Sledovať
Ronald L. Rivest
Ronald L. Rivest
MIT Institute Professor
Overená e-mailová adresa na: mit.edu - Domovská stránka
Názov
Citované v
Citované v
Rok
Introduction to algorithms
TH Cormen, CE Leiserson, RL Rivest, C Stein
MIT press, 2022
707362022
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
292731978
The MD5 message-digest algorithm
R Rivest
71311992
A digital signature scheme secure against adaptive chosen-message attacks
S Goldwasser, S Micali, RL Rivest
SIAM Journal on computing 17 (2), 281-308, 1988
39951988
On data banks and privacy homomorphisms
RL Rivest, L Adleman, ML Dertouzos
Foundations of secure computation 4 (11), 169-180, 1978
37611978
How to leak a secret
RL Rivest, A Shamir, Y Tauman
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
26152001
Security and privacy aspects of low-cost radio frequency identification systems
SA Weis, SE Sarma, RL Rivest, DW Engels
Security in Pervasive Computing: First International Conference, Boppard …, 2004
23692004
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
18571983
Time bounds for selection
M Blum, RW Floyd, VR Pratt, RL Rivest, RE Tarjan
J. Comput. Syst. Sci. 7 (4), 448-461, 1973
18491973
The RC5 encryption algorithm
RL Rivest
International Workshop on Fast Software Encryption, 86-96, 1994
17271994
Constructing optimal binary decision trees is NP-complete
H Laurent, RL Rivest
Information processing letters 5 (1), 15-17, 1976
16491976
Training a 3-node neural network is NP-complete
A Blum, R Rivest
Advances in neural information processing systems 1, 1988
14531988
Learning decision lists
RL Rivest
Machine learning 2, 229-246, 1987
14271987
The blocker tag: Selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
13902003
SPKI certificate theory
C Ellison, B Frantz, B Lampson, R Rivest, B Thomas, T Ylonen
13071999
Secure communications over insecure channels
RC Merkle
Communications of the ACM 21 (4), 294-299, 1978
12481978
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
11271996
Inferring decision trees using the minimum description length principle
LR Quinlan, RL Rivest
10911987
Orthogonal packings in two dimensions
BS Baker, EG Coffman, Jr, RL Rivest
SIAM Journal on computing 9 (4), 846-855, 1980
10201980
Introduction to algorithms
CE Leiserson, RL Rivest, TH Cormen, C Stein
MIT press, 1994
9261994
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20