Ronald L. Rivest: Publications and Talks

A fairly complete listing of my publications, talks, drafts, patents, and other miscellania, in a new format. (The old format version is still available here.) Another nice listing is available from Google Scholar.

Entries are listed in reverse chronological order. Each entry has a "key" usually consisting of the first letter of each author's last name (truncated and ending with "x" if there are more than five co-authors), followed by a two-digit year (and possibly a final distinguishing lower-case letter to eliminate ambiguities); these keys should be stable (except possibly for the current year). An entry may provide links to content or additional information, such as:

Some links may be "blocked" (for copyright reasons); these links appear italicized in parentheses, but will cause an error if clicked. If for some reason you need help obtaining a copy of an article, please send an email, giving the key (e.g. AR06) of the article you are looking for, to Holly Jones <hjones01@csail.mit.edu>, who should be able to help you.

This listing produced automagically from a bibtex file (Thu Apr 3 18:09:02 2014). Please let me know of broken links or other errors.

Return to my home page.


298.  [RR14] Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking. Michael O. Rabin and Ronald L. Rivest. (2014-04-03) CalTech/MIT Voting Technology Project Working Paper 122.
       bib   pdf   VTP-WP-122   link   

297.  [BR14] Honeywords: A New Tool for Protections From Password Database Breach. Kevin Bowers and Ronald L. Rivest. Presented at RSA Conference 2014 (2014-02-26)
       bib   pdf   pptx   RSA Conference 2014   link   

296.  [Riv14] Genetic Modification For Cell Pedigree Labels To Aid Disease Treatment. Ronald L. Rivest. (2014-02-18) Unpublished draft.
       bib   pdf   link   

295.  [Ax14] An Open Letter from US Researchers in Cryptography and Information Security. Martin Abadi and others. (2014-01-24)
       bib   url   pdf   link   

294.  [JR13] Honeywords: Making Password-Cracking Detectable. Ari Juels and Ronald L. Rivest. CCS'13 (Berlin, Germany, 2013) pp. 145--159.
       bib   acm   doi   pdf   gen.py   Honeywords-Project-Page   link   

293.  [BJRS13a] User Authentication Based on Voucher Codes. John G. Brainard, Ari Juels, Ronald L. Rivest, and Michael Szyldo. U.S. Patent 8,438,617. Issued May 7, 2013. (2013-05-07)
       bib   pdf   google-patent-page   link   

292.  [BJRS13b] Drifting Keys: Impersonation Detection for Constrained Devices. Kevin D. Bowers, Ari Juels, Ronald L. Rivest, and Emily Shen. INFOCOM 2013 (Turin, Italy, 2013)
       bib   pdf   INFOCOM'13   link   

291.  [JVDOx13] Remote Verification of File Protections for Cloud Data Storage. Ari Juels, Marten van Dijk, Alina Oprea, Ronald L. Rivest, and Emil P. Stefanov. U.S. Patent 8,346,742. Issued January 1, 2013. (2013-01-01)
       bib   pdf   google-patent-page   link   

290.  [DJOR13] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. J. Cryptology 26(2013) pp. 655-713.
       bib   doi   pdf   link   

289.  [SE12] Letter to President Obama on Voting. Barbara Simons and others. (2012-12-05)
       bib   pdf   VV-posting   blog   link   

288.  [AE12] Letter to President Obama on Election Reform and Verification. Kim Alexander and others. (2012-11-20)
       bib   pdf   CalVoter-posting   blog   link   

287.  [Riv12d] Turing and the Growth of Cryptography. Ronald L. Rivest. Invited talk at Boston University Turing 100 Celebration. (2012-11-11)
       bib   slides.pdf   event   link   

286.  [BVDGx12] Defending against the Unknown Enemy: Applying FlipIt to System Security. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. GameSec'12 (Budapest, Hungary, 2012) pp. 248--263.
       bib   doi   pdf   GameSec'12   ePrint(extended-version)   link   

