Ronald L. Rivest
Ronald L. Rivest
MIT Institute Professor
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Introduction to algorithms
TH Cormen, CE Leiserson, RL Rivest, C Stein
MIT press, 2009
562242009
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
227861978
The MD5 message-digest algorithm
R Rivest, S Dusse
MIT Laboratory for Computer Science 6644, 330-344, 1992
59421992
The MD5 message-digest algorithm
R Rivest, S Dusse
MIT Laboratory for Computer Science 6644, 330-344, 1992
59401992
A digital signature scheme secure against adaptive chosen-message attacks
S Goldwasser, S Micali, RL Rivest
SIAM Journal on computing 17 (2), 281-308, 1988
32871988
On data banks and privacy homomorphisms
RL Rivest, L Adleman, ML Dertouzos
Foundations of secure computation 4 (11), 169-180, 1978
22071978
Security and privacy aspects of low-cost radio frequency identification systems
SA Weis, SE Sarma, RL Rivest, DW Engels
Security in pervasive computing, 201-212, 2004
21482004
How to leak a secret
RL Rivest, A Shamir, Y Tauman
International Conference on the Theory and Application of Cryptology and …, 2001
17532001
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
16021983
Time bounds for selection
M Blum, RW Floyd, VR Pratt, RL Rivest, RE Tarjan
J. Comput. Syst. Sci. 7 (4), 448-461, 1973
15441973
Introduction to algorithms
Thomas H.. Cormen, CE Leiserson, RL Rivest, C Stein
MIT press 5, 2-2, 2001
15202001
The RC5 encryption algorithm
RL Rivest
International Workshop on Fast Software Encryption, 86-96, 1994
14621994
The blocker tag: Selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
12822003
SPKI certificate theory
C Ellison, B Frantz, B Lampson, R Rivest, B Thomas, T Ylonen
RFC 2693, 1999
12291999
Learning decision lists
RL Rivest
Machine learning 2 (3), 229-246, 1987
11781987
Constructing optimal binary decision trees is NP-complete
H Laurent, RL Rivest
Information processing letters 5 (1), 15-17, 1976
11381976
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
10061996
Inferring decision trees using the minimum description lenght principle
JR Quinlan, RL Rivest
Information and computation 80 (3), 227-248, 1989
9801989
The MD4 message digest algorithm
RL Rivest
Conference on the Theory and Application of Cryptography, 303-311, 1990
8911990
Orthogonal packings in two dimensions
BS Baker, EG Coffman, Jr, RL Rivest
SIAM Journal on computing 9 (4), 846-855, 1980
8221980
The system can't perform the operation now. Try again later.
Articles 1–20