Ronald L. Rivest: Publications and Talks

A fairly complete listing of my publications, talks, drafts, patents, and other miscellania, in a new format. (The old format version is still available here.) Another nice listing is available from Google Scholar.

Entries are listed in reverse chronological order. Each entry has a "key" usually consisting of the first letter of each author's last name (truncated and ending with "x" if there are more than five co-authors), followed by a two-digit year (and possibly a final distinguishing lower-case letter to eliminate ambiguities); these keys should be stable (except possibly for the current year). An entry may provide links to content or additional information, such as:

Some links may be "blocked" (for copyright reasons); these links appear italicized in parentheses, but will cause an error if clicked. If for some reason you need help obtaining a copy of an article, please send an email, giving the key (e.g. AR06) of the article you are looking for, to my assistant <rivest-assistant@csail.mit.edu>, who should be able to help you.

This listing produced automagically from a bibtex file (Sun Dec 10 11:52:50 2017). Please let me know of broken links or other errors.

Return to my home page.


357.  [Riv17f] Risk-Limiting Audits. Ronald L. Rivest. (2017-12-07) Talk given at Fourth NASEM committee meeting on Future of Voting
       bib   pdf   ppt   NASEM Future of Voting   link   

356.  [BHRVx17] Public Evidence from Secret Ballots. Matthew Bernhard, J. Alex Halderman, Ronald Rivest, Poorvi Vora, Peter Ryan, Vanessa Teague, Josh Benaloh, Philip Stark, and Dan Wallach. {E-Vote-ID 2017} (Bregenz, Austria, 2017)(2017-10-25)
       bib   pdf   conference   arXiv   link   

355.  [LRLGx17] MIT Turing laureates propose creation of School of Computing. Butler Lampson, Ronald L. Rivest, Barbara Liskov, Shafi Goldwasser, Silvio Micali, Michael Stonebraker, and Tim Berners-Lee. The Tech (2017-09-21)
       bib   pdf   Tech   link   

354.  [Riv17e] Remarks on Election Integrity. Ronald L. Rivest. (2017-09-12) Testimony given at meeting of the Presidential Advisory Committee on Election Integrity (Verbal testimony as notes in ppt file, and in pdf file.)
       bib   pdf   ppt   video   commission   link   

353.  [Bis17] Open-Source Software Won't Ensure Election Security. Matt Bishop. Lawfare (2017-08-24) (Matt Bishop is author; I was just one of several contributors whose ideas are represented in this article.)
       bib   pdf   lawfare   link   

352.  [BJR17] Wireless wearable authenticators using attachment to confirm user possession. Kevin D. Bowers, Ari Juels, and Ronald L. Rivest. U.S. Patent 9,740,844. Issued August 22, 2017. (2017-08-22)
       bib   text(google)   link   

351.  [Riv17d] Post-Election Audits. Ronald L. Rivest. (2017-06-12) Talk given at NASEM Future of Voting meeting
       bib   ppt   committee   link   

350.  [RS17] When is an election verifiable?. Ronald L. Rivest and Philip B. Stark. {IEEE Security and Privacy} (2017) pp. 48--50.
       bib   doi   pdf   link   

349.  [RSP17] BatchVote: Voting rules designed for auditability. Ronald L. Rivest, Philip B. Stark, and Zara Perumal. Voting'17 workshop (associated with Financial Crypto 2017) (Malta, 2017)(2017-04-07)
       bib   workshop   paper   link   

348.  [PR17a] Marked mix-nets. Olivier Pereira and Ronald L. Rivest. Voting'17 workshop (associated with Financial Crypto 2017) (Malta, 2017)(2017-04-07)
       bib   workshop   paper   link   

347.  [PR17] Towards Secure Quadratic Voting. Sunoo Park and Ronald L. Rivest. Public Choice (2017) pp. 1--25.
       bib   doi   pdf   link   

346.  [Riv17c] Charities for the Trump Era. Alexander J. Rivest and Ronald L. Rivest. Medium (2017-02-05)
       bib   pdf   medium   link   

345.  [Riv17a] 11438162575788886766923577997614661201 (etc). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2017-02-02) The RSA-129 story.
       bib   url   link   

344.  [Riv17b] ClipAudit---A Simple Post-Election Risk-Limiting Audit. Ronald L. Rivest. arXiv:1701.08312 (2017-01-28)
       bib   pdf   arXiv   link   

343.  [AAEGR17] Time-space trade-offs in population protocols. Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, and Ronald L. Rivest. SODA'17 (Barcelona, Spain, 2017)Proceedings of the Twenty-Eighth Symposium on Discrete Algorithms. (2017-01) pp. 2560-2579.
       bib   pdf   conference version   link   

342.  [JR17] Determining authenticity based on indicators derived from information relating to historical events. Ari Juels and Ronald L. Rivest. U.S. Patent 9,537,845. Issued January 3, 2017. (2017-01-03)
       bib   link   

341.  [RV16] Software Independence Revisited. Ronald L. Rivest and Madars Virza. Chapter 1. Real-World Electronic Voting: Design, Analysis, and Deployment. Feng Hao and Peter Y. A. Ryan (eds.) (CRC Press, 2016) pp. 3--17. (2016)
       bib   pdf   CRC   Amazon   link   

340.  [BGHKx16] The Optimality of Correlated Sampling. Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald Rivest, and Madhu Sudan. ECCC Report TR16-194 (2016-12-04)
       bib   url   pdf   arXiv   link   

339.  [Riv16t] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk presented at U.C. Davis Computer Science Department (2016-12-01)
       bib   slides.pdf   video   link   

338.  [RS16] Still time for an election audit. Ron Rivest and Philip Stark. USA Today (2016-11-18)
       bib   url   pdf   link   

337.  [Riv16v] Technical Remarks on Government Access to Plaintext. Ronald L. Rivest. Talk presented at meeting of National Academies panel on "Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Tradeoffs" (2016-11-11)
       bib   url   pdf   link   

336.  [Riv16w] Was YOUR vote counted? (feat. homomorphic encryption). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2016-11-07)
       bib   url   link   

335.  [Riv16r] How to Check Election Results (feat. Polya's Urn). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2016-11-07)
       bib   url   link   

334.  [JVDOR16] Scheduling Of Defensive Security Actions In Information Processing Systems. Ari Juels, Marten Erik van Dijk, Alina M. Oprea, and Ronald L. Rivest. U.S. Patent 9,471,777. Issued October 18, 2016. (2016-10-18)
       bib   pdf   link   

333.  [CPRBx16] Auditing Australian Senate Ballots. Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle Blom, Chris Culnane, and Vanessa Teague. arXiv:1610.00127 (2016-10-01)
       bib   pdf   arXiv   link   

332.  [Spe16] Apple's Cloud Key Vault, Exceptional Access, and False Equivalences. Michael A. Specter et al.. Lawfare (2016-09-07) (Under byline of Michael A. Specter, but full list of contributors is: Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner.)
       bib   url   link   

331.  [KR16] Election Auditing and Verifiability. Joseph Kiniry and Ronald L. Rivest. (2016-09) Letter to the Editor in response to Mercuri/Neurmann "Inside Risks" article in June 2016 CACM issue.
       bib   pdf   link   

330.  [Riv16u] Symmetric Encryption via Keyrings and ECC. Ronald L. Rivest. Talk given for ArcticCrypt 2016 (Svalbard, Norway). (2016-07-18)
       bib   pdf   link   

329.  [Wei16] Warning Signs: A Checklist for Recognizing Flaws of Proposed ``Exceptional Access'' Systems. Daniel J. Weitzner et al.. Lawfare (2016-05-11) (Under byline of Danny Weitzner, but full list of contributors is: Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner.)
       bib   url   pdf   link   

328.  [PR16] Towards Secure Quadratic Voting. Sunoo Park and Ronald L. Rivest. Cryptology ePrint Archive, Report 2016/400 (rev. 23 Aug 2016) (2016-04-21) Commissioned to appear in Public Choice 2017.
       bib   url   pdf   link   

327.  [Riv16s] On the Growth of Cryptography. Ronald L. Rivest. Talk given at Brown University as part of their 2016 Cybersecurity Speaker Series. (2016-04-14)
       bib   url   pdf   link   

326.  [Riv16x] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk sponsored by ACM and IEEE; given at MIT Broad Institute. (2016-03-16)
       bib   pdf   ppt   link   

325.  [Riv16z] Internet Voting---Seriously?. Ronald L. Rivest. Talk on panel on Internet Voting at EVN Conference 2016 (2016-03-11)
       bib   slides.pdf   conference   link   

324.  [AAEGR16] Time-Space Trade-offs in Population Protocols. Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, and Ronald L. Rivest. CoRR abs/1602.08032(2016) (version 7: April 17, 2017)
       bib   url   pdf   link   

323.  [Riv16y] Keys Under Doormats. Ronald L. Rivest. Invited ("surprise speaker") talk given at the Enigma Conference (San Francisco) (2016-01-27)
       bib   pdf   ppt   conference   conference-media   video   link   

322.  [MNFRH15] Paris, San Bernardino, law enforcement and encryption . Rep. Jerry McNerney (D-Calif.), Rep. Bill Foster (D-Ill.), Ronald Rivest, and Martin Hellman. The Hill. (2015-12-14)
       bib   url   pdf   link   

321.  [AABBx15x] Keys under doormats: mandating insecurity by requiring government access to all data and communications. Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. Journal of Cybersecurity (2015)
       bib   doi   pdf   link   

320.  [Riv15y] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk given as Capital One Fall Distinguished Lecture, Georgia Tech Institute for Security and Privacy (2015-10-27)
       bib   pdf   ppt   web-site   video   link   

319.  [AABBx15y] Keys Under Doormats. Harold ``Hal'' Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matthew Blaze, Whitfield ``Whit'' Diffie, John Gilmore, Matthew Green, Peter G. Neumann, Susan Landau, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner. Comm. ACM 58,10 (2015) pp. 24--26. For full report see AABBx15.
       bib   doi   pdf   link   

318.  [Riv15x] DiffSum---A Simple Post-Election Risk-Limiting Audit. Ronald L. Rivest. arXiv:1509.00127 (2015-09-01)
       bib   pdf   arXiv   link   

317.  [VDTJR15] Forward secure pseudorandom number generation resilient to forward clock attacks. Marten Van Dijk, Nickolaos Triandopoulos, Ari Juels, and Ronald Rivest. U.S. Patent 9,083,515. Issued July 14, 2015. (2015-07-14)
       bib   pdf   google-patent-page   link   

316.  [AABBx15] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications. Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, y Matthew Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Peter G. Neumann, Susan Landau, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner. MIT CSAIL, TR-2015-026 (2015)
       bib   url   pdf   link   

315.  [OVF15] The Future of Voting: End-to-End Verifiable Internet Voting --- Specification and Feasibility Study. Overseas Vote Foundation. (2015-07) (I was on the Advisory Council for this report.)
       bib   pdf   OVF project page   link   

314.  [Riv15z] On the growth of cryptography. Ronald L. Rivest. Talk given June 3, 2015 at Simons Institute Program in Cryptography (U.C. Berkeley), Historical talk series (2015-06-03)
       bib   slides.pdf   video-and-slides   link   

313.  [BRRSx15] End-to-end verifiability. Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, and Poorvi L. Vora. (2015-04-15) (This work is also part of the OVF E2EIV report.)
       bib   arxiv   link   

312.  [MR15] Method and system for micropayment transactions. Silvio Micali and Ronald L. Rivest. U.S. Patent 8,983,874. Issued March 17, 2015. (2015-03-17)
       bib   pdf   google-patent-page   link   

311.  [NABDx15] System and method providing disconnected authentication. A. Nanopoulos, K. Ackerman, P. Bowness, W. Duane, M. Jakobsson, B. Kaliski, D. Pal, S.D. Rice, and R.L. Rivest. U.S. Patent 8,966,276. Issued February 24, 2015. (2015-02-24)
       bib   pdf   google-patent-page   link   

310.  [ERS14] Leading the Field: Fortune Favors the Bold in Thurstonian Choice Models. Steven N. Evans, Ronald L. Rivest, and Philip B. Stark. (2014-09-20)
       bib   arxiv   link   

309.  [RS14] Spritz---A spongy RC4-like stream cipher and hash function. Ronald L. Rivest and Jacob C. N. Schuldt. (2014-08-19) Presented at Charles River Crypto Day (2014-10-24).
       bib   pdf   slides.pdf   crypto-day   iacr/eprint/2016/856   link   

308.  [BVDJx14] Graph-based approach to deterring persistent security threats. K.D. Bowers, M.E. Van Dijk, A. Juels, A.M. Oprea, R.L. Rivest, and N. Triandopoulos. U.S. Patent 8,813,234. Issued August 19, 2014. (2014-08-19)
       bib   pdf   google-patent-page   link   

307.  [RR14b] Efficient End to End Verifiable Electronic Voting Employing Split Value Representations. Michael O. Rabin and Ronald L. Rivest. (2014-08-11) Proc. EVOTE 2014 (Bregenz, Austria). (Improvement of an earlier version)
       bib   pdf   conference-version   conference   link   

306.  [NIST14] VCAT Report on NIST Cryptographic Standards and Guidelines Process. NIST. (2014-07)
       bib   url   pdf   link   

305.  [Riv14b] University of Waterloo Convocation Address (Faculty of Mathematics). Ronald L. Rivest. (LiveStream) (2014-06-13)
       bib   pdf   video   link   

304.  [RR14a] Practical Provably Correct Voter Privacy Protecting End to End Voting Employing Multiparty Computations and Split Value Representations of Votes. Michael O. Rabin and Ronald L. Rivest. (2014-05-12) CalTech/MIT Voting Technology Project Working Paper 124.
       bib   pdf   VTP-WP-124   code   link   

303.  [RJ14] Key Update with Compromise Detection. Ronald L. Rivest and Ari Juels. U.S. Patent 8,699,713. Issued April 15, 2014 (2014-04-15)
       bib   pdf   google-patent-page   link   

302.  [RR14] Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking. Michael O. Rabin and Ronald L. Rivest. (2014-04-03) CalTech/MIT Voting Technology Project Working Paper 122.
       bib   pdf   VTP-WP-122   link   

301.  [DDMMx14] Picture-Hanging Puzzles. Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, and Mihai P{\u{a}}tra{\c{s}}cu. Theory of Computing Systems 54,4 (2014) pp. 531--550.
       bib   pdf   link   

300.  [BR14] Honeywords: A New Tool for Protections From Password Database Breach. Kevin Bowers and Ronald L. Rivest. Presented at RSA Conference 2014 (2014-02-26)
       bib   pdf   pptx   RSA Conference 2014   link   

299.  [Riv14a] Genetic Modification For Cell Pedigree Labels To Aid Disease Treatment. Ronald L. Rivest. (2014-02-18) Unpublished draft.
       bib   pdf   link   

298.  [Riv14c] Reflections on SDSI. Ronald L. Rivest. (2014-02-13) Given at LampsonFest (Microsoft, Cambridge, MA) in celebration of Butler Lampson's birthday.
       bib   pdf   link   

297.  [Ax14] An Open Letter from US Researchers in Cryptography and Information Security. Martin Abadi and others. (2014-01-24)
       bib   url   pdf   link   

296.  [JR13] Honeywords: Making Password-Cracking Detectable. Ari Juels and Ronald L. Rivest. CCS'13 (Berlin, Germany, 2013)Proc. ACM CCS'13. (2013-11-04) pp. 145--159.
       bib   acm   doi   pdf   gen.py   Honeywords-Project-Page   link   

295.  [BJRS13a] User Authentication Based on Voucher Codes. John G. Brainard, Ari Juels, Ronald L. Rivest, and Michael Szyldo. U.S. Patent 8,438,617. Issued May 7, 2013. (2013-05-07)
       bib   pdf   google-patent-page   link   

294.  [BJRS13b] Drifting Keys: Impersonation Detection for Constrained Devices. Kevin D. Bowers, Ari Juels, Ronald L. Rivest, and Emily Shen. INFOCOM 2013 (Turin, Italy, 2013)Proc. INFOCOM 2013. (2013-04-14)
       bib   pdf   INFOCOM'13   link   

293.  [JVDOx13] Remote Verification of File Protections for Cloud Data Storage. Ari Juels, Marten van Dijk, Alina Oprea, Ronald L. Rivest, and Emil P. Stefanov. U.S. Patent 8,346,742. Issued January 1, 2013. (2013-01-01)
       bib   pdf   google-patent-page   link   

292.  [DJOR13] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. J. Cryptology 26(2013) pp. 655-713.
       bib   doi   pdf   link   

291.  [SE12] Letter to President Obama on Voting. Barbara Simons and others. (2012-12-05)
       bib   pdf   VV-posting   blog   link   

290.  [AE12] Letter to President Obama on Election Reform and Verification. Kim Alexander and others. (2012-11-20)
       bib   pdf   CalVoter-posting   blog   link   

289.  [Riv12d] Turing and the Growth of Cryptography. Ronald L. Rivest. Invited talk at Boston University Turing 100 Celebration. (2012-11-11)
       bib   slides.pdf   event   link   

288.  [BVDGx12] Defending against the Unknown Enemy: Applying FlipIt to System Security. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. GameSec'12 (Budapest, Hungary, 2012)Proc. GameSec 2012. Jens Grossklags and Jean Walrand (eds.) (2012-11-05) pp. 248--263.
       bib   doi   pdf   GameSec'12   ePrint(extended-version)   link   

287.  [Riv12c] Thoughts On Appropriate Technologies for Voting. Ronald L. Rivest. Invited keynote given at online special event, ``E-Voting: Risk and Opportunity,'' organized by the Center for Information Technology and Policy (CITP) at Princeton University. (2012-11-01)
       bib   slides.pdf   event   video   link   

286.  [AKSRx12] Voting: What Has Changed, What Hasn't, & What Needs Improvement. R. Michael Alvarez, Jonathan N. Katz, Charles Stewart III, Ronald L. Rivest, Stephen Ansolabehere, and Thad E. Hall. Caltech/MIT Voting Technology Project (2012)
       bib   url   pdf   link   

285.  [DJORx12] Hourglass schemes: how to prove that cloud files are encrypted. Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos. CCS'12 (Raleigh, NC, 2012)Proc. CCS'12 ACM Conference on Computer and Communications Security. George Danezis and Virgil Gligor (eds.) (2012-10-16/2012-10-18) pp. 265--280.
       bib   acm   doi   pdf   CCS'12   link   

284.  [RLAWG12] Risk-Limiting Post-Election Audits: Why and How. Risk-Limiting Audits Working Group. (2012-10) (Version 1.1)
       bib   pdf   link   

283.  [RS12z] A Bayesian Method for Auditing Elections. Ronald L. Rivest and Emily Shen. EVT/WOTE'12 (Seattle, WA, 2012)Proceedings 2012 EVT/WOTE Conference. J. Alex Halderman and Olivier Pereira (eds.) (2012-08-07)
       bib   url   pdf   slides.pdf   EVT/WOTE'12   video   link   

282.  [Riv12b] Remarks on Turing and cryptography. Ronald L. Rivest. (2012-06-16) This note contains remarks made at a panel discussion entitled "Information Data Security in a Networked Future" June 16, 2012 at the ACM Turing Centenary in San Francisco, CA.
       bib   txt   ACM-Turing-Centenary   webcast   link   

281.  [DDMMx12] Picture-Hanging Puzzles. Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, and Mihai P{\u a}trascu. FUN 2012 (Venice, Italy, 2012)Proceedings of the Sixth International Conference on Fun with Algorithms. Evangelos Kranakis, Danny Krizanc, and Flaminia Luccio (eds.) (2012-06) pp. 81--93.
       bib   pdf   conference   arXiv   link   

280.  [Riv12a] Protecting your vote. Ronald L. Rivest. Published in The Boston Globe, in The Podium section (2012-04-03)
       bib   url   txt   link   

279.  [DJOR12] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. (2012-02-26) IACR ePrint Archive Report 2012/103.
       bib   url   pdf   associated-talk   RSA-Labs-FlipIt-site   link   

278.  [RS12y] Statistical Robustness of Voting Rules. Ronald L. Rivest and Emily Shen. (2012-01-25)
       bib   pdf   slides.pdf   ver-2012-01-25.pdf   link   

277.  [RSX11] Complexity of Computing the Margin of Victory for Various Voting Rules. Ronald L. Rivest, Emily Shen, and Lirong Xia. Poster session at First Cambridge Area Economics and Computation Day (2011-11-18)
       bib   shen-slides.pdf   shen-slides.pptx   CAEC'11   link   

276.  [Riv11d] Remarks on On-line Voting (aka ``Internet Voting''). Ronald L. Rivest. Panel discussion, reported on by Luther Weeks. (2011-10-27) On October 27th, 2011, I participated in a panel about on-line voting ("internet voting"), held at Central Connecticut State University, that was organized by the office of Connecticut's Secretary of State, Denise Miller. A sumary of this event, including videos, can be found at the following url. A PBS NewsHour report (2/16/2012) on ``Internet Voting: Will Democracy or Hackers Win?'' featured clips from this event.
       bib   url   PBS-NewsHour   link   

275.  [BDJOR11] How to Tell if Your Cloud Files are Vulnerable to Drive Crashes. Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. CCS'11 (Chicago, Illinois, 2011)Proceedings 18th Annual ACM Conference on Computer and Communications Security. George Danezis and Vitaly Shmatikov (eds.) (2011) pp. 501--514.
       bib   acm   doi   pdf   CCS'11   link   

274.  [Riv11c] Remarks on the Future of Election Integrity. Ronald L. Rivest. Panel discussion (2011-10-01) Panel remarks given at EIPPF 2011 (Election Integrity: Past, Present, and Future) workshop, held at MIT on October 1, 2011. The following links give (a rough version of) my remarks, and the url links to videos of EIPPF 2011 (my talk in is the third panel, on "The Future").
       bib   url   txt   link   

273.  [Riv11b] Illegitimi non carborundum. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2011 (2011-08-15) A link to the slides and associated movie (which needs to be in the same directory when shown) is given below. (This talk was given again, in brisker form, at the 2011-08-30 Celebration for Michael Rabin at Harvard.) More information on FlipIt, including a link to an interactive version of the game, will become available at http://www.rsa.com/flipit.
       bib   slides.mov   slides.pdf   associated-paper   link   

272.  [MRSW11] Computing the Margin of Victory in IRV Elections. Thomas R. Magrino, Ronald L. Rivest, Emily Shen, and David Wagner. EVT/WOTE'11 (San Francisco, California, 2011)Proceedings 2011 EVT/WOTE Conference. Hovav Shacham and Vanessa Teague (eds.) (2011-08-08) The online conference proceedings provide a link to Magrino's talk slides and a video of his presentation.
       bib   url   pdf   link   

271.  [Riv11f] On the contributions of Alan Turing. Ronald L. Rivest. Remarks given March 15, 2011 at the American Academy of Arts and Science, Cambridge, MA, in association with readings from "Breaking the Code". (2011-03-15)
       bib   remarks-video   event-site   link   

270.  [Riv11a] The growth of cryptography. Ronald L. Rivest. Talk given February 8, 2011 at my Killian award lecture. (2011-02-08)
       bib   slides.pdf   video   better-video   press   link   

269.  [Riv11e] On the invertibility of the XOR of rotations of a binary word. Ronald L. Rivest. International Journal of Computer Mathematics 88,2 (2011) pp. 281--284.
       bib   doi   prepub.pdf   link   

268.  [LRW11] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. Journal of Cryptology 24,3 (2011) pp. 588--613.
       bib   doi   pdf   link   

267.  [HRS11] Sharper p-values for stratified election audits. Michael J. Higgins, Ronald L. Rivest, and Philip B. Stark. Statistics, Politics, and Policy 2,1, Article 7 (2011)
       bib   doi   pdf   link   

266.  [RS10] An Optimal Single-Winner Preferential Voting System Based on Game Theory. Ronald L. Rivest and Emily Shen. COMSOC 2010 (D\"{u}sseldorf, Germany, 2010)Proceedings Third International Workshop on Computational Social Choice. Vincent Conitzer and J\"{o}rg Rothe (eds.) (2010-09)
       bib   url   conference.pdf   full.pdf   workshop   code   Wikipedia on maximal lotteries   link   

265.  [CCCCx10] Scantegrity II Municipal Election at Takoma Park: The first E2E Binding Governmental Election with Ballot Privacy. Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. USENIX '10 (Washington, D.C., 2010)Proceedings USENIX Security 2010. Ian Goldberg (ed.) (2010)
       bib   url   pdf   link   

264.  [Riv10] Thoughts on UOCAVA voting. Ronald L. Rivest. Talk at Workshop on UOCAVA Remote Voting Systems (2010-08-06)
       bib   slides.pdf   workshop   link   

263.  [SCCCx10] Scantegrity Mock Election at Takoma Park. Alan T. Sheman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, and Poorvi Vora. EVOTE2010 (Bregenz, Austria, 2010)Proceedings of Electronic Voting 2010. Proceedings of the 4th Conference on Electronic Voting. Robert Kimmer and R\"udiger Grimm (eds.) (2010) pp. 35--51.
       bib   pdf   conference   link   

262.  [Gx10] Climate change and the integrity of science. P. H. Gleick and others. Science 328(2010) pp. 689--690.
       bib   url   pdf   alt.pdf   link   

261.  [Kan10] Voting and Verifiability. Christine Kane. Vantage Magazine 7,1 (2010) pp. 13--15. (Interview with Ronald L. Rivest.)
       bib   pdf   link   

260.  [CJRRx10] Towards Trustworthy Elections: New Directions in Electronic Voting. David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, and Ben Adida (eds.) (Springer, 2010)
       bib   url   link   

259.  [RCPRx09] Guest editorial: Special Issue on Electronic Voting. Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 593--596.
       bib   doi   pdf   link   

258.  [CCCEx09] Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes. David Chaum, Richard T. Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 611--627.
       bib   doi   pdf   correction.pdf   link   

257.  [Riv09d] Security of Voting Systems. Ronald L. Rivest. Talk given at George Washington University Computer Science Department on November 9, 2009. (2009-11-09)
       bib   slides.pdf   slides.ppt   link   

256.  [Riv09c] Audit Thoughts. Ronald L. Rivest. Slides for a brief talk on post-election auditing, given at the Post-Election Audit Workshop, organized by the American Statistical Association on October 24, 2009 (Alexandria, Virginia) (2009-10-24)
       bib   slides.pdf   slides.ppt   link   

255.  [Riv09b] Perspectives on E2E Voting Systems. Ronald L. Rivest. Keynote talk given at NIST End-to-End Voting Systems Workshop on October 13, 2009 (2009-10-13)
       bib   slides.pdf   slides.ppt   link   

254.  [Riv09a] The ``Taint'' Leakage Model. Ronald L. Rivest. Talk given at rump session at the 2009 Crypto in the Clouds Workshop (MIT) on August 4, 2009 (2009-08-04)
       bib   slides.pdf   slides.pptx   link   

253.  [BKNR09] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 7,502,467. Issued March 10, 2009. (2009-03-10)
       bib   pdf   google-patent-page   link   

252.  [DRRS09] Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, and Emily Shen. FSE '09 (Leuven, Belgium, 2009)Proceedings of Fast Software Encryption 2009. Orr Dunkelman (ed.) (2009) pp. 104--121.
       bib   doi   pdf   prepub.pdf   link   

251.  [CLRS09] Introduction to Algorithms (Third edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press, 2009)
       bib   url   errata   thc-faq   link   

250.  [RABCx08] The MD6 Hash Function---A Proposal to NIST for SHA-3. Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, and Yiqun Lisa Yin. Submitted to NIST on October 27, 2008 (2008-10-27) (pdf given revised April 5, 2010.)
       bib   pdf   MD6 project website   link   

249.  [Riv08b] On the notion of `software independence' in voting systems. Ronald L. Rivest. Philosophical Transactions of The Royal Society A 366,1881 (2008) pp. 3759--3767.
       bib   doi   pdf   link   

248.  [Riv08c] The MD6 Hash Function. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2008 (2008-08)
       bib   slides.pdf   slides.ppt   link   

247.  [CCCEx08] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, and Alan T. Sherman. EVT'08 (San Jose, California, 2008)Proceedings 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. David Dill and Tadayoshi Kohno (eds.) (2008)
       bib   url   pdf   EVT'08   link   

246.  [APR08] On Auditing Elections When Precincts Have Different Sizes. Javed Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT'08 (San Jose, California, 2008)Proceedings 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. David Dill and Tadayoshi Kohno (eds.) (2008)
       bib   url   pdf   slides.pdf   EVT'08   link   

245.  [Riv08a] A "Sum of Square Roots" (SSR) Pseudorandom Sampling Method for Election Audits. Ronald L. Rivest. (2008-04-25) Unpublished draft.
       bib   pdf   link   

244.  [BKR08] Method and apparatus for performing enhanced time-based authentication. John G. Brainard, Burton S. Kaliski, and Ronald L. Rivest. U.S. Patent 7,363,494. Issued April 22, 2008. (2008-04-22)
       bib   pdf   google-patent-page   link   

243.  [Riv07b] A Simple Rule of Thumb for Election Audit Size Determination. Ronald L. Rivest. (2007-10-31) Unpublished draft.
       bib   pdf   link   

242.  [TGDC07] VVSG Recommendations to the EAC. Technical Guidelines Development Committee. Delivered to the EAC on September 4, 2007 for consideration and public comment. (2007-08-31) (VVSG means ``Voluntary Voting System Guidelines''.)
       bib   pdf   VVSG   EAC   link   

241.  [CRSTx07] Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan, and Hoeteck Wee. CRYPTO '07 (Santa Barbara, California, 2007)Advanced in Cryptology -- CRYPTO '07, 27th Annual International Cryptology Conference. Alfred Menezes (ed.) (2007) pp. 264--283.
       bib   pdf   link   

240.  [RS07] Three Voting Protocols: ThreeBallot, VAV, and Twin. Ronald L. Rivest and Warren D. Smith. EVT '07 (Boston, Massachusetts, 2007)Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop. Ray Martinez and David Wagner (eds.) (2007)
       bib   url   pdf   slides.pdf   slides.ppt   EVT'07   link   

239.  [APR07] On Estimating the Size and Confidence of a Statistical Audit. Javed A. Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT '07 (Boston, Massachusetts, 2007)Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop. Ray Martinez and David Wagner (eds.) (2007)
       bib   url   pdf   popa-slides.pdf   popa-slides.ppt   EVT'07   link   

238.  [CKRR08] Frontiers of Electronic Voting---Dagstuhl Seminar 07311: Executive Summary. David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, and Peter Y. A. Ryan. Dagstuhl Seminar 07311--Frontiers of Electronic Voting (Schloss Dagstuhl, Germany, 2007)Frontiers of Electronic Voting. David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, and Peter Y. A. Ryan (eds.) (2008-07)
       bib   url   pdf   Abstracts-of-meeting   link   

237.  [Riv07a] On Auditing Elections When Precincts Have Different Sizes. Ronald L. Rivest. (2007-04-29) Replaced by 246. [APR08]. Unpublished draft.
       bib   pdf   dataset.txt   link   

236.  [YABCx07] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. SPW'10 (Brno, Czech Republic, 2007)Proceedings of the Fifteenth International Conference on Security Protocols. Bruce Christianson, Bruno Crispo, James Malcolm, and Michael Roe (eds.) (2007) pp. 171. For full report see YABCx05.
       bib   doi   pdf   discussion.pdf   discussion.doi   link   

235.  [ABCLx07] On the security of the EMV secure messaging API (Extended Abstract). Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, and Ronald L. Rivest. SPW '07 (Brno, Czech Republic, 2007)Proceedings of Security Protocols Workshop 2007. Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe (eds.) (2010) pp. 147--149.
       bib   doi   pdf   prepub.pdf   link   

234.  [WLM07] Engaging Privacy and Information Technology in a Digital Age. James Waldo, Herbert S. Lin, and Lynette Millett (eds.) (National Academies Press, 2007) (Rivest served on the NRC Committee on Privacy in the Information Age, which produced this report.)
       bib   url   (pdf)   link   

233.  [ACHR07] Lightweight Email Signatures. Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. Chapter 10.6. Phishing and Countermeasures---Understanding the Increasing Problem of Electronic Identity Theft. Markus Jakobsson and Steven Myers (eds.) (Wiley, 2007) pp. 435--453. (2007) Revised version of ACHR06.
       bib   pdf   link   

232.  [Riv06d] On Estimating the Size of a Statistical Audit. Ronald L. Rivest. (2006-11-14) Replaced by 239. [APR07]. Unpublished draft.
       bib   pdf   link   

231.  [BJRSY06] Fourth Factor Authentication: Somebody you know. John Brainard, Air Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. CCS '06 (Alexandria, Virginia, 2006)Proceedings of the 13th ACM conference on computer and communications security. Rebecca Wright and Sabrina De Capitani di Vimercati (eds.) (2006) pp. 168--178.
       bib   acm   doi   pdf   CCS'06   link   

230.  [AR06] Scratch & vote: self-contained paper-based cryptographic voting. Ben Adida and Ronald L. Rivest. WPES '06 (Alexandria, Virginia, 2006)Proceedings of the 5th ACM workshop on privacy in electronic society. Roger Dingledine and Ting Yu (eds.) (2006) pp. 29--39.
       bib   acm   doi   pdf   adida-slides.pdf   WPES'06   link   

229.  [Riv06c] The ThreeBallot Voting System. Ronald L. Rivest. (2006-10-01) Replaced by 240. [RS07]. Unpublished draft.
       bib   pdf   link   

228.  [ACHR06] Lightweight Email Signatures (Extended Abstract). Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. SCN '06 (Maiori, Italy, 2006)Proceedings 5th Conference on Security and Cryptography for Networks. Roberto De Prisco and Moti Yung (eds.) (2006) pp. 288--302.
       bib   doi   pdf   prepub.pdf   link   

227.  [RW06] On the notion of ``software independence'' in voting systems. Ronald L. Rivest and John P. Wack. Prepared for the TGDC, and posted by NIST at the given url. (2006-07-28) Replaced by 249. [Riv08b].
       bib   url   pdf   link   

226.  [ABCLx06] Phish and Chips --- Traditional and New Recipes for Attacking EMV. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven Murdoch, Ross Anderson, and Ron[ald L.] Rivest. SPW'06 (Cambridge, UK, 2006)Revised Selected Papers from Fourteenth International Workshop on Security Protocols. Bruce Christianson, Bruno Crispo, James Malcolm, and Michael Roe (eds.) (2006) pp. 40--48.
       bib   doi   pdf   link   