285.  [Riv12c] Thoughts On Appropriate Technologies for Voting. Ronald L. Rivest. Invited keynote given at online special event, ``E-Voting: Risk and Opportunity,'' organized by the Center for Information Technology and Policy (CITP) at Princeton University. (2012-11-01)
       bib   slides.pdf   event   video   link   

284.  [AKSRx12] Voting: What Has Changed, What Hasn't, & What Needs Improvement. R. Michael Alvarez, Jonathan N. Katz, Charles Stewart III, Ronald L. Rivest, Stephen Ansolabehere, and Thad E. Hall. Caltech/MIT Voting Technology Project (2012)
       bib   url   pdf   link   

283.  [DJORx12] Hourglass schemes: how to prove that cloud files are encrypted. Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos. CCS'12 (Raleigh, NC, 2012) pp. 265--280.
       bib   acm   doi   pdf   CCS'12   link   

282.  [RLAWG12] Risk-Limiting Post-Election Audits: Why and How. Risk-Limiting Audits Working Group. (2012-10) (Version 1.1)
       bib   pdf   link   

281.  [RS12] A Bayesian Method for Auditing Elections. Ronald L. Rivest and Emily Shen. EVT/WOTE'12 (Seattle, WA, 2012)
       bib   url   pdf   slides.pdf   EVT/WOTE'12   video   link   

280.  [Riv12b] Remarks on Turing and cryptography. Ronald L. Rivest. (2012-06-16) This note contains remarks made at a panel discussion entitled "Information Data Security in a Networked Future" June 16, 2012 at the ACM Turing Centenary in San Francisco, CA.
       bib   txt   ACM-Turing-Centenary   webcast   link   

279.  [DDMMx12] Picture-Hanging Puzzles. Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, and Mihai Patrascu. FUN 2012 (Venice, Italy, 2012) To appear in FUN 2012.
       bib   pdf   conference   arXiv   link   

278.  [Riv12a] Protecting your vote. Ronald L. Rivest. Published in The Boston Globe, in The Podium section (2012-04-03)
       bib   url   txt   link   

277.  [DJOR12] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. (2012-02-26) IACR ePrint Archive Report 2012/103.
       bib   url   pdf   associated-talk   RSA-Labs-FlipIt-site   link   

276.  [RSX11] Complexity of Computing the Margin of Victory for Various Voting Rules. Ronald L. Rivest, Emily Shen, and Lirong Xia. Poster session at First Cambridge Area Economics and Computation Day (2011-11-18)
       bib   shen-slides.pdf   shen-slides.pptx   CAEC'11   link   

275.  [Riv11d] Remarks on On-line Voting (aka ``Internet Voting''). Ronald L. Rivest. Panel discussion, reported on by Luther Weeks. (2011-10-27) On October 27th, 2011, I participated in a panel about on-line voting ("internet voting"), held at Central Connecticut State University, that was organized by the office of Connecticut's Secretary of State, Denise Miller. A sumary of this event, including videos, can be found at the following url. A PBS NewsHour report (2/16/2012) on ``Internet Voting: Will Democracy or Hackers Win?'' featured clips from this event.
       bib   url   PBS-NewsHour   link   

274.  [BDJOR11] How to Tell if Your Cloud Files are Vulnerable to Drive Crashes. Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. CCS'11 (Chicago, Illinois, 2011) pp. 501--514.
       bib   acm   doi   pdf   CCS'11   link   

273.  [Riv11c] Remarks on the Future of Election Integrity. Ronald L. Rivest. Panel discussion (2011-10-01) Panel remarks given at EIPPF 2011 (Election Integrity: Past, Present, and Future) workshop, held at MIT on October 1, 2011. The following links give (a rough version of) my remarks, and the url links to videos of EIPPF 2011 (my talk in is the third panel, on "The Future").
       bib   url   txt   link   

