Ronald L. Rivest
Ronald L. Rivest
MIT Institute Professor
Verified email at - Homepage
TitleCited byYear
Introduction to algorithms
TH Cormen, CE Leiserson, RL Rivest, C Stein
MIT press, 2009
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
The MD5 message-digest algorithm
R Rivest, S Dusse
MIT Laboratory for Computer Science 6644, 330-344, 1992
The MD5 message-digest algorithm
R Rivest, S Dusse
MIT Laboratory for Computer Science 6644, 330-344, 1992
A digital signature scheme secure against adaptive chosen-message attacks
S Goldwasser, S Micali, RL Rivest
SIAM Journal on Computing 17 (2), 281-308, 1988
Security and privacy aspects of low-cost radio frequency identification systems
SA Weis, SE Sarma, RL Rivest, DW Engels
Security in pervasive computing, 201-212, 2004
On data banks and privacy homomorphisms
RL Rivest, L Adleman, ML Dertouzos
Foundations of secure computation 4 (11), 169-180, 1978
How to leak a secret
RL Rivest, A Shamir, Y Tauman
International Conference on the Theory and Application of Cryptology and …, 2001
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
Time bounds for selection
M Blum, RW Floyd, VR Pratt, RL Rivest, RE Tarjan
J. Comput. Syst. Sci. 7 (4), 448-461, 1973
The RC5 encryption algorithm
RL Rivest
International Workshop on Fast Software Encryption, 86-96, 1994
The blocker tag: Selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
SPKI certificate theory
C Ellison, B Frantz, B Lampson, R Rivest, B Thomas, T Ylonen
RFC 2693, 1999
Learning decision lists
RL Rivest
Machine learning 2 (3), 229-246, 1987
Constructing optimal binary decision trees is NP-complete
H Laurent, RL Rivest
Information processing letters 5 (1), 15-17, 1976
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
Inferring decision trees using the minimum description lenght principle
JR Quinlan, RL Rivest
Information and computation 80 (3), 227-248, 1989
The MD4 message digest algorithm
RL Rivest
Conference on the Theory and Application of Cryptography, 303-311, 1990
Orthogonal packings in two dimensions
BS Baker, EG Coffman, Jr, RL Rivest
SIAM Journal on computing 9 (4), 846-855, 1980
RFC1321: The MD5 message-digest algorithm
R Rivest
RFC Editor, 1992
The system can't perform the operation now. Try again later.
Articles 1–20