225.  [Riv06b] Recollections of Stanford CS 1969--1973. Ronald L. Rivest. Talk given March 21, 2006 at Stanford Computer Science Forum celebrating the 40th anniversary of the Stanford CS Department (2006-03-21)
       bib   slides.pdf   slides.ppt   link   

224.  [Riv06a] Perspectives on Financial Cryptography (revisited). Ronald L. Rivest. Invited keynote talk given 2/27/06 at Financial Cryptography 2006. (An update on talk given 2/27/97 at Financial Cryptography 1997.) (2006-02-27)
       bib   slides.pdf   slides.ppt   FC'97 talk   link   

223.  [BKNR06] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 6,985,583. Issued January 10, 2006. (2006-01-10)
       bib   pdf   google-patent-page   link   

222.  [JRS05] Method and apparatus for selective blocking of radio frequency identification devices. Ari Juels, Ronald L. Rivest, and Michael Szydlo. U.S. Patent 6,970,070. Issued November 29, 2005. (2005-11-29)
       bib   pdf   google-patent-page   link   

221.  [Riv05c] Abelian square-free dithering for iterated hash functions. Ronald L. Rivest. HASH'05 (NIST Gaithersburg, Maryland, 2005)Proceedings NIST First Cryptographic Hash Workshop. (2005-11-01)
       bib   url   pdf   code.c   HASH'05   related-talk   link   

220.  [Riv05b] Preliminary Voting---Prevoting. Ronald L. Rivest. Unpublished draft. (2005-08-06)
       bib   pdf   link   

219.  [YABCx05] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. University of Cambridge Computer Laboratory (2005) Technical Report UCAM-CL-TR-644. Also see YABCx07.
       bib   url   pdf   link   

218.  [AHR05b] Lightweight Encryption for Email. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. SRUTI '05 (Cambridge, MA, 2005)Proceedings 2005 Workshop on Steps to Reducing Unwanted Traffic on the Internet. Dina Katabi and Balachander Krishnamurthy (eds.) (2005) pp. 93--99.
       bib   url   pdf   adida-slides.pdf   link   

217.  [Riv05a] Abelian Square-free-dithering for iterated hash functions. Ronald L. Rivest. Talk given at ECRYPT workshop on Hash Functions (Przegorzaly (Krakow), Poland) (2005-06-23)
       bib   slides.pdf   slides.ppt   related-paper   link   

216.  [AHR05a] Ad-Hoc Group Signatures from Hijacked Keypairs. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Unpublished draft. A preliminary version was presented by Ben Adida at the April 14--15, 2005 DIMACS Workshop on Theft in E-Commerce. (2005-06-24)
       bib   pdf   workshop   link   

215.  [RK03] RSA Problem. Ronald L. Rivest and Burt Kaliski. Encyclopedia of Cryptography and Security. Henk C. A. Van Tilborg (ed.) (Springer, 2005) (2005)
       bib   prepub.pdf   link   

214.  [LSYRR05] Permutation Operations in Block Ciphers. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. Chapter 13. Embedded Cryptographic Hardware: Design \& Security. Nadia Nedjah and Luiza de Macedo Mourelle (eds.) (Nova Science, 2005) pp. 219--234. (2005) A previous version appeared as LSYRR04.
       bib   link   

213.  [RCBDR04] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald L. Rivest. Concurrency and Computation: Practice and Experience 16,11 (2004) pp. 1099--1120. An extended version of RCBDR03.
       bib   doi   pdf   link   

212.  [Riv04b] Electronic Voting. Ronald L. Rivest. Talk given at the NSA June 3, 2004. (2004-06-03)
       bib   slides.pdf   slides.ppt   link   

211.  [Riv04a] Remarks on Electronic Voting. Ronald L. Rivest. Talk given at the Harvard Kennedy School of Government Digital Voting Symposium, June 1, 2004. (2004-06-01)
       bib   remarks.txt   link   

210.  [Riv04d] Some thoughts on electronic voting. Ronald L. Rivest. Talk given May 26, 2004 at DIMACS Workshop on Electronic Voting (2004-05-26)
       bib   url   slides.pdf   slides.ppt   workshop   link   

209.  [LSYRR04] On Permutation Operations in Cipher Design. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. ITCC'04 (Las Vegas, Nevada, 2004)Proceedings International Conference on Information Technology: Coding and Computing, 2004. Pradip K. Srimani (ed.) (2004-04) pp. 569--577.
       bib   doi   pdf   link   

208.  [Riv04e] On the Notion of Pseudo-Free Groups. Ronald L. Rivest. TCC'04 (Cambridge, Massachusetts, 2004)Proceedings First Theory of Cryptography Conference 2004. Moni Naor (ed.) (2004) pp. 505--521.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   TCC'04   link   

207.  [Riv04c] Peppercoin Micropayments. Ronald L. Rivest. FC'04 (Key West, 2004)Proceedings Financial Cryptography 2004. Ari Juels (ed.) (2004-02) pp. 2--8.
       bib   doi   pdf   slides.ppt   slides.slides.pdf   FC'04   link   

206.  [JRS03] The Blocker Tag: Selective blocking of RFID Tags for Consumer Privacy. Ari Juels, Ronald L. Rivest, and Michael Szydlo. CCS'03 (Washington, DC, )Proceedings Tenth ACM Conference on Computer and Communications Security. Vijay Atluri and Trent Jaeger (eds.) (2003-10) pp. 103--111.
       bib   acm   doi   pdf   juels-slides.pdf   prepub.pdf   RSA page   link   

205.  [ARS03] 2002 ACM A. M. Turing Award Lectures. Leonard M. Adleman, Ronald L. Rivest, and Adi Shamir. Talks given June 8, 2003 at FCRC in San Diego, California. (2003-06-08) Rivest's lecture titled ``The Early Days of RSA: History and Lessons''.
       bib   acm   doi   rivest-slides.pdf   rivest-slides.ppt   ACM Turing Award   Adleman   Rivest   Shamir   link   

204.  [RCBDR03] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald [L.] Rivest. SAC '03 (Melbourne, Florida, 2003)Proceedings of the 2003 Symposium on Applied Computing. Hisham Haddad and George Papadopoulos (eds.) (2003) pp. 338--345.
       bib   acm   doi   pdf   prepub.pdf   SAC'03   link   

203.  [SORJx03] Does Anyone Really Need Micropayments?. Nicko van Someren, Andrew Odlyzko, Ronald L. Rivest, Tim Jones, and Duncan Goldie-Scot. FC'03 (Guadeloupe, French West Indies, 2003)Proceedings Financial Cryptography 2003. Rebecca N. Wright (ed.) (2003-01) pp. 69--76.
       bib   doi   pdf   FC'03   link   

202.  [BCGKx02] The Untrusted Computer Problem and Camera-Based Authentication. Matt Burnside, Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Marten van Dijk, Srinivas Devadas, and Ronald [L.] Rivest. Pervasive 2002 (Zurich, Switzerland, 2002)Proceedings of the International Conference on Pervasive Computing. Friedemann Mattern and Mahmoud Naghshineh (eds.) (2002) pp. 114--124.
       bib   doi   pdf   prepub.pdf   link   

201.  [LRW02] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. CRYPTO'02 (Santa Barbara, California, 2002)Advances in Cryptology - CRYPTO 2002. Moti Yung (ed.) (2002-08) pp. 31--46. Replaced by 268. [LRW11].
       bib   doi   pdf   prepub.pdf   link   

200.  [JJR02] Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. Markus Jakobsson, Ari Juels, and Ronald L. Rivest. SEC'02 (San Francisco, California, 2002)Proceedings USENIX Security 2002. Dan Boneh (ed.) (2002-08) pp. 339--353. Also available as IACR eprint 2002/025.
       bib   pdf   prepub.pdf   SEC'02   eprint   link   

199.  [WCGRW02] Privacy Tradeoffs: myth or reality? (Panel Summary). Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, and Graham Wood. FC'02 (Southampton, Bermuda, 2002)Proceedings of the Sixth International Conference on Financial Cryptography. Matt Blaze (ed.) (2002-03) pp. 147--151.
       bib   doi   pdf   link   

198.  [BCMMx02] Proxy-based Security Protocols in Networked Mobile Devices. M. Burside, D. Clarke, T. Mills, A. Maywah, S. Devadas, and R[onald L.] Rivest. SAC 2002 (Madrid, Spain, 2002)Proceedings 2002 ACM Symposium on Applied Computing. Hisham Haddad and George Papadopoulos (eds.) (2002) pp. 265--272.
       bib   acm   doi   pdf   prepub.pdf   SAC'02   link   

197.  [MR02b] Transitive signature schemes. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002)Topics in Cryptology - CT-RSA 2002: Cryptographer's Track at the RSA Conference 2002. Bart Preneel (ed.) (2002-02) pp. 236--243. A related talk Riv00 was given in 2000.
       bib   doi   pdf   prepub.pdf   link   

196.  [MR02a] Micropayments revisited. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002)Topics in Cryptology - CT-RSA 2002: Cryptographer's Track at the RSA Conference 2002. Bart Preneel (ed.) (2002-02) pp. 149--163. A related talk RM02 was given at the FC'02 ``rump session''.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

195.  [CRR02] An Efficient Scheme for Route Aggregation. Suresh Chari, Tal Rabin, and Ronald L. Rivest. (2002-02-01) A related talk Riv00 was given in 2000.
       bib   pdf   link   

194.  [RM02] Peppercorn Micropayments via better ``Lottery Tickets''. Ronald L. Rivest and Silvio Micali. Talk given at the ``rump session'' of Financial Cryptography 2002. (2002)
       bib   slides.pdf   slides.ppt   link   

193.  [RST01] How to Leak a Secret. Ronald L. Rivest, Adi Shamir, and Yael Tauman. ASIACRYPT 2001 (Gold Coast, Australia, 2001)Advances in Cryptology -- ASIACRYPT 2001. Colin Boyd (ed.) (2001) pp. 552--565.
       bib   doi   pdf   link   

192.  [BJR01] A Modular Voting Architecture (``Frogs''). Shuki Bruck, David Jefferson, and Ronald L. Rivest. Talk presented at WOTE 2001 (Workshop on Trustworthy Elections) (2001-08) Reprinted in CJRRx10.
       bib   pdf   slides.pdf   slides.ppt   link   

191.  [RRSY01] Enchanced block ciphers with data-dependent rotations. Ronald L. Rivest, Matthew John Barton Robshaw, Raymond Mark Sidney, and Yiqun Lisa Yin. U.S. Patent 6,269,163. Issued July 31, 2001. (2001-07-31)
       bib   pdf   google-patent-page   link   

190.  [VTP01] Voting---What is, What Could Be. CalTech MIT Voting Technology Project. California Institute of Technology and The Massachusetts Institute of Technology (2001)
       bib   pdf   rivest-press-conference-remarks.txt   VTP site for report   link   

189.  [Riv01e] Security in Voting Technology. Ronald L. Rivest. (2001-05-24) Testimony given to U.S. Committee on House Administration May 24, 2001.
       bib   txt   link   

188.  [Riv01d] Multi-grade cryptography. Ronald L. Rivest. (2001-04-29) Unpublished draft.
       bib   pdf   link   

187.  [Riv01c] Permutation polynomials modulo 2^w. Ronald L. Rivest. Finite Fields and Their Applications 7,2 (2001) pp. 287--292.
       bib   doi   pdf   link   

186.  [Riv01a] Issues in Cryptography. Ronald L. Rivest. Short luncheon talk given March 7, 2001 at Computers, Freedom, and Privacy 2001 Conference (2001-03-07)
       bib   slides.pdf   slides.ppt   link   

185.  [Riv01b] Electronic voting. Ronald L. Rivest. Talk given for Cambridge Club at Harvard Faculty Club, March 5, 2001. (2001-03-05)
       bib   slides.pdf   slides.ppt   link   

184.  [GNRRY01] The Business of Electronic Voting. Ed Gerck, Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, and Moti Yung. FC'01 (Grand Cayman, British West Indies, 2001)Proceedings Fifth International Conference on Financial Cryptography 2001. Paul F. Syverson (ed.) (2001-02) pp. 243--268.
       bib   doi   pdf   rivest-only-prepub.pdf   link   

183.  [RS01] Are ``Strong'' Primes Needed for RSA?. Ronald L. Rivest and Robert D. Silverman. IACR Cryptology ePrint archive, paper 2001/007 (Version 1998-12-01 Submitted January 30, 2001). (2001-01-30)
       bib   url   pdf   version-1999-11-22.pdf   link   

182.  [CLRS01] Introduction to Algorithms (Second edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press and McGraw Hill, 2001)
       bib   url   link   

181.  [CEEFx01] Certificate chain discovery in SPKI/SDSI. Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Journal of Computer Security 9,4 (2001) pp. 285--322.
       bib   pdf   link   

180.  [Riv00] Two signature schemes. Ronald L. Rivest. Talk given October 17, 2000 at Cambridge University. (2000-10-17)
       bib   slides.pdf   scheme 1:MR02b   scheme 2:CRR02   link   

179.  [RRY00] The Case for RC6 as the AES. Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Yin. Comment submitted to NIST May 16, 2000 for round 2 of AES competition. (2000-05-16)
       bib   pdf   NIST-round-2-comments   link   

178.  [Riv99d] Unconditionally secure commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer. Ronald L. Rivest. (1999-11-08)
       bib   pdf   link   

177.  [BR99] Translucent Cryptography---An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. Mihir Bellare and Ronald L. Rivest. Journal of Cryptology 12,2 (1999) pp. 117--139.
       bib   doi   pdf   prepub.MIT-LCS-TR-683.pdf   link   

176.  [EFLRx99b] SPKI Certificate Theory. C[arl] Ellison, B[ill] Frantz, B[utler] Lampson, R[onald L.] Rivest, B[rian M.] Thomas, and T[atu] Ylonen. Internet Network Working Group Request for Comments: RFC 2693 (September 1999). (1999-09)
       bib   txt   link   

175.  [LRSW99] Pseudonym Systems. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. SAC'99 (Kingston, Ontario, Canada, 1999)Proceedings of the Sixth Annual International Workshop on Selected Areas in Cryptography 1999. Howard M. Heys and Carlisle M. Adams (eds.) (1999) pp. 184--199.
       bib   doi   pdf   prepub.pdf   link   

174.  [ABRS99] Piecemeal graph exploration by a mobile robot. Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. Information and Computation 152,2 (1999) pp. 155--172.
       bib   doi   pdf   link   

173.  [EFLRx99a] Simple Public Key Certificate. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ietf-spki-cert-structure-06.txt, July 26, 1999. (1999-07-26)
       bib   txt   link   

172.  [CRRY99b] Some Comments on the First Round AES Evaluation of RC6. Scott Contini, Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Lisa Yin. Submitted as a public comment in response to NIST's call for comments on the AES Candidates. Posted on NIST web site. (1999-04-15)
       bib   url   pdf   link   

171.  [Riv99b] Description of the LCS35 Time Capsule Crypto-Puzzle. Ronald L. Rivest. (1999-04) Unpublished note.
       bib   lcs35-code.java   lcs35-parameters.txt   lcs35-puzzle-description.txt   related-paper:RSW96   Dan-Bricklin's-LCS35-page   link   

170.  [CRRY99a] Improved Analysis of some Simplified Variants of RC6. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. FSE '99 (Rome, Italy, 1999)Proceedings of the Sixth International Workshop on Fast Software Encryption. Lars Knudsen (ed.) (1999) pp. 1--15.
       bib   doi   pdf   link   

169.  [Riv99c] Some Thoughts on Serial Numbers on Intel CPU's. Ronald L. Rivest. (1999-01-26) Unpublished note, drafted 1/26/99, revised 8/23/99.
       bib   txt   link   

168.  [Riv99a] The Beer Bottle Cipher. Ronald L. Rivest. CCE Quarterly Journal (Pricewaterhouse Coopers Cryptographic Center of Excellence) ,3 (1999) pp. 28--30.
       bib   txt   link   

167.  [Riv98f] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,835,600. Issued November 10, 1998. (1998-11-10)
       bib   pdf   google-patent-page   link   

166.  [Riv98e] The Case against Regulating Encryption Technology. Ronald L. Rivest. Scientific American 279,4 (1998) pp. 116--117.
       bib   doi   pdf   prepub.txt   link   

165.  [GPR98] Self-Delegation with Controlled Propagation ---or--- What if you lose your laptop. Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. CRYPTO'98 (Santa Barbara, California, 1998)Advances in Cryptology -- Proceedings 18th Annual Cryptology Conference. Hugo Krawczyk (ed.) (1998-08) pp. 153--168. This paper also appears as IACR Cryptology ePrint Archive Report 1997/012.
       bib   doi   pdf   prepub.pdf   ePrint-1997/012   link   

164.  [RRSY98] The RC6 Block Cipher. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. Posted on the RC6 site of RSA Laboratories. (1998-08-20) Slides from NIST AES1 (1998-08-21) and AES3 (2000-04-14) conferences.
       bib   url   pdf   AES1.slides.pdf   AES1.slides.ppt   AES3.slides.pdf   AES3.slides.ppt   note.txt   RSA-labs-RC6-site   link   

163.  [CRRY98] The Security of the RC6 Block Cipher. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. Posted on the RC6 site of RSA Laboratories. (1998-08-20)
       bib   url   pdf   RSA-labs-RC6-site   link   

162.  [KRRR98] On the Design and Security of RC2. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and Matthew J. B. Robshaw. FSE '98 (Paris, France, 1998)Proceedings Fast Software Encryption, Fifth International Workshop. Serge Vaudenay (ed.) (1998) pp. 206--221.
       bib   doi   pdf   link   

161.  [EFLRx98] SPKI examples. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ieft-spki-cert-examples-01.txt, March 10, 1998. (1998-03-10)
       bib   txt   link   

160.  [Riv98d] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,724,428. Issued March 3, 1998. (1998-03-03)
       bib   pdf   google-patent-page   link   

159.  [Riv98c] A Description of the RC2(r) Encryption Algorithm. Ronald L. Rivest. Internet Network Working Group Request for Comments: RFC 2268. (1998-03)
       bib   txt   link   

158.  [Riv98b] Can We Eliminate Certificate Revocation Lists?. Ronald L. Rivest. FC'98 (Anguilla, British West Indies, 1998)Proceedings Financial Cryptography '98. Rafael Hirschfeld (ed.) (1998-02) pp. 178--183.
       bib   doi   pdf   prepub.pdf   link   

157.  [Riv98a] Chaffing and Winnowing: Confidentiality without Encryption. Ronald L. Rivest. CryptoBytes (RSA Laboratories), volume 4, number 1 (summer 1998), 12--17. (1998)
       bib   url   pdf   prepub.txt   remarks.txt   slides.pdf   slides.ppt   CryptoBytes   link   

156.  [AABBx98] The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption --- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, and Bruce Schneier. Report issued by the CDT (Center for Democracy and Technology). (1998) 1998 revision of May 1997 report.
       bib   url   pdf   link   

155.  [BRS97] Geometric Cryptography: Identification by Angle Trisection. Mike Burmester, Ronald L. Rivest, and Adi Shamir. (1997-11-04) Unpublished draft.
       bib   pdf   link   

154.  [Riv97c] Cryptography as Duct Tape. Ronald L. Rivest. A short note written to the U.S. Senate Commerce and Judiciary Committee in opposition to mandatory key recovery proposals (1997-06-12)
       bib   txt   link   

153.  [Riv97b] Electronic Lottery Tickets as Micropayments. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997)Proceedings Financial Cryptography '97. Rafael Hirschfeld (ed.) (1997) pp. 307--314.
       bib   doi   pdf   link   

152.  [Riv97a] Perspectives on Financial Cryptography. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997)Proceedings Financial Cryptography '97. Rafael Hirschfeld (ed.) (1997) pp. 145--149.
       bib   doi   pdf   slides.pdf   slides.ppt   link   

151.  [Riv97d] All-Or-Nothing Encryption and The Package Transform. Ronald L. Rivest. FSE'97 (Haifa, Israel, 1997)Proceedings Fourth International Conference on Fast Software Encryption. Eli Biham (ed.) (1997-01) pp. 210--218.
       bib   doi   pdf   prepub.pdf   link   

150.  [BR96] The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. R[obert] Baldwin and R[onald L.] Rivest. Internet Network Working Group Request for Comments: RFC 2040 (1996-10)
       bib   url   txt   link   

149.  [GMR96] On breaking a Huffman code. David W. Gillman, Mojdeh Mohtashemi, and Ronald L. Rivest. IEEE Transaction on Information Theory 42,3 (1996) pp. 972--976.
       bib   doi   pdf   link   

148.  [RL96] SDSI -- A Simple Distributed Security Infrastructure. Ronald L. Rivest and Butler Lampson. (1996-04-30)
       bib   slides-crypto96.pdf   slides-crypto96.ppt   slides-maryland.pdf   slides-maryland.ppt   slides-rsalabs96.pdf   slides-rsalabs96.ppt   slides-usenix.pdf   slides-usenix.ppt   ver-1.0.pdf   ver-1.1.html   CIS-SDSI-page   link   

147.  [RS96a] PayWord and MicroMint--Two Simple Micropayment Schemes. Ronald L. Rivest and Adi Shamir. SPW'96 (Cambridge, United Kingdom, 1996)Proceedings of the 1996 International Workshop on Security Protocols. Mark Lomas (ed.) (1996-04) pp. 69--87.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

146.  [RSW96] Time-lock puzzles and timed-release crypto. Ronald L. Rivest, Adi Shamir, and David A. Wagner. MIT Laboratory for Computer Science, Technical memo MIT/LCS/TR-684 (1996) (Revision 3/10/96)
       bib   pdf   LCS page   link   

145.  [BDRSx96] Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shinomura, Eric Thompson, and Michael Wiener. Released by the Business Software Alliance (January 1996). (1996-01)
       bib   pdf   link   

144.  [RS96b] PayWord and MicroMint (extended abstract). Ronald L. Rivest and Adi Shamir. CryptoBytes (RSA Laboratories), volume 2, number 1 (spring 1996), 7--11. (1996) Reprint of RS96a.
       bib   url   pdf   CryptoBytes   link   

143.  [RY95] Being Taught Can be Faster than Asking Questions. Ronald L. Rivest and Yiqun Lisa Yin. COLT'95 (Santa Cruz, California, 1995)Proceedings of the Eighth Annual Conference on Computational Learning Theory. Wolfgang Maas (ed.) (1995-07) pp. 144--151.
       bib   acm   doi   pdf   prepub.pdf   link   

142.  [ABRS95] Piecemeal graph exploration by a mobile robot (extended abstract). Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'95 (Santa Cruz, California, 1995)Proceedings Eighth Annual Conference on Computational Learning Theory. Wolfgang Maas (ed.) (1995-07) pp. 321--328.
       bib   acm   doi   pdf   link   

141.  [BRS95] Piecemeal Learning of an Unknown Environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. Machine Learning 18,2 (1995) pp. 231--254.
       bib   doi   pdf   link   

140.  [Riv95] The RC5 Encryption Algorithm. Ronald L. Rivest. Dr. Dobb's Journal 20,1 (1995) pp. 146--148.
       bib   pdf   link   

139.  [BR95] Picking the Best Expert from a Sequence. Ruth Bergman and Ronald L. Rivest. WAIS'95 (Fort Lauerdale, Florida, 1995)Proceedings of the Fifth International Workshop on Artificial Intelligence and Statistics. Doug Fisher and Hans-J. Lenz (eds.) (1995-01) pp. 219--228.
       bib   pdf   prepub.pdf   link   

138.  [GR95] Complete Variable-Length ``Fix-Free'' Codes. David Gillman and Ronald L. Rivest. Designs, Codes and Cryptography 5,2 (1995) pp. 109--114.
       bib   doi   pdf   link   

137.  [Riv94] The RC5 Encryption Algorithm. Ronald L. Rivest. FSE'94 (Leuven, Belgium, 1994)Proceedings of the 1994 Leuven Workshop on Fast Software Encryption. Bart Preneel (ed.) (1994-12) pp. 86--96.
       bib   doi   pdf   errata-1997-03-20.txt   prepub.pdf   revised-1997-03-20.pdf   link   

136.  [RS94b] A Formal Model of Hierarchical Concept-Learning. Ronald L. Rivest and Robert Sloan. Information and Computation 114,1 (1994) pp. 88--114.
       bib   doi   pdf   link   

135.  [HPKR94] Computational Learning Theory and Natural Learning Systems: Intersections between Theory and Experiment. Stephen Jos\'{e} Hanson, Thomas Petsche, Michael Kearns, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

134.  [RS94a] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. Journal of the ACM 41,3 (1994) pp. 555--589.
       bib   acm   doi   pdf   link   

133.  [RY94] Simulation Results for a new two-armed bandit heuristic. Ronald L. Rivest and Yiqun Yin. Proceedings of a workshop on Computational Learning Theory and Natural Learning Systems (Princeton, New Jersey, 1994)Computational Learning Theory and Natural Learning Systems. G. A. Drastal, S. J. Hanson and R. L. Rivest (eds.) (1994) pp. 477--486.
       bib   pdf   link   

132.  [HDR94] Computational Learning Theory and Natural Learning Systems: Constraints and Prospects. Stephen Jos\'{e} Hanson, George A. Drastal, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

131.  [GRS93] Learning binary relations and total orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. SIAM Journal on Computing 22,5 (1993) pp. 1006--1034.
       bib   doi   pdf   link   

130.  [RS93b] On choosing between experimenting and thinking when learning. Ronald L. Rivest and Robert H. Sloan. Information and Computation 106,1 (1993) pp. 1--25.
       bib   doi   pdf   link   

129.  [BRS93] Piecemeal learning of an unknown environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'93 (Santa Cruz, California, 1993)Proceedings of the Sixth Annual Conference on Computational Learning Theory. Lenny Pitt (ed.) (1993-07) pp. 277--286.
       bib   acm   doi   pdf   link   

128.  [RS93a] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. Information and Computation 103,2 (1993) pp. 299--347.
       bib   doi   pdf   link   

127.  [GBRBx93] Commentators. Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, and Gary T. Marx. Communications of the ACM 36,3 (1993) pp. 34--41. (Commentary on preceding article ``To tap or not to tap'' by Dorothy Denning.)
       bib   acm   doi   pdf   link   

126.  [GR93] Scapegoat trees. Igal Galperin and Ronald L. Rivest. SODA '93 (Austin, Texas, 1993)Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. Vijaya Ramachandran (ed.) (1993) pp. 165--174. Chapter 19.
       bib   url   pdf   link   

125.  [KACDx93] Group Report: Architectures of Intelligent Systems. D. Kirsh, J. S. Altman, J.-P Changeux, A. R. Damasio, R. Durbin, A. K. Engel, W. D. Hillis, D. Premack, R. Rivest, P. E. Roland, P. S. Rosenbloom, G. S. Stent, and P. Stoerig. Exploring Brain Functions: Models in Neuroscience. T. A. Poggio and D. A. Glaser (eds.) (1993)
       bib   pdf   link   

124.  [HRR93] Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (Springer, 1993)
       bib   link   

123.  [BR93] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (1993) (Reprinted with permission from Neural Networks 5,1 (January 1992), Avrim Blum and Ronald L. Rivest, ``Training a three-node neural net is NP-complete''.)
       bib   doi   pdf   link   

122.  [RHAL92] Responses to NIST's proposal. Ronald L. Rivest, Martin E. Hellman, John C. Anderson, and John W. Lyons. Communications of the ACM 35,7 (1992) pp. 41--54.
       bib   acm   doi   pdf   link   

121.  [Riv92c] The MD5 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1321 (1992-04)
       bib   txt   link   

120.  [Riv92b] The MD4 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1320 (1992-04)
       bib   txt   link   

119.  [Riv92a] Vortex air rings. Ronald L. Rivest. Nature (Scientific Correspondence) 356(1992) pp. 199--200.
       bib   doi   pdf   link   

118.  [BR92] Training a 3-node neural network is NP-complete. Avrim L. Blum and Ronald L. Rivest. Neural Networks 5,1 (1992) pp. 117--127.
       bib   doi   pdf   prepub.pdf   link   

117.  [Riv91] Cryptography and Machine Learning. Ronald L. Rivest. ASIACRYPT '91 (Fujiyoshida, Japan, 1991)Advances in Cryptography - ASIACRYPT '91. Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (eds.) (1993) pp. 427--439.
       bib   doi   pdf   link   

116.  [IRM91] Advances in Cryptography - ASIACRYPT '91. Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (eds.) ASIACRYPT '91 (Fujiyoshida, Japan, 1991)
       bib   link   

115.  [MGRS91] Research Directions in Computer Science: An MIT Perspective. Albert R. Meyer, John V. Guttag, Ronald L. Rivest, and Peter Szolovits (eds.) (MIT Press, 1991)
       bib   link   

114.  [RG91] A Fast Multiport Memory Based on Single-Port Memory Cells. R. Rivest and L. Glasser. MIT Lab for Computer Science, MIT/LCS/TM-455 (1991)
       bib   pdf   link   

113.  [LMR91] Results on Learnability and the Vapnik-Chervonenkis Dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. Information and Computation 90,1 (1991) pp. 33--49.
       bib   doi   pdf   link   

112.  [PR92] Method of secure remote access. Russell W. Pogue and Ronald L. Rivest. U.S. Patent 5,144,667. Issued December 20, 1990. (1990-12-20)
       bib   pdf   google-patent-page   link   

111.  [KPR90] Learning time-varying concepts. Anthony Kuh, Thomas Petsche, and Ronald L. Rivest. NIPS'90 (Denver, Colorado, 1990)Proceedings of the 1990 Conference on Advances in Neural Information Processing Systems 3. Richard P. Lippmann, John E. Moody, and David S. Touretzky (eds.) (1990) pp. 183--189.
       bib   url   pdf   link   

110.  [Riv90b] Finding Four Million Large Random Primes. Ronald L. Rivest. CRYPTO '90 (Santa Barbara, California, 1990)Advances in Cryptology - CRYPTO '90, 10th Annual Internation Cryptology Conference. Alfred Menezes and Scott A. Vanstone (eds.) (1990) pp. 625--626.
       bib   doi   pdf   link   

109.  [ER90] On the sample complexity of PAC-learning using random and chosen examples. Bonnie Eisenberg and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990)Proceedings of the third annual workshop on computational learning theory. Mark A. Fulk and John Case (eds.) (1990) pp. 154--162.
       bib   link   

108.  [AR90] Inferring Graphs from Walks. Javed A. Aslam and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990)Proceedings of the third annual workshop on computational learning theory. Mark A. Fulk and John Case (eds.) (1990) pp. 359--370.
       bib   prepub.pdf   link   

107.  [CLR90] Introduction to Algorithms (First edition). Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. (MIT Press and McGraw Hill, 1990)
       bib   link   

106.  [BOGMR90] A Fair Protocol for Signing Contracts. Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. IEEE Transactions on Information Theory 36(1990) pp. 40--46.
       bib   doi   pdf   link   

105.  [Riv90a] Cryptography. Ronald L. Rivest. Chapter 13. Handbook of Theoretical Computer Science. J. Van Leeuwen (ed.) (Elsevier, 1990) pp. 717--755. (1990)
       bib   pdf   link   

104.  [RS90] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Machine Learning: An Artificial Intelligence Approach. Yves Kodratoff and Ryszard Michalski (eds.) (1990)
       bib   link   

103.  [GRS89] Learning Binary Relations and Total Orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. FOCS '89 (Research Triangle Park, North Carolina, 1989)Proceedings Thirtieth IEEE Annual Symposium on Foundations of Computer Science. (1989) pp. 46--51.
       bib   doi   pdf   link   

102.  [RHW89] COLT '89. Ronald L. Rivest, David Haussler, and Manfred K. Warmuth (eds.) (Santa Cruz, California, 1989)
       bib   link   

101.  [RS89] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. STOC '89 (Seattle, Washington, 1989)Proceedings Twenty-First Annual ACM Symposium on Theory of Computation. D. S. Johnson (ed.) (1989) pp. 411--420.
       bib   acm   doi   pdf   link   

100.  [QR89] Inferring decision trees using the Minimum Description Length principle. J. Ross Quinlan and Ronald L. Rivest. Information and Computation 80,3 (1989) pp. 227--248.
       bib   doi   pdf   link   

99.  [BR88b] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. NIPS '88 (Denver, Colorado, 1988)Advances in Neural Information Processing Systems. David S. Touretzky (ed.) (1989) pp. 494--501.
       bib   link   

98.  [LMR88b] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yihshay Mansour, and Ronald L. Rivest. FOCS'88 (White Plains, New York, 1988)Proceedings of the Twenty-Ninth Annual Symposium on the Foundations of Computer Science. (1988-10) pp. 120--129. Replaced by 113. [LMR91].
       bib   doi   pdf   link   

97.  [CR88] A Knapsack-type public key cryptosystem based on arithmetic in finite fields. Benny Chor and Ronald L. Rivest. IEEE Transactions on Information Theory 34,5 (1988) pp. 901--909.
       bib   doi   pdf   link   

96.  [RS88b] Learning Complicated Concepts Reliably and Usefully (Extended Abstract). Ronald L. Rivest and Robert [H.] Sloan. AAAI-88 (St. Paul, Minnesota, 1988)Proceedings AAAI-88. Tom Mitchell and Reid Smith (eds.) (1988-08) pp. 635--640. Replaced by 136. [RS94b].
       bib   pdf   link   

95.  [LMR88a] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988)Proceedings of the first annual workshop on computational learning theory. David Haussler and Leonard Pitt (eds.) (1988-08) pp. 56--68. Replaced by 113. [LMR91].
       bib   link   

94.  [BR88a] Training a 3-node neural net is NP-complete. Avrim Blum and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988)Proceedings of the first annual workshop on computational learning theory. David Haussler and Leonard Pitt (eds.) (1988) pp. 9--18.
       bib   url   link   

93.  [GMR88] A digital signature scheme secure against adaptive chosen-message attacks. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. SIAM J. Computing 17,2 (1988) pp. 281--308.
       bib   doi   pdf   link   

92.  [RS88a] A New Model for Inductive Inference. Ronald L. Rivest and Robert H. Sloan. TARK II (Asilomar, Pacific Grove, California, 1988)Proceedings Second Annual Conference on Theoretical Aspects of Rationality and Knowledge. Moshe Y. Vardi (ed.) (1988) pp. 13--27.
       bib   url   pdf   link   

91.  [KRS88] Is the Data Encryption Standard a Group? (Results of cycling experiments on DES). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. Journal of Cryptology 1,1 (1988) pp. 3--36.
       bib   doi   pdf   link   

90.  [RF88] A ``greedy'' channel router. Ronald L. Rivest and Charles M. Fiduccia. Papers on Twenty-five years of electronic design automation. (1988) Reprint of RF83.
       bib   acm   doi   pdf   link   

89.  [GR88] Making Maximum Entropy Computations Easier by Adding Extra Constraints (Extended Abstract). Sally A. Goldman and Ronald L. Rivest. Maximum-Entropy and Bayesian Methods in Science and Engineering. G. J. Erickson and C. R. Smith (eds.) (1988)
       bib   prepub.pdf   link   

88.  [Riv87c] Game tree searching by min/max approximation. Ronald L. Rivest. Artificial Intelligence 34,1 (1987) pp. 77--96.
       bib   doi   pdf   link   

87.  [Riv87b] Learning Decision Lists. Ronald L. Rivest. Machine Learning 2,3 (1987) pp. 229--246.
       bib   doi   pdf   link   

86.  [RS87c] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. FOCS '87 (Los Angeles, California, 1987)Proceedings Twenth-Eighth IEEE Annual Symposium on Foundations of Computer Science. Tom Leighton (ed.) (1987) pp. 78--87. Replaced by 134. [RS94a].
       bib   doi   pdf   link   

85.  [RS87b] Method and apparatus for resuing non-erasable memory media. Ronald L. Rivest and Adi Shamir. U.S. Patent 4,691,299. (1987-09-01)
       bib   pdf   google-patent-page   link   

84.  [RS87a] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Fourth International Workshop on Machine Learning (U.C. Irvine, Irvine, California, 1987)Proceedings Fourth International Workshop on Machine Learning. Pat Langley (ed.) (1987) pp. 364--375.
       bib   prepub.pdf   link   

83.  [Riv87a] Network control by Bayesian broadcast. Ronald L. Rivest. IEEE Trans. on Information Theory IT-33,3 (1987) pp. 323--328.
       bib   doi   pdf   link   

82.  [KLRTx87] Global wire routing in two-dimensional arrays. R[ichard] M. Karp, F[rank] T. Leighton, R[onald] L. Rivest, U[mesh] V. Vazirani, and V[ijay] V. Vazirani. Algorithmica 2,1 (1987) pp. 113--129.
       bib   doi   pdf   link   

81.  [LR86] Estimating a Probability using Finite Memory. F. Thomson Leighton and Ronald L. Rivest. IEEE Trans. on Information Theory IT-32,6 (1986) pp. 733--742.
       bib   doi   pdf   link   

80.  [GR86] A Non-iterative Maximum Entropy Algorithm. Sally A. Goldman and Ronald L. Rivest. UAI '86 (Philadelphia, Pennsylvania, 1986)Proceedings of the Second Annual Conference on Uncertainty in Artificial Intelligence. John F. Lemmer and Laveen N. Kanal (eds.) (1986) pp. 133--148.
       bib   (pdf)   link   

79.  [CLRS86] An application of number theory to the organization of raster-graphics memory. Benny Chor, Charles E. Leiseron, Ronald L. Rivest, and James B. Shearer. JACM 33,1 (1986) pp. 86--104.
       bib   acm   doi   pdf   link   

78.  [KRS85b] Is DES a pure cipher? (Results of more cycling experiments on DES) (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. CRYPTO '85 (Santa Barbara, California, 1985)Advances in Cryptology---CRYPTO '85 Proceedings. Hugh C. Williams (ed.) (1985) pp. 212--226.
       bib   doi   pdf   link   

77.  [BOGMR85] A Fair Protocol for Signing Contracts (Extended Abstract). Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. ICALP '85 (Nafplion, Greece, 1985)Proceedings 1985 International Colloquium on Automata, Languages, and Programming. Wilfried Brauer (ed.) (1985) pp. 43--52. Replaced by 106. [BOGMR90].
       bib   doi   pdf   link   

76.  [RS85] Efficient Factoring Based on Partial Information. Ronald L. Rivest and Adi Shamir. EUROCRYPT '85 (Linz, Austria, 1985)Advances in Cryptology---EUROCRYPT '85, Workshop on the Theory and Applications of Cryptographic Techniques. Franz Pichler (ed.) (1986) pp. 31--34.
       bib   doi   pdf   link   

75.  [KRS85a] Is the Data Encryption Standard a Group? (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. EUROCRYPT '85 (Linz, Austria, 1985)Advances in Cryptology---EUROCRYPT '85, Workshop on the Theory and Applications of Cryptographic Techniques. Franz Pichler (ed.) (1986) pp. 81--95. Replaced by 91. [KRS88].
       bib   doi   pdf   link   

74.  [Riv85] Testing Implementations of DES. Ronald L. Rivest. (1985-02) Unpublished draft.
       bib   txt   link   

73.  [BLRVW84] Problem 84-2. Counting Chordal Intersections. J[on] L. Bentley, C[harles] E. Leiserson, R[onald] L. Rivest, and C. J. Van Wyk. Journal of Algorithms 5,4 (1984) pp. 592--594.
       bib   doi   pdf   link   

72.  [GMR84b] A ``Paradoxical'' Solution to the Signature Problem. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. FOCS '84 (Singer Island, Florida, 1984)Proceedings Twenty-Fifth IEEE Annual Symposium on Foundations of Computer Science. (1984-10) pp. 441--448. Replaced by 93. [GMR88].
       bib   doi   pdf   link   

71.  [GMR84a] A `Paradoxical' solution to the signature problem (brief abstract). Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984)Advances in Cryptology -- Proceedings of CRYPTO 1984. George Blakley and David Chaum (eds.) (1985) pp. 467. Replaced by 93. [GMR88].
       bib   doi   pdf   link   

70.  [CR84] A Knapsack Type Public Key Cryptosystem Based on Arithmetic in Finite Fields (preliminary draft). Benny Chor and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984)Advances in Cryptology -- Proceedings of CRYPTO 1984. George Blakley and David Chaum (eds.) (1985) pp. 54--65. Replaced by 97. [CR88].
       bib   doi   pdf   link   

69.  [Riv84] RSA chips (past/present/future). Ronald L. Rivest. EUROCRYPT '84 (Paris, France, 1984)Advances in Cryptology: Proceedings of EUROCRYPT 84: A workshop on the theory and application of cryptographic techniques. T. Beth, N. Cot, and I. Ingemarsson (eds.) (1985) pp. 159--165.
       bib   doi   pdf   link   

68.  [RS84] How to expose an eavesdropper. Ronald L. Rivest and Adi Shamir. CACM 27,4 (1984) pp. 393--395.
       bib   acm   doi   pdf   link   

67.  [KLRTx83] Global wire routing in two-dimensional arrays. R. M. Karp, F. T. Leighton, R. L. Rivest, C. D. Thompson, U. Vazirani, and V. Vazirani. FOCS '83 (Tucson, Arizona, 1983)Proceedings Twenth-Fourth Annual Symposium on Foundations of Computer Science. Lawrence Snyder (ed.) (1983) pp. 453--459.
       bib   doi   pdf   link   

66.  [RSA83b] Cryptographic Communications system and method. Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. U.S. Patent 4,405,829. Issued September 20, 1983. (1983-09-20)
       bib   pdf   google-patent-page   link   

65.  [LR83] Estimating a Probability Using Finite Memory (Extended Abstract). Frank Thomson Leighton and Ronald L. Rivest. FCT'83 (Borgholm, Sweden, 1983)Proceedings of the 1983 International FCT--Conference on Foundations of Computation Theory. Marek Karpinski (ed.) (1983-08) pp. 255-269. Replaced by 81. [LR86].
       bib   doi   pdf   link   

64.  [RF83] A `greedy' channel router. Ronald L. Rivest and Charles M. Fiduccia. Computer-Aided Design 15,3 (1983) pp. 135--140. Reprinted in RF88.
       bib   doi   pdf   link   

63.  [Riv83b] Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals. Ronald L. Rivest. U.S. Patent 4,376,299. Issued March 8, 1983. (1983-03-08)
       bib   pdf   google-patent-page   link   

62.  [RSA83a] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 26,1 (1983) pp. 96--99. (This is a reprint of the "RSA paper" RSA78.)
       bib   acm   doi   pdf   link   

61.  [Riv83a] Data Encryption. Ronald L. Rivest. Encyclopedia of Computer Science and Engineering. Anthony Ralston (ed.) (1983)
       bib   pdf   link   

60.  [CLR82] An Application of Number Theory to the Organization of Raster-Graphics Memory. Benny Chor, Charles E. Leiserson, and Ronald L. Rivest. FOCS '82 (Chicago, Illinois, 1982)Proceedings 23rd Annual Symposium on Foundations of Computer Science. Nicholas Pippenger (ed.) (1982) pp. 92--99. Replaced by 79. [CLRS86].
       bib   doi   pdf   link   

59.  [LPRS82] Minimum Edge-Length Partitioning of Rectilinear Polygons. Andrzej Lingas, Ron Y. Pinter, Ronald L. Rivest, and Adi Shamir. Allerton '82 (Monticello, Illinois, 1982)Proceedings 20th Annual Allerton Conference on Communication, Control, and Computing. H. V. Poor and W. K. Jenkins (eds.) (1982-10) pp. 53--63.
       bib   pdf   link   

58.  [RS82c] How to reuse a ``write-once'' memory. Ronald L. Rivest and Adi Shamir. Information and Control 55,1--3 (1982) pp. 1--19.
       bib   doi   pdf   link   

57.  [Riv82b] A Short Report on the RSA Chip. Ronald L. Rivest. CRYPTO '82 (U. C. Santa Barbara, 1982)Advances in Cryptology---Proceedings of {CRYPTO 82}. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (1983) pp. 327.
       bib   pdf   link   

56.  [RS82b] Randomized Encryption Techniques. Ronald L. Rivest and Alan T. Sherman. CRYPTO '82 (U. C. Santa Barbara, 1982)Advances in Cryptology---Proceedings of {CRYPTO 82}. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (1982-08) pp. 145--163.
       bib   pdf   link   

55.  [CRS82] Advances In Cryptology---Proceedings of CRYPTO 82. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (U. C. Santa Barbara, 1982)
       bib   link   

54.  [Riv82a] The ``PI'' Placement and Interconnect System. Ronald L. Rivest. DAC '82 (Las Vegas, Nevada, 1982)Proceedings 19th IEEE Design Automation Conference. (1982) pp. 475--481.
       bib   pdf   link   

53.  [RF82] A `Greedy' Channel Router. Ronald L. Rivest and Charles M. Fiduccia. DAC '82 (Las Vegas, Nevada, 1982)Proceedings 19th IEEE Design Automation Conference. (1982) pp. 418--424.
       bib   pdf   link   

52.  [RS82a] How to reuse a ``write-once'' memory (Preliminary version). Ronald L. Rivest and Adi Shamir. STOC'82 (San Francisco, California, 1982)Proceedings of the fourteenth annual ACM symposium on Theory of Computing. (1982-05) pp. 105--113. Replaced by 58. [RS82c].
       bib   acm   doi   pdf   link   

51.  [RBM81] Provably Good Channel Routing Algorithms. Ronald L. Rivest, Alan E. Baratz, and Gary [L.] Miller. CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981)Proceedings CMU Conference on VLSI Systems and Computations. H. T. Kung, Bob Sproull, and Guy Steele (eds.) (1981) pp. 153--159.
       bib   pdf   link   

50.  [BR81] New Lower Bounds on Channel Width. Donna Brown and Ronald L. Rivest. Proceedings CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981)H. T. Kung, Bob Sproull, and Guy Steele (eds.) (1981) pp. 178--185.
       bib   pdf   link   

49.  [Riv81] Statistical analysis of the Hagelin cryptograph. Ronald L. Rivest. Cryptologia 5,1 (1981) pp. 27--32.
       bib   doi   (pdf)   link   

48.  [SRA81] Mental Poker. Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman. The Mathematical Gardner. David A. Klarner (ed.) (Prindle, Weber, and Schmidt, 1981) pp. 37--43. (1981)
       bib   pdf   link   

47.  [BCR80] Orthogonal Packings in Two Dimensions. Brenda S. Baker, Edward G. Coffman Jr., and Ronald L. Rivest. SIAM J. Comput. 9,4 (1980) pp. 846--855.
       bib   doi   pdf   link   

46.  [RMSKW80] Coping with errors in binary search procedures. R[onald] L. Rivest, A[lbert] R. Meyer, D[aniel] J. Kleitman, and K. Winklmann. JCSS 20,3 (1980) pp. 396--404.
       bib   doi   pdf   link   

45.  [YR80] On the polyhedral decision problem. Andrew C. Yao and Ronald L. Rivest. SIAM J. Computing 9,2 (1980) pp. 343--347.
       bib   doi   pdf   link   

44.  [LPR80] The Subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. JCSS 20,2 (1980) pp. 133--149.
       bib   doi   pdf   link   

43.  [Riv80a] ``Forwards and Backwards'' encryption. Ronald L. Rivest. Cryptologia 4,1 (1980) pp. 30--33.
       bib   doi   (pdf)   link   

42.  [Riv80b] A description of a single-chip implementation of the RSA cipher. Ronald L. Rivest. Lambda 1(1980) pp. 14--18.
       bib   pdf   link   

41.  [Riv79b] The BLIZZARD Computer Architecture. Ronald L. Rivest. ACM SIGARCH Computer Architecture News 7,9 (1979) pp. 2--10.
       bib   acm   doi   pdf   link   

40.  [RVW79] An Omega((n/lg n)^1/2 lower bound on the number of additions necessary to compute 0-1 polynomials over the ring of integer polynomials. Ronald L. Rivest and Jean-Paul Van de Wiele. Information Processing Letters 8,4 (1979) pp. 178--180.
       bib   doi   pdf   link   

39.  [Riv79a] Critical remarks on ``Critical remarks on some public-key cryptosystems'' by T. Herlestam. Ronald L. Rivest. BIT Numerical Mathematics 19,2 (1979) pp. 274--275.
       bib   doi   pdf   link   

38.  [AR78a] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. NCC '78 (Birmingham, Alabama, 1978)Proceedings National Conference on Communications. (1978) Replaced by 37. [AR78b].
       bib   prepub.pdf   link   

37.  [AR78b] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. IEEE Communications Society Magazine (Special Issue on Communications Privacy) 16,6 (1978) pp. 20--23.
       bib   doi   pdf   link   

36.  [BCR78] Orthogonal Packings in Two Dimensions. B. S. Baker, E. G. Coffman, and R. L. Rivest. Allerton '78 (Monticello, Illinois, 1978)Proc. 16th Annual Allerton Conf. on Communication, Control, and Computing. (1981) pp. 626--635. Replaced by 47. [BCR80].
       bib   link   

35.  [Riv78c] The Impact of Technology on Cryptography. Ronald L. Rivest. ICC '78 (Toronto, Canada, 1978)Proceedings 1978 International Conference on Communications. (1978)
       bib   pdf   link   

34.  [RMK78] Coping with errors in binary search procedures (Preliminary report). Ronald L. Rivest, Albert R. Meyer, and Daniel J. Kleitman. STOC '78 (San Diego, California, 1978)Proceedings of the tenth annual ACM symposium on Theory of computing. Richard J. Lipton (ed.) (1978) pp. 227--232. Replaced by 46. [RMSKW80].
       bib   acm   doi   pdf   link   

33.  [LPR78] The subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. STOC '78 (San Diego, California, 1978)Proceedings of the tenth annual ACM symposium on Theory of computing. Richard J. Lipton (ed.) (1978) pp. 40--50. Replaced by 44. [LPR80].
       bib   acm   doi   pdf   link   

32.  [YR78] k+1 heads are better than k. Andrew C. Yao and Ronald L. Rivest. JACM 25,2 (1978) pp. 337--340.
       bib   acm   doi   pdf   link   

31.  [Riv78b] Optimal arrangement of keys in a hash table. Ronald L. Rivest. JACM 25,2 (1978) pp. 200--209.
       bib   acm   doi   pdf   link   

30.  [RSA78] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 21,2 (1978) pp. 120--126. (This is the "RSA paper".)
       bib   acm   doi   pdf   link   

29.  [Riv78a] Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem. Ronald L. Rivest. Cryptologia 2,1 (1978) pp. 62--65.
       bib   doi   (pdf)   prepub.pdf   link   

28.  [RAD78] On Data Banks and Privacy Homomorphisms. Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. Foundations of Secure Computation. Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton (eds.) (1978)
       bib   pdf   link   

27.  [Riv77c] On the worst-case behavior of string-searching algorithms. Ronald L. Rivest. SIAM J. Computing 6,4 (1977) pp. 669--674.
       bib   doi   pdf   link   

26.  [RMKS77] Binary search using unreliable comparisons. Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, and Joel Spencer. Allerton '77 (Monticello, Illinois, 1977)Proceedings 15th Annual Allerton Conference on Communication, Control, and Computing. F. P. Preparata and M. B. Pursley (eds.) (1977) pp. 165--168. Replaced by 46. [RMSKW80].
       bib   link   

25.  [Riv77b] The necessity of feedback in minimal monotone combinational circuits. Ronald L. Rivest. IEEE Trans. on Computers C-26,6 (1977) pp. 606--607.
       bib   doi   pdf   link   

24.  [YAR77] An Omega(n^2 log n) lower bound to the shortest paths problem. Andrew C. Yao, David M. Avis, and Ronald L. Rivest. STOC '77 (Boulder, Colorado, 1977)Proceedings of the ninth annual ACM symposium on Theory of computing. John E. Hopcroft, Emily P. Friedman, and Michael A. Harrison (eds.) (1977) pp. 11--17. (Claim withdrawn.)
       bib   acm   doi   pdf   link   

23.  [Riv77a] The game of ``N questions'' on a tree. Ronald L. Rivest. Discrete Mathematics 17,2 (1977) pp. 181--186.
       bib   doi   pdf   link   

22.  [RV76b] On recognizing graph properties from adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Theoretical Computer Science 3,3 (1976) pp. 371--384.
       bib   doi   pdf   link   

21.  [DR76] Linear expected time of a simple union-find algorithm. Jon Doyle and Ronald L. Rivest. Information Processing Letters 5,5 (1976) pp. 146--148.
       bib   doi   pdf   link   

20.  [YR76] K+1 heads are better than K. Andrew C. Yao and Ronald L. Rivest. FOCS '76 (Houston, Texas, 1976)Proceedings 17th Annual Symposium on Foundations of Computer Science. Michael J. Fischer (ed.) (1976) pp. 67--70. Replaced by 32. [YR78].
       bib   doi   pdf   link   

19.  [RP76] The Mutual Exclusion Problem for Unreliable Processes: Preliminary Report. Ronald L. Rivest and Vaughan R. Pratt. FOCS '76 (Houston, Texas, 1976)Proceedings 17th Annual Symposium on Foundations of Computer Science. Michael J. Fischer (ed.) (1976) pp. 1--8.
       bib   doi   pdf   link   

18.  [HR76] Constructing optimal binary decision trees is NP-complete. Laurent Hyafil and Ronald L. Rivest. Information Processing Letters 5,1 (1976) pp. 15--17.
       bib   doi   pdf   link   

17.  [Riv76b] Partial-match retrieval algorithms. Ronald L. Rivest. SIAM J. Computing 5,1 (1976) pp. 19--50.
       bib   doi   pdf   link   

16.  [Riv76a] On self-organizing sequential search heuristics. Ronald L. Rivest. Communications of the ACM 19,2 (1976) pp. 63--67.
       bib   acm   doi   pdf   link   

15.  [RV76a] On the time required to recognize properties of graphs from their adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Ast\'{e}risque 38--39(1976) pp. 213--227.
       bib   pdf   link   

14.  [RV75] A Generalization and Proof of the Aanderaa-Rosenberg Conjecture. Ronald L. Rivest and Jean Vuillemin. STOC '75 (Albuquerque, New Mexico, 1975)Proceedings of seventh annual ACM symposium on Theory of computing. William C. Rounds (ed.) (1975) pp. 6--11. Replaced by 22. [RV76b].
       bib   acm   doi   pdf   link   

13.  [FR75b] Algorithm 489: the algorithm SELECT---for finding the ith smallest of n elements [M1]. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 173.
       bib   acm   doi   pdf   link   

12.  [FR75a] Expected time bounds for selection. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 165--172.
       bib   acm   doi   pdf   link   

11.  [Riv74d] On self-organizing sequential search heuristics. Ronald L. Rivest. SWAT '74 (New Orleans, 1974)IEEE Conference Record of 15th Annual Symposium on Switching and Automata Theory. Ronald Book (ed.) (1974) pp. 122--126. Replaced by 16. [Riv76a].
       bib   doi   pdf   link   

10.  [Riv74c] On hash-coding algorithms for partial-match retrieval. Ronald L. Rivest. SWAT '74 (New Orleans, 1974)IEEE Conference Record of 15th Annual Symposium on Switching and Automata Theory. Ronald Book (ed.) (1974) pp. 95--103.
       bib   doi   pdf   link   

9.  [Riv74b] On the optimality of Elias's algorithm for performing best-match searches. Ronald L. Rivest. IFIP '74 (Stockholm, Sweden, 1974)Proceedings of IFIP Congress. Jack L. Rosenfeld (ed.) (1974) pp. 678--681.
       bib   pdf   link   

8.  [KR74] Asymptotic Bounds for the Number of Convex n-ominoes. David A. Klarner and Ronald L. Rivest. Discrete Mathematics 8,1 (1974) pp. 31--40.
       bib   doi   pdf   link   

7.  [Riv74a] Analysis of Associative Retrieval Algorithms. Ronald L. Rivest. phdthesis. Stanford University Computer Science Department (1974)
       bib   pdf   link   

6.  [Riv73] A fast stable minimum-storage sorting algorithm. Ronald L. Rivest. , Rapport de Recherce no. 43 (1973)
       bib   pdf   link   

5.  [HR73] Graph Partitioning and Constructing Optimal Decision Trees are Polynomial Complete Problems. L[aurent] Hyafil and R[onald] L. Rivest. IRIA -- Laboratoire de Recherche en Informatique et Automatique, Rapport de Recherche no. 33 (1973) The decision tree result from this paper was published in HR76.
       bib   pdf   link   

4.  [BFPRT73] Time Bounds for Selection. Manual Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. Journal of Computer and System Sciences 7,4 (1973) pp. 448--461.
       bib   doi   pdf   link   

3.  [KR73] A procedure for improving the upper bound for the number of N-ominoes. David A. Klarner and Ronald L. Rivest. Canadian Journal of Math. 25,3 (1973) pp. 585--602.
       bib   doi   pdf   link   

2.  [RK72] Bibliography 26. Computer Sorting. Ronald L. Rivest and Donald E. Knuth. Computing Reviews 13(1972) pp. 283--289.
       bib   pdf   link   

1.  [BFPRT72] Linear time bounds for median computations. Manuel Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. STOC'72 (Denver, Colorado, 1972)Proceedings of the fourth annual ACM symposium on Theory of Computing. Patrick C. Fischer, H. Paul Zeiger, Jeffery D. Ullman, and Arnold L. Rosenberg (eds.) (1972-05) pp. 119--124. Replaced by 4. [BFPRT73].
       bib   acm   doi   pdf   link