1987, v:2, n:3, pp:229-246 [Journal ] Brenda S. Baker , Edward G. Coffman Jr. , Ronald L. Rivest Orthogonal Packings in Two Dimensions. [Citation Graph (1, 0)][DBLP ] SIAM J. Comput., 1980, v:9, n:4, pp:846-855 [Journal ] Ronald L. Rivest , Robert H. Sloan Learning Complicated Concepts Reliably and Usefully. [Citation Graph (0, 0)][DBLP ] AAAI, 1988, pp:635-640 [Conf ] Ronald L. Rivest , Matthew J. B. Robshaw , Yiqun Lisa Yin RC6 as the AES. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:337-342 [Conf ] Ronald L. Rivest Cryptography and Machine Learning. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:427-439 [Conf ] Ronald L. Rivest On NIST's Proposed Digital Signature Standard. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:481-484 [Conf ] Ronald L. Rivest , Adi Shamir , Yael Tauman How to Leak a Secret. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:552-565 [Conf ] Ronald L. Rivest , Adi Shamir , Yael Tauman How to Leak a Secret: Theory and Applications of Ring Signatures. [Citation Graph (0, 0)][DBLP ] Essays in Memory of Shimon Even, 2006, pp:164-186 [Conf ] Ari Juels , Ronald L. Rivest , Michael Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf ] John G. Brainard , Ari Juels , Ronald L. Rivest , Michael Szydlo , Moti Yung Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf ] Javed A. Aslam , Ronald L. Rivest Inferring Graphs from Walks. [Citation Graph (0, 0)][DBLP ] COLT, 1990, pp:359-370 [Conf ] Margrit Betke , Ronald L. Rivest , Mona Singh Piecemeal Learning of an Unknown Environment. [Citation Graph (0, 0)][DBLP ] COLT, 1993, pp:277-286 [Conf ] Baruch Awerbuch , Margrit Betke , Ronald L. Rivest , Mona Singh Piecemeal Graph Exploration by a Mobile Robot (Extended Abstract). [Citation Graph (0, 0)][DBLP ] COLT, 1995, pp:321-328 [Conf ] Avrim Blum , Ronald L. Rivest Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP ] COLT, 1988, pp:9-18 [Conf ] Bonnie Eisenberg , Ronald L. Rivest On the Sample Complexity of PAC-Learning Using Random and Chosen Examples. [Citation Graph (0, 0)][DBLP ] COLT, 1990, pp:154-162 [Conf ] Nathan Linial , Yishay Mansour , Ronald L. Rivest Results on Learnability and the Vapnick-Chervonenkis Dimension. [Citation Graph (0, 0)][DBLP ] COLT, 1988, pp:56-68 [Conf ] Ronald L. Rivest , Robert H. Sloan Learning Complicated Concepts Reliably and Usefully. [Citation Graph (0, 0)][DBLP ] COLT, 1988, pp:69-79 [Conf ] Ronald L. Rivest , Yiqun Lisa Yin Being Taught can be Faster than Asking Questions. [Citation Graph (0, 0)][DBLP ] COLT, 1995, pp:144-151 [Conf ] Benny Chor , Ronald L. Rivest A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:54-65 [Conf ] Oded Goldreich , Birgit Pfitzmann , Ronald L. Rivest Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:153-168 [Conf ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A "Paradoxical'"Solution to the Signature Problem (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:467- [Conf ] Burton S. Kaliski Jr. , Ronald L. Rivest , Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:212-226 [Conf ] Moses Liskov , Ronald L. Rivest , David Wagner Tweakable Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:31-46 [Conf ] Ronald L. Rivest A Short Report on the RSA Chip. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:327- [Conf ] Ronald L. Rivest Finding Four Million Large Random Primes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:625-626 [Conf ] Ronald L. Rivest , Alan T. Sherman Randomized Encryption Techniques. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1982, pp:145-163 [Conf ] Silvio Micali , Ronald L. Rivest Micropayments Revisited. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:149-163 [Conf ] Silvio Micali , Ronald L. Rivest Transitive Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:236-243 [Conf ] Burton S. Kaliski Jr. , Ronald L. Rivest , Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:81-95 [Conf ] Ronald L. Rivest RSA Chips (Past/Present/Future). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:159-165 [Conf ] Ronald L. Rivest , Adi Shamir Efficient Factoring Based on Partial Information. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:31-34 [Conf ] Ed Gerck , C. Andrew Neff , Ronald L. Rivest , Aviel D. Rubin , Moti Yung The Business of Electronic Voting. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2001, pp:234-259 [Conf ] Ronald L. Rivest Peppercoin Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:2-8 [Conf ] Ronald L. Rivest Perspectives on Financial Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:145-150 [Conf ] Ronald L. Rivest Electronic Lottery Tickets as Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:307-314 [Conf ] Ronald L. Rivest Can We Eliminate Certificate Revocations Lists? [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:178-183 [Conf ] Nicko van Someren , Andrew M. Odlyzko , Ronald L. Rivest , Tim Jones , Duncan Goldie-Scot Does Anyone Really Need MicroPayments? [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:69-76 [Conf ] Rebecca N. Wright , L. Jean Camp , Ian Goldberg , Ronald L. Rivest , Graham Wood Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:147-151 [Conf ] Frank Thomson Leighton , Ronald L. Rivest Estimating a Probability Using Finite Memory (Extended Abstract). [Citation Graph (0, 0)][DBLP ] FCT, 1983, pp:255-269 [Conf ] Benny Chor , Charles E. Leiserson , Ronald L. Rivest An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1982, pp:92-99 [Conf ] Sally A. Goldman , Ronald L. Rivest , Robert E. Schapire Learning Binary Relations and Total Orders (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1989, pp:46-51 [Conf ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A ``Paradoxical'' Solution to the Signature Problem (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1984, pp:441-448 [Conf ] Richard M. Karp , Frank Thomson Leighton , Ronald L. Rivest , Clark D. Thompson , Umesh V. Vazirani , Vijay V. Vazirani Global Wire Routing in Two-Dimensional Arrays (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1983, pp:453-459 [Conf ] Nathan Linial , Yishay Mansour , Ronald L. Rivest Results on learnability and the Vapnik-Chervonenkis dimension (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1988, pp:120-129 [Conf ] Ronald L. Rivest , Vaughan R. Pratt The Mutual Exclusion Problem for Unreliable Processes: Preliminary Report [Citation Graph (0, 0)][DBLP ] FOCS, 1976, pp:1-8 [Conf ] Ronald L. Rivest , Robert E. Schapire Diversity-Based Inference of Finite Automata (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1987, pp:78-87 [Conf ] Ronald L. Rivest On Hash-Coding Algorithms for Partial-Match Retrieval (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1974, pp:95-103 [Conf ] Ronald L. Rivest On Self-Organizing Sequential Search Heuristics [Citation Graph (0, 0)][DBLP ] FOCS, 1974, pp:122-126 [Conf ] Andrew Chi-Chih Yao , Ronald L. Rivest k+1 Heads Are Better than k [Citation Graph (0, 0)][DBLP ] FOCS, 1976, pp:67-70 [Conf ] Scott Contini , Ronald L. Rivest , Matthew J. B. Robshaw , Yiqun Lisa Yin Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:1-15 [Conf ] Lars R. Knudsen , Vincent Rijmen , Ronald L. Rivest , Matthew J. B. Robshaw On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:206-221 [Conf ] Ronald L. Rivest The RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:86-96 [Conf ] Ronald L. Rivest All-or-Nothing Encryption and the Package Transform. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:210-218 [Conf ] Michael Ben-Or , Oded Goldreich , Silvio Micali , Ronald L. Rivest A Fair Protocol for Signing Contracts (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICALP, 1985, pp:43-52 [Conf ] Ronald L. Rivest On the Optimality of Elia's Algorithm for Performing Best-Match Searches. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1974, pp:678-681 [Conf ] Ruby B. Lee , Zhijie Shi , Yiqun Lisa Yin , Ronald L. Rivest , Matthew J. B. Robshaw On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:569-577 [Conf ] Avrim Blum , Ronald L. Rivest Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP ] NIPS, 1988, pp:494-501 [Conf ] Anthony Kuh , Thomas Petsche , Ronald L. Rivest Learning Time-Varying Concepts. [Citation Graph (0, 0)][DBLP ] NIPS, 1990, pp:183-189 [Conf ] Anthony Kuh , Thomas Petsche , Ronald L. Rivest Incrementally Learning Time-Varying Half Planes. [Citation Graph (0, 0)][DBLP ] NIPS, 1991, pp:920-927 [Conf ] Dwaine E. Clarke , Blaise Gassend , Thomas Kotwal , Matt Burnside , Marten van Dijk , Srinivas Devadas , Ronald L. Rivest The Untrusted Computer Problem and Camera-Based Authentication. [Citation Graph (0, 0)][DBLP ] Pervasive, 2002, pp:114-124 [Conf ] Matt Burnside , Dwaine E. Clarke , Todd Mills , Andrew Maywah , Srinivas Devadas , Ronald L. Rivest Proxy-based security protocols in networked mobile devices. [Citation Graph (0, 0)][DBLP ] SAC, 2002, pp:265-272 [Conf ] Sanjay Raman , Dwaine E. Clarke , Matt Burnside , Srinivas Devadas , Ronald L. Rivest Access-Controlled Resource Discovery for Pervasive Networks. [Citation Graph (0, 0)][DBLP ] SAC, 2003, pp:338-345 [Conf ] Anna Lysyanskaya , Ronald L. Rivest , Amit Sahai , Stefan Wolf Pseudonym Systems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:184-199 [Conf ] Ben Adida , David Chau , Susan Hohenberger , Ronald L. Rivest Lightweight Email Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:288-302 [Conf ] Avrim Blum , Ronald L. Rivest Training a 3-Node Neural Network is NP-Complete. [Citation Graph (0, 0)][DBLP ] Machine Learning: From Theory to Applications, 1993, pp:9-28 [Conf ] Stephen Jose Hanson , Werner Remmele , Ronald L. Rivest Strategic Directions in Machine Learning. [Citation Graph (0, 0)][DBLP ] Machine Learning: From Theory to Applications, 1993, pp:1-4 [Conf ] Ronald L. Rivest Introduction. [Citation Graph (0, 0)][DBLP ] Machine Learning: From Theory to Applications, 1993, pp:7-7 [Conf ] Ronald L. Rivest , Robert E. Schapire Inference of Finite Automata Using Homing Sequences. [Citation Graph (0, 0)][DBLP ] Machine Learning: From Theory to Applications, 1993, pp:51-73 [Conf ] Igal Galperin , Ronald L. Rivest Scapegoat Trees. [Citation Graph (0, 0)][DBLP ] SODA, 1993, pp:165-174 [Conf ] Stephen A. Weis , Sanjay E. Sarma , Ronald L. Rivest , Daniel W. Engels Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:201-212 [Conf ] Ronald L. Rivest , Adi Shamir PayWord and MicroMint: Two Simple Micropayment Schemes. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:69-87 [Conf ] Manuel Blum , Robert W. Floyd , Vaughan R. Pratt , Ronald L. Rivest , Robert Endre Tarjan Linear Time Bounds for Median Computations [Citation Graph (0, 0)][DBLP ] STOC, 1972, pp:119-124 [Conf ] Ronald L. Rivest , Albert R. Meyer , Daniel J. Kleitman , Karl Winklmann , Joel Spencer Coping with Errors in Binary Search Procedures (Preliminary Report) [Citation Graph (0, 0)][DBLP ] STOC, 1978, pp:227-232 [Conf ] Ronald L. Rivest , Adi Shamir How to Reuse a ``Write-Once'' Memory (Preliminary Version) [Citation Graph (0, 0)][DBLP ] STOC, 1982, pp:105-113 [Conf ] Ronald L. Rivest , Robert E. Schapire Inference of Finite Automata Using Homing Sequences (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1989, pp:411-420 [Conf ] Ronald L. Rivest , Jean Vuillemin A Generalization and Proof of the Aanderaa-Rosenberg Conjecture [Citation Graph (0, 0)][DBLP ] STOC, 1975, pp:6-11 [Conf ] Andrew Chi-Chih Yao , David Avis , Ronald L. Rivest An Omega(n^2 log n) Lower Bound to the Shortest Paths Problem [Citation Graph (0, 0)][DBLP ] STOC, 1977, pp:11-17 [Conf ] Ronald L. Rivest , Robert H. Sloan A New Model for Inductive Inference. [Citation Graph (0, 0)][DBLP ] TARK, 1988, pp:13-28 [Conf ] Ronald L. Rivest On the Notion of Pseudo-Free Groups. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:505-521 [Conf ] Sally A. Goldman , Ronald L. Rivest A non-iterative maximum entropy algorithm. [Citation Graph (0, 0)][DBLP ] UAI, 1986, pp:133-148 [Conf ] Markus Jakobsson , Ari Juels , Ronald L. Rivest Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:339-353 [Conf ] Ronald L. Rivest Game Tree Searching by Min/Max Approximation. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1987, v:34, n:1, pp:77-96 [Journal ] Richard M. Karp , Frank Thomson Leighton , Ronald L. Rivest , Clark D. Thompson , Umesh V. Vazirani , Vijay V. Vazirani Global Wire Routing in Two-Dimensional Arrays. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1987, v:2, n:, pp:113-129 [Journal ] Dorothy E. Denning , Mike Godwin , William A. Bayse , Marc Rotenberg , Lewis M. Branscomb , Anne M. Branscomb , Ronald L. Rivest , Andrew Grosso , Gary T. Marx To Tap or not to Tap. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1993, v:36, n:3, pp:24-44 [Journal ] Robert W. Floyd , Ronald L. Rivest The Algorithm SELECT - for Finding the ith Smallest of n Elements [M1] (Algorithm 489). [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1975, v:18, n:3, pp:173- [Journal ] Ronald L. Rivest , Martin E. Hellman , John C. Anderson , John W. Lyons Responses to NIST's Proposal. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1992, v:35, n:7, pp:41-54 [Journal ] Ronald L. Rivest , Adi Shamir How to Expose an Eavesdropper. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1984, v:27, n:4, pp:393-395 [Journal ] Ronald L. Rivest , Adi Shamir , Leonard M. Adleman A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1983, v:26, n:1, pp:96-99 [Journal ] Sanjay Raman , Dwaine E. Clarke , Matt Burnside , Srinivas Devadas , Ronald L. Rivest Access-controlled resource discovery in pervasive networks. [Citation Graph (0, 0)][DBLP ] Concurrency - Practice and Experience, 2004, v:16, n:11, pp:1099-1120 [Journal ] David Gillman , Ronald L. Rivest Complete Variable-Length ``Fix-Free'' Codes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1995, v:5, n:2, pp:109-114 [Journal ] Baruch Awerbuch , Margrit Betke , Ronald L. Rivest , Mona Singh Piecemeal Graph Exploration by a Mobile Robot. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:152, n:2, pp:155-172 [Journal ] Nathan Linial , Yishay Mansour , Ronald L. Rivest Results on Learnability and the Vapnik-Chervonenkis Dimension [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1991, v:90, n:1, pp:33-49 [Journal ] Ronald L. Rivest , Robert E. Schapire Inference of Finite Automata Using Homing Sequences [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1993, v:103, n:2, pp:299-347 [Journal ] Ronald L. Rivest , Robert H. Sloan On Choosing between Experimenting and Thinking when Learning [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1993, v:106, n:1, pp:1-25 [Journal ] Ronald L. Rivest , Robert H. Sloan A Formal Model of Hierarchical Concept Learning [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1994, v:114, n:1, pp:88-114 [Journal ] Jon Doyle , Ronald L. Rivest Linear Expected Time of a Simple Union-Find Algorithm. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1976, v:5, n:5, pp:146-148 [Journal ] Ronald L. Rivest , Jean-Paul Van de Wiele An Omega(n/lg n)1/2 Lower Bound on the Number of Additions Necessary to Compute 0-1 Polynomials over the Ring of Integer Polynomials. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1979, v:8, n:4, pp:178-180 [Journal ] Ronald L. Rivest Optimal Arrangement of Keys in a Hash Table. [Citation Graph (0, 0)][DBLP ] J. ACM, 1978, v:25, n:2, pp:200-209 [Journal ] Ronald L. Rivest , Robert E. Schapire Diversity-Based Inference of Finite Automata. [Citation Graph (0, 0)][DBLP ] J. ACM, 1994, v:41, n:3, pp:555-589 [Journal ] Andrew Chi-Chih Yao , Ronald L. Rivest k+1 Heads Are Better than k. [Citation Graph (0, 0)][DBLP ] J. ACM, 1978, v:25, n:2, pp:337-340 [Journal ] Dwaine E. Clarke , Jean-Emile Elien , Carl M. Ellison , Matt Fredette , Alexander Morcos , Ronald L. Rivest Certificate Chain Discovery in SPKI/SDSI. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:4, pp:285-322 [Journal ] Andrea S. LaPaugh , Ronald L. Rivest The Subgraph Homeomorphism Problem. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1980, v:20, n:2, pp:133-149 [Journal ] Ronald L. Rivest , Albert R. Meyer , Daniel J. Kleitman , Karl Winklmann , Joel Spencer Coping with Errors in Binary Search Procedures. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1980, v:20, n:3, pp:396-404 [Journal ] Mihir Bellare , Ronald L. Rivest Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:2, pp:117-139 [Journal ] Burton S. Kaliski Jr. , Ronald L. Rivest , Alan T. Sherman Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:1, pp:3-36 [Journal ] Margrit Betke , Ronald L. Rivest , Mona Singh Piecemeal Learning of an Unknown Environment. [Citation Graph (0, 0)][DBLP ] Machine Learning, 1995, v:18, n:2-3, pp:231-254 [Journal ] Avrim Blum , Ronald L. Rivest Training a 3-node neural network is NP-complete. [Citation Graph (0, 0)][DBLP ] Neural Networks, 1992, v:5, n:1, pp:117-127 [Journal ] Sally A. Goldman , Ronald L. Rivest , Robert E. Schapire Learning Binary Relations and Total Orders. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1993, v:22, n:5, pp:1006-1034 [Journal ] Shafi Goldwasser , Silvio Micali , Ronald L. Rivest A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:2, pp:281-308 [Journal ] Ronald L. Rivest On the Worst-Case Behavior of String-Searching Algorithms. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1977, v:6, n:4, pp:669-674 [Journal ] Andrew Chi-Chih Yao , Ronald L. Rivest On the Polyhedral Decision Problem. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1980, v:9, n:2, pp:343-347 [Journal ] Ronald L. Rivest The Necessity of Feedback in Minimal Monotone Combinational Circuits. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1977, v:26, n:6, pp:606-607 [Journal ] Ronald L. Rivest , Jean Vuillemin On Recognizing Graph Properties from Adjacency Matrices. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1976, v:3, n:3, pp:371-384 [Journal ] Michael Ben-Or , Oded Goldreich , Silvio Micali , Ronald L. Rivest A fair protocol for signing contracts. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:1, pp:40-46 [Journal ] Benny Chor , Ronald L. Rivest A knapsack-type public key cryptosystem based on arithmetic in finite fields. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:901-909 [Journal ] D. W. Gillman , M. Mohtashemi , Ronald L. Rivest On breaking a Huffman code. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:3, pp:972-976 [Journal ] Frank Thomson Leighton , Ronald L. Rivest Estimating a probability using finite memory. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1986, v:32, n:6, pp:733-742 [Journal ] Ronald L. Rivest Network control by Bayesian broadcast. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1987, v:33, n:3, pp:323-328 [Journal ] Ran Canetti , Ronald L. Rivest , Madhu Sudan , Luca Trevisan , Salil P. Vadhan , Hoeteck Wee Amplifying Collision Resistance: A Complexity-Theoretic Treatment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:264-283 [Conf ] Ronald L. Rivest Security of Voting Systems. [Citation Graph (0, 0)][DBLP ] NSDI, 2007, pp:- [Conf ] 07311 Executive Summary -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] 07311 Abstracts Collection -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. [Citation Graph (, )][DBLP ] Phish and Chips. [Citation Graph (, )][DBLP ] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. [Citation Graph (, )][DBLP ] On Auditing Elections When Precincts Have Different Sizes. [Citation Graph (, )][DBLP ] Scratch & vote: self-contained paper-based cryptographic voting. [Citation Graph (, )][DBLP ] Scantegrity Mock Election at Takoma Park. [Citation Graph (, )][DBLP ] A Modular Voting Architecture ("Frog Voting"). [Citation Graph (, )][DBLP ] Search in 0.040secs, Finished in 0.050secs