272.  [Riv11b] Illegitimi non carborundum. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2011 (2011-08-15) A link to the slides and associated movie (which needs to be in the same directory when shown) is given below. (This talk was given again, in brisker form, at the 2011-08-30 Celebration for Michael Rabin at Harvard.) More information on FlipIt, including a link to an interactive version of the game, will become available at http://www.rsa.com/flipit.
       bib   slides.mov   slides.pdf   associated-paper   link   

271.  [MRSW11] Computing the Margin of Victory in IRV Elections. Thomas R. Magrino, Ronald L. Rivest, Emily Shen, and David Wagner. EVT/WOTE'11 (San Francisco, California, 2011) The online conference proceedings provide a link to Magrino's talk slides and a video of his presentation.
       bib   url   pdf   link   

270.  [Riv11f] On the contributions of Alan Turing. Ronald L. Rivest. Remarks given March 15, 2011 at the American Academy of Arts and Science, Cambridge, MA, in association with readings from "Breaking the Code". (2011-03-15)
       bib   remarks-video   event-site   link   

269.  [Riv11a] The growth of cryptography. Ronald L. Rivest. Talk given February 8, 2011 at my Killian award lecture. (2011-02-08)
       bib   slides.pdf   video   press   link   

268.  [Riv11e] On the invertibility of the XOR of rotations of a binary word. Ronald L. Rivest. International Journal of Computer Mathematics 88,2 (2011) pp. 281--284.
       bib   doi   prepub.pdf   link   

267.  [LRW11] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. Journal of Cryptology 24,3 (2011) pp. 588--613.
       bib   doi   pdf   link   

266.  [HRS11] Sharper p-values for stratified election audits. Michael J. Higgins, Ronald L. Rivest, and Philip B. Stark. Statistics, Politics, and Policy 2,1, Article 7 (2011)
       bib   doi   pdf   link   

265.  [RS10] An Optimal Single-Winner Preferential Voting System Based on Game Theory. Ronald L. Rivest and Emily Shen. COMSOC 2010 (D\"{u}sseldorf, Germany, 2010)
       bib   url   conference.pdf   full.pdf   workshop   code   link   

264.  [CCCCx10] Scantegrity II Municipal Election at Takoma Park: The first E2E Binding Governmental Election with Ballot Privacy. Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. USENIX '10 (Washington, D.C., 2010)
       bib   url   pdf   link   

263.  [Riv10] Thoughts on UOCAVA voting. Ronald L. Rivest. Talk at Workshop on UOCAVA Remote Voting Systems (2010-08-06)
       bib   slides.pdf   workshop   link   

262.  [SCCCx10] Scantegrity Mock Election at Takoma Park. Alan T. Sheman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, and Poorvi Vora. EVOTE2010 (Bregenz, Austria, 2010) pp. 35--51.
       bib   pdf   conference   link   

261.  [Gx10] Climate change and the integrity of science. P. H. Gleick and others. Science 328(2010) pp. 689--690.
       bib   url   pdf   alt.pdf   link   

260.  [Kan10] Voting and Verifiability. Christine Kane. Vantage Magazine 7,1 (2010) pp. 13--15. (Interview with Ronald L. Rivest.)
       bib   pdf   link   

259.  [CJRRx10] Towards Trustworthy Elections: New Directions in Electronic Voting. David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, and Ben Adida (eds.) (Springer, 2010)
       bib   url   link   

258.  [RCPRx09] Guest editorial: Special Issue on Electronic Voting. Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 593--596.
       bib   doi   pdf   link   

257.  [CCCEx09] Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes. David Chaum, Richard T. Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 611--627.
       bib   doi   pdf   correction.pdf   link   

256.  [Riv09d] Security of Voting Systems. Ronald L. Rivest. Talk given at George Washington University Computer Science Department on November 9, 2009. (2009-11-09)
       bib   slides.pdf   slides.ppt   link   

255.  [Riv09c] Audit Thoughts. Ronald L. Rivest. Slides for a brief talk on post-election auditing, given at the Post-Election Audit Workshop, organized by the American Statistical Association on October 24, 2009 (Alexandria, Virginia) (2009-10-24)
       bib   slides.pdf   slides.ppt   link   

254.  [Riv09b] Perspectives on E2E Voting Systems. Ronald L. Rivest. Keynote talk given at NIST End-to-End Voting Systems Workshop on October 13, 2009 (2009-10-13)
       bib   slides.pdf   slides.ppt   link   

253.  [Riv09a] The ``Taint'' Leakage Model. Ronald L. Rivest. Talk given at rump session at the 2009 Crypto in the Clouds Workshop (MIT) on August 4, 2009 (2009-08-04)
       bib   slides.pdf   slides.pptx   link   

252.  [BKNR09] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 7,502,467. Issued March 10, 2009. (2009-03-10)
       bib   pdf   google-patent-page   link   

251.  [DRRS09] Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, and Emily Shen. FSE '09 (Leuven, Belgium, 2009) pp. 104--121.
       bib   doi   pdf   prepub.pdf   link   

250.  [CLRS09] Introduction to Algorithms (Third edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press, 2009)
       bib   url   errata   thc-faq   link   

249.  [RABCx08] The MD6 Hash Function---A Proposal to NIST for SHA-3. Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, and Yiqun Lisa Yin. Submitted to NIST on October 27, 2008 (2008-10-27) (pdf given revised April 5, 2010.)
       bib   pdf   MD6 project website   link   

248.  [Riv08b] On the notion of `software independence' in voting systems. Ronald L. Rivest. Philosophical Transactions of The Royal Society A 366,1881 (2008) pp. 3759--3767.
       bib   doi   pdf   link   

247.  [Riv08c] The MD6 Hash Function. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2008 (2008-08)
       bib   slides.pdf   slides.ppt   link   

246.  [CCCEx08] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, and Alan T. Sherman. EVT'08 (San Jose, California, 2008)
       bib   url   pdf   EVT'08   link   

245.  [APR08] On Auditing Elections When Precincts Have Different Sizes. Javed Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT'08 (San Jose, California, 2008)
       bib   url   pdf   slides.pdf   EVT'08   link   

244.  [Riv08a] A "Sum of Square Roots" (SSR) Pseudorandom Sampling Method for Election Audits. Ronald L. Rivest. (2008-04-25) Unpublished draft.
       bib   pdf   link   

243.  [BKR08] Method and apparatus for performing enhanced time-based authentication. John G. Brainard, Burton S. Kaliski, and Ronald L. Rivest. U.S. Patent 7,363,494. Issued April 22, 2008. (2008-04-22)
       bib   pdf   google-patent-page   link   

242.  [Riv07b] A Simple Rule of Thumb for Election Audit Size Determination. Ronald L. Rivest. (2007-10-31) Unpublished draft.
       bib   pdf   link   

241.  [TGDC07] VVSG Recommendations to the EAC. Technical Guidelines Development Committee. Delivered to the EAC on September 4, 2007 for consideration and public comment. (2007-08-31) (VVSG means ``Voluntary Voting System Guidelines''.)
       bib   pdf   VVSG   EAC   link   

240.  [CRSTx07] Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan, and Hoeteck Wee. CRYPTO '07 (Santa Barbara, California, 2007) pp. 264--283.
       bib   pdf   link   

239.  [RS07] Three Voting Protocols: ThreeBallot, VAV, and Twin. Ronald L. Rivest and Warren D. Smith. EVT '07 (Boston, Massachusetts, 2007)
       bib   url   pdf   slides.pdf   slides.ppt   EVT'07   link   

238.  [APR07] On Estimating the Size and Confidence of a Statistical Audit. Javed A. Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT '07 (Boston, Massachusetts, 2007)
       bib   url   pdf   popa-slides.pdf   popa-slides.ppt   EVT'07   link   

237.  [CKRR08] Frontiers of Electronic Voting---Dagstuhl Seminar 07311: Executive Summary. David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, and Peter Y. A. Ryan. Dagstuhl Seminar 07311--Frontiers of Electronic Voting (Schloss Dagstuhl, Germany, 2007)
       bib   url   pdf   Abstracts-of-meeting   link   

236.  [Riv07a] On Auditing Elections When Precincts Have Different Sizes. Ronald L. Rivest. (2007-04-29) Replaced by 245. [APR08]. Unpublished draft.
       bib   pdf   dataset.txt   link   

235.  [YABCx07] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. SPW'10 (Brno, Czech Republic, 2007) pp. 171. For full report see YABCx05.
       bib   doi   pdf   discussion.pdf   discussion.doi   link   

234.  [ABCLx07] On the security of the EMV secure messaging API (Extended Abstract). Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, and Ronald L. Rivest. SPW '07 (Brno, Czech Republic, 2007) pp. 147--149.
       bib   doi   pdf   prepub.pdf   link   

233.  [WLM07] Engaging Privacy and Information Technology in a Digital Age. James Waldo, Herbert S. Lin, and Lynette Millett (eds.) (National Academies Press, 2007) (Rivest served on the NRC Committee on Privacy in the Information Age, which produced this report.)
       bib   url   (pdf)   link   

232.  [ACHR07] Lightweight Email Signatures. Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. Chapter 10.6. Phishing and Countermeasures---Understanding the Increasing Problem of Electronic Identity Theft. Markus Jakobsson and Steven Myers (eds.) (Wiley, 2007) pp. 435--453. Revised version of ACHR06.
       bib   pdf   link   

231.  [Riv06d] On Estimating the Size of a Statistical Audit. Ronald L. Rivest. (2006-11-14) Replaced by 238. [APR07]. Unpublished draft.
       bib   pdf   link   

230.  [BJRSY06] Fourth Factor Authentication: Somebody you know. John Brainard, Air Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. CCS '06 (Alexandria, Virginia, 2006) pp. 168--178.
       bib   acm   doi   pdf   CCS'06   link   

229.  [AR06] Scratch & vote: self-contained paper-based cryptographic voting. Ben Adida and Ronald L. Rivest. WPES '06 (Alexandria, Virginia, 2006) pp. 29--39.
       bib   acm   doi   pdf   adida-slides.pdf   WPES'06   link   

228.  [Riv06c] The ThreeBallot Voting System. Ronald L. Rivest. (2006-10-01) Replaced by 239. [RS07]. Unpublished draft.
       bib   pdf   link   

227.  [ACHR06] Lightweight Email Signatures (Extended Abstract). Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. SCN '06 (Maiori, Italy, 2006) pp. 288--302.
       bib   doi   pdf   prepub.pdf   link   

226.  [RW06] On the notion of ``software independence'' in voting systems. Ronald L. Rivest and John P. Wack. Prepared for the TGDC, and posted by NIST at the given url. (2006-07-28) Replaced by 248. [Riv08b].
       bib   url   pdf   link   

225.  [ABCLx06] Phish and Chips --- Traditional and New Recipes for Attacking EMV. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven Murdoch, Ross Anderson, and Ron[ald L.] Rivest. SPW'06 (Cambridge, UK, 2006) pp. 40--48.
       bib   doi   pdf   link   

224.  [Riv06b] Recollections of Stanford CS 1969--1973. Ronald L. Rivest. Talk given March 21, 2006 at Stanford Computer Science Forum celebrating the 40th anniversary of the Stanford CS Department (2006-03-21)
       bib   slides.pdf   slides.ppt   link   

223.  [Riv06a] Perspectives on Financial Cryptography (revisited). Ronald L. Rivest. Invited keynote talk given 2/27/06 at Financial Cryptography 2006. (An update on talk given 2/27/97 at Financial Cryptography 1997.) (2006-02-27)
       bib   slides.pdf   slides.ppt   FC'97 talk   link   

222.  [BKNR06] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 6,985,583. Issued January 10, 2006. (2006-01-10)
       bib   pdf   google-patent-page   link   

221.  [JRS05] Method and apparatus for selective blocking of radio frequency identification devices. Ari Juels, Ronald L. Rivest, and Michael Szydlo. U.S. Patent 6,970,070. Issued November 29, 2005. (2005-11-29)
       bib   pdf   google-patent-page   link   

220.  [Riv05c] Abelian square-free dithering for iterated hash functions. Ronald L. Rivest. HASH'05 (NIST Gaithersburg, Maryland, 2005)
       bib   url   pdf   code.c   HASH'05   related-talk   link   

219.  [Riv05b] Preliminary Voting---Prevoting. Ronald L. Rivest. Unpublished draft. (2005-08-06)
       bib   pdf   link   

218.  [YABCx05] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. University of Cambridge Computer Laboratory (2005) Technical Report UCAM-CL-TR-644. Also see YABCx07.
       bib   url   pdf   link   

217.  [AHR05b] Lightweight Encryption for Email. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. SRUTI '05 (Cambridge, MA, 2005) pp. 93--99.
       bib   url   pdf   adida-slides.pdf   link   

216.  [Riv05a] Abelian Square-free-dithering for iterated hash functions. Ronald L. Rivest. Talk given at ECRYPT workshop on Hash Functions (Przegorzaly (Krakow), Poland) (2005-06-23)
       bib   slides.pdf   slides.ppt   related-paper   link   

215.  [AHR05a] Ad-Hoc Group Signatures from Hijacked Keypairs. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Unpublished draft. A preliminary version was presented by Ben Adida at the April 14--15, 2005 DIMACS Workshop on Theft in E-Commerce. (2005-06-24)
       bib   pdf   workshop   link   

214.  [RK03] RSA Problem. Ronald L. Rivest and Burt Kaliski. Encyclopedia of Cryptography and Security. Henk C. A. Van Tilborg (ed.) (Springer, 2005)
       bib   prepub.pdf   link   

213.  [LSYRR05] Permutation Operations in Block Ciphers. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. Chapter 13. Embedded Cryptographic Hardware: Design \& Security. Nadia Nedjah and Luiza de Macedo Mourelle (eds.) (Nova Science, 2005) pp. 219--234. A previous version appeared as LSYRR04.
       bib   link   

212.  [RCBDR04] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald L. Rivest. Concurrency and Computation: Practice and Experience 16,11 (2004) pp. 1099--1120. An extended version of RCBDR03.
       bib   doi   pdf   link   

211.  [Riv04b] Electronic Voting. Ronald L. Rivest. Talk given at the NSA June 3, 2004. (2004-06-03)
       bib   slides.pdf   slides.ppt   link   

210.  [Riv04a] Remarks on Electronic Voting. Ronald L. Rivest. Talk given at the Harvard Kennedy School of Government Digital Voting Symposium, June 1, 2004. (2004-06-01)
       bib   remarks.txt   link   

209.  [Riv04d] Some thoughts on electronic voting. Ronald L. Rivest. Talk given May 26, 2004 at DIMACS Workshop on Electronic Voting (2004-05-26)
       bib   url   slides.pdf   slides.ppt   workshop   link   

208.  [LSYRR04] On Permutation Operations in Cipher Design. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. ITCC'04 (Las Vegas, Nevada, 2004) pp. 569--577.
       bib   doi   pdf   link   

207.  [Riv04e] On the Notion of Pseudo-Free Groups. Ronald L. Rivest. TCC'04 (Cambridge, Massachusetts, 2004) pp. 505--521.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   TCC'04   link   

206.  [Riv04c] Peppercoin Micropayments. Ronald L. Rivest. FC'04 (Key West, 2004) pp. 2--8.
       bib   doi   pdf   slides.ppt   slides.slