" Benchmark" Channel-routing Problems RL Rivest
Department of Electrical Engineering and Computer Science, Massachusetts …, 1982
12 1982 " The RC6 block cipher," Submission to AES RL RIVEST
http://www. rsa. com/, 1998
1998 " Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer," manuscript R Rivest
http://people. csail. mit. edu/rivest/Rivest-commitment. pdf, 1999
5 1999 “Forwards and backwards” encryption RL Rivest
Cryptologia 4 (1), 30-33, 1980
9 1980 -Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election AuditsM Sridhar, RL Rivest
arXiv preprint arXiv:1811.08811, 2018
2 2018 07311 Abstracts Collection--Frontiers of Electronic Voting D Chaum, M Kutylowski, RL Rivest, PYA Ryan
Dagstuhl Seminar Proceedings, 2008
2008 07311 Executive Summary--Frontiers of Electronic Voting D Chaum, M Kutylowski, RL Rivest, PYA Ryan
Dagstuhl Seminar Proceedings, 2008
2008 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier
13TH ANNUAL ACM-SIGACT SYMPOSIUM ON THE THEORY OF COMPUTING HELD MAY 11-13 1981, IN MILWAUKEE-EDITORS FOREWORD R DEMILLO, R RIVEST, EK BLUM
JOURNAL OF COMPUTER AND SYSTEM SCIENCES 26 (3), 279-279, 1983
1983 33.3: Finding the convex hull TH Cormen, CE Leiserson, RL Rivest, C Stein
Introduction to Algorithms, 955-956, 1990
9 1990 6.045 J/18.400 J Automata, Computability, and Complexity, Spring 2002 RL Rivest
2002 6.857 Computer & network security final project: Differential fault analysis JJ Floyd, KE Fu, P Sun, RL Rivest
4 1996 6.857 Network and Computer Security, Fall 2003 R Rivest
2003 8.1 Curs Metode de predare Observaţii AV Aho, JE Hopcroft, JD Ullman, TH Cormen, C Leiserson, R Rivest
9. A Method for Obtaining Digital Signatures and RL Rivest, A Shamir
Secure Communications And Asymmetric Cryptosystems, 217, 2019
2019 A ‘greedy’channel router RL Rivest, CM Fiduccia
Computer-Aided Design 15 (3), 135-140, 1983
432 1983 A Bayesian Method for Auditing Elections. RL Rivest, E Shen
EVT/WOTE, 2012
14 2012 A constructivist approach to artificial intelligence reexamined RM Ramstad
Massachusetts Institute of Technology, 1992
5 1992 A Data Structure for Manipulating Priority Queues SL Graham, RL Rivest
Communications, 1978
1978 A description of a single-chip implementation of the RSA public-key cryptosystem RL Rivest
NTC Conference Record 3, 1980
7 1980