default search action
Ronald L. Rivest
Ron Rivest
Person information
- affiliation: MIT, Internet Policy Research Initiative, USA
- award (2002): Turing Award
- award (2017): BBVA Foundation Frontiers of Knowledge Award
- award (2007): Marconi Prize
- award (1996): Paris Kanellakis Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j69]Carsten Baum, Jens Berlips, Walther Chen, Ivan Bjerre Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Commun. Cryptol. 1(3): 10 (2024) - [j68]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [i37]Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu, Haoling Zhang:
A system capable of verifiably and privately screening global DNA synthesis. CoRR abs/2403.14023 (2024) - [i36]Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Cryptol. ePrint Arch. 2024: 1613 (2024) - 2022
- [i35]Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon:
Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners. IACR Cryptol. ePrint Arch. 2022: 960 (2022) - 2021
- [j67]Sunoo Park, Michael A. Specter, Neha Narula, Ronald L. Rivest:
Going from bad to worse: from Internet voting to blockchain voting. J. Cybersecur. 7(1) (2021) - [c116]Michelle L. Blom, Jurlind Budurushi, Ronald L. Rivest, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections. E-VOTE-ID 2021: 47-62 - [i34]Michelle L. Blom, Jurlind Budurushi, Ronald L. Rivest, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, Damjan Vukcevic:
Assertion-based Approaches to Auditing Complex Elections, with application to party-list proportional elections. CoRR abs/2107.11903 (2021) - [i33]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021) - 2020
- [j66]Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, Madhu Sudan:
Optimality of Correlated Sampling Strategies. Theory Comput. 16: 1-18 (2020) - [c115]Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa J. Teague, Damjan Vukcevic:
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. E-VOTE-ID 2020: 112-128 - [i32]Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa Teague, Damjan Vukcevic:
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. CoRR abs/2008.08536 (2020) - [i31]John Meklenburg, Michael A. Specter, Michael Wentz, Hari Balakrishnan, Anantha P. Chandrakasan, John Cohn, Gary Hatke, Louise Ivers, Ronald L. Rivest, Gerald Jay Sussman, Daniel J. Weitzner:
SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol. CoRR abs/2012.04770 (2020) - [i30]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020)
2010 – 2019
- 2019
- [c114]Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Philip B. Stark:
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. Financial Cryptography Workshops 2019: 226-241 - [c113]Mayuri Sridhar, Ronald L. Rivest:
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits. Financial Cryptography Workshops 2019: 242-256 - [p2]Shafi Goldwasser, Silvio Micali, Ronald L. Rivest:
A "paradoxical" solution to the signature problem. Providing Sound Foundations for Cryptography 2019: 265-284 - 2018
- [c112]Soheil Behnezhad, Avrim Blum, Mahsa Derakhshan, Mohammad Taghi Hajiaghayi, Mohammad Mahdian, Christos H. Papadimitriou, Ronald L. Rivest, Saeed Seddighin, Philip B. Stark:
From Battlefields to Elections: Winning Strategies of Blotto and Auditing Games. SODA 2018: 2291-2310 - [i29]Ronald L. Rivest:
Bayesian Tabulation Audits: Explained and Extended. CoRR abs/1801.00528 (2018) - [i28]Ronald L. Rivest:
Consistent Sampling with Replacement. CoRR abs/1808.10016 (2018) - [i27]Mayuri Sridhar, Ronald L. Rivest:
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits. CoRR abs/1811.08811 (2018) - 2017
- [j65]Ronald L. Rivest, Philip B. Stark:
When Is an Election Verifiable? IEEE Secur. Priv. 15(3): 48-50 (2017) - [c111]Ronald L. Rivest, Philip B. Stark, Zara Perumal:
BatchVote: Voting Rules Designed for Auditability. Financial Cryptography Workshops 2017: 317-333 - [c110]Olivier Pereira, Ronald L. Rivest:
Marked Mix-Nets. Financial Cryptography Workshops 2017: 353-369 - [c109]Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, Ronald L. Rivest:
Time-Space Trade-offs in Population Protocols. SODA 2017: 2560-2579 - [c108]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [i26]Ronald L. Rivest:
ClipAudit: A Simple Risk-Limiting Post-Election Audit. CoRR abs/1701.08312 (2017) - [i25]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [i24]Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, Ronald L. Rivest:
Time-Space Trade-offs in Population Protocols. CoRR abs/1602.08032 (2016) - [i23]Peter Gutmann, Steven M. Bellovin, Matt Blaze, Ronald L. Rivest, Nigel P. Smart:
An IBE-based Signcryption Scheme for Group Key Management. CoRR abs/1603.09526 (2016) - [i22]Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle L. Blom, Chris Culnane, Vanessa Teague:
Auditing Australian Senate Ballots. CoRR abs/1610.00127 (2016) - [i21]Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, Madhu Sudan:
The Optimality of Correlated Sampling. CoRR abs/1612.01041 (2016) - [i20]Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, Madhu Sudan:
The Optimality of Correlated Sampling. Electron. Colloquium Comput. Complex. TR16 (2016) - [i19]Sunoo Park, Ronald L. Rivest:
Towards Secure Quadratic Voting. IACR Cryptol. ePrint Arch. 2016: 400 (2016) - [i18]Ronald L. Rivest, Jacob C. N. Schuldt:
Spritz - a spongy RC4-like stream cipher and hash function. IACR Cryptol. ePrint Arch. 2016: 856 (2016) - 2015
- [j64]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j63]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [i17]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - [i16]Ronald L. Rivest:
DiffSum - A Simple Post-Election Risk-Limiting Audit. CoRR abs/1509.00127 (2015) - 2014
- [j62]Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, Mihai Patrascu:
Picture-Hanging Puzzles. Theory Comput. Syst. 54(4): 531-550 (2014) - 2013
- [j61]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". J. Cryptol. 26(4): 655-713 (2013) - [c107]Ari Juels, Ronald L. Rivest:
Honeywords: making password-cracking detectable. CCS 2013: 145-160 - [c106]Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen:
Drifting Keys: Impersonation detection for constrained devices. INFOCOM 2013: 1025-1033 - 2012
- [c105]Vint Cerf, John E. Hopcroft, Robert E. Kahn, Ronald L. Rivest, Adi Shamir:
Information, Data, Security in a Networked Future. ACM-TURING 2012: 14:1 - [c104]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. CCS 2012: 265-280 - [c103]Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, Mihai Patrascu:
Picture-Hanging Puzzles. FUN 2012: 81-93 - [c102]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec 2012: 248-263 - [c101]Ronald L. Rivest, Emily Shen:
A Bayesian Method for Auditing Elections. EVT/WOTE 2012 - [i15]Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, Mihai Patrascu:
Picture-Hanging Puzzles. CoRR abs/1203.3602 (2012) - [i14]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". IACR Cryptol. ePrint Arch. 2012: 103 (2012) - [i13]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. IACR Cryptol. ePrint Arch. 2012: 579 (2012) - 2011
- [j60]Ronald L. Rivest:
The invertibility of the XOR of rotations of a binary word. Int. J. Comput. Math. 88(2): 281-284 (2011) - [j59]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. J. Cryptol. 24(3): 588-613 (2011) - [c100]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to tell if your cloud files are vulnerable to drive crashes. CCS 2011: 501-514 - [c99]Thomas R. Magrino, Ronald L. Rivest, Emily Shen:
Computing the Margin of Victory in IRV Elections. EVT/WOTE 2011 - [r2]Ronald L. Rivest, Burt Kaliski:
RSA Problem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1065-1069 - 2010
- [j58]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 5(1): 194 (2010) - [c98]Alan T. Sherman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, Poorvi L. Vora:
Scantegrity Mock Election at Takoma Park. Electronic Voting 2010: 45-61 - [c97]Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. USENIX Security Symposium 2010: 291-306 - [c96]Shuki Bruck, David R. Jefferson, Ronald L. Rivest:
A Modular Voting Architecture ("Frog Voting"). Towards Trustworthy Elections 2010: 97-106 - [e8]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents] - [i12]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. IACR Cryptol. ePrint Arch. 2010: 214 (2010)
2000 – 2009
- 2009
- [b4]Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein:
Introduction to Algorithms, 3rd Edition. MIT Press 2009, ISBN 978-0-262-03384-8, pp. I-XIX, 1-1292 - [j57]Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora:
Guest editorial: special issue on electronic voting. IEEE Trans. Inf. Forensics Secur. 4(4): 593-596 (2009) - [j56]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 4(4): 611-627 (2009) - [c95]Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen:
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. FSE 2009: 104-121 - 2008
- [c94]Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest:
On Auditing Elections When Precincts Have Different Sizes. EVT 2008 - [c93]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008 - [e7]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - 2007
- [c92]Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee:
Amplifying Collision Resistance: A Complexity-Theoretic Treatment. CRYPTO 2007: 264-283 - [c91]Ronald L. Rivest:
Security of Voting Systems. NSDI 2007 - [c90]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross J. Anderson, Ronald L. Rivest:
On the Security of the EMV Secure Messaging API (Extended Abstract). Security Protocols Workshop 2007: 147-149 - [c89]Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross J. Anderson:
Robbing the Bank with a Theorem Prover - (Abstract). Security Protocols Workshop 2007: 171 - [c88]Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest:
On Estimating the Size and Confidence of a Statistical Audit. EVT 2007 - [i11]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i10]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - 2006
- [c87]Ronald L. Rivest, Adi Shamir, Yael Tauman:
How to Leak a Secret: Theory and Applications of Ring Signatures. Essays in Memory of Shimon Even 2006: 164-186 - [c86]John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung:
Fourth-factor authentication: somebody you know. CCS 2006: 168-178 - [c85]Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest:
Lightweight Email Signatures (Extended Abstract). SCN 2006: 288-302 - [c84]Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest:
Phish and Chips. Security Protocols Workshop 2006: 40-48 - [c83]Ben Adida, Ronald L. Rivest:
Scratch & vote: self-contained paper-based cryptographic voting. WPES 2006: 29-40 - [e6]Dan S. Wallach, Ronald L. Rivest:
2006 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, Vancouver, BC, Canada, August 1, 2006. USENIX Association 2006 [contents] - 2005
- [c82]Ben Adida, Susan Hohenberger, Ronald L. Rivest:
Lightweight Encryption for Email. SRUTI 2005 - [r1]Ronald L. Rivest, Burton S. Kaliski Jr.:
RSA Problem. Encyclopedia of Cryptography and Security 2005 - 2004
- [j55]Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest:
Access-controlled resource discovery in pervasive networks. Concurr. Pract. Exp. 16(11): 1099-1120 (2004) - [c81]Ronald L. Rivest:
Peppercoin Micropayments. Financial Cryptography 2004: 2-8 - [c80]Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design. ITCC (2) 2004: 569-577 - [c79]Ronald L. Rivest:
On the Notion of Pseudo-Free Groups. TCC 2004: 505-521 - 2003
- [c78]Ari Juels, Ronald L. Rivest, Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy. CCS 2003: 103-111 - [c77]Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot:
Does Anyone Really Need MicroPayments? Financial Cryptography 2003: 69-76 - [c76]Sanjay Raman, Dwaine E. Clarke, Matt Burnside, Srinivas Devadas, Ronald L. Rivest:
Access-Controlled Resource Discovery for Pervasive Networks. SAC 2003: 338-345 - [c75]Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels:
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. SPC 2003: 201-212 - 2002
- [c74]Moses D. Liskov, Ronald L. Rivest, David A. Wagner:
Tweakable Block Ciphers. CRYPTO 2002: 31-46 - [c73]Silvio Micali, Ronald L. Rivest:
Micropayments Revisited. CT-RSA 2002: 149-163 - [c72]Silvio Micali, Ronald L. Rivest:
Transitive Signature Schemes. CT-RSA 2002: 236-243 - [c71]Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151 - [c70]Dwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest:
The Untrusted Computer Problem and Camera-Based Authentication. Pervasive 2002: 114-124 - [c69]Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:
Proxy-based security protocols in networked mobile devices. SAC 2002: 265-272 - [c68]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 - [i9]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. IACR Cryptol. ePrint Arch. 2002: 25 (2002) - 2001
- [b3]Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein:
Introduction to Algorithms, Second Edition. The MIT Press and McGraw-Hill Book Company 2001, ISBN 0-262-03293-7 - [j54]Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest:
Certificate Chain Discovery in SPKI/SDSI. J. Comput. Secur. 9(4): 285-322 (2001) - [c67]Ronald L. Rivest, Adi Shamir, Yael Tauman:
How to Leak a Secret. ASIACRYPT 2001: 552-565 - [c66]Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung:
The Business of Electronic Voting. Financial Cryptography 2001: 234-259 - [i8]Ronald L. Rivest, Robert Silverman:
Are 'Strong' Primes Needed for RSA. IACR Cryptol. ePrint Arch. 2001: 7 (2001) - 2000
- [c65]Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin:
RC6 as the AES. AES Candidate Conference 2000: 337-342
1990 – 1999
- 1999
- [j53]Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, Mona Singh:
Piecemeal Graph Exploration by a Mobile Robot. Inf. Comput. 152(2): 155-172 (1999) - [j52]Mihir Bellare, Ronald L. Rivest:
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. J. Cryptol. 12(2): 117-139 (1999) - [c64]Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin:
Improved Analysis of Some Simplified Variants of RC6. FSE 1999: 1-15 - [c63]Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 - [i7]Carl M. Ellison, Bill Frantz, Butler W. Lampson, Ron Rivest, Brian Thomas, Tatu Ylönen:
SPKI Certificate Theory. RFC 2693: 1-43 (1999) - 1998
- [c62]Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest:
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. CRYPTO 1998: 153-168 - [c61]Ronald L. Rivest:
Can We Eliminate Certificate Revocations Lists? Financial Cryptography 1998: 178-183 - [c60]Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:
On the Design and Security of RC2. FSE 1998: 206-221 - [i6]Ron Rivest:
A Description of the RC2(r) Encryption Algorithm. RFC 2268: 1-11 (1998) - 1997
- [j51]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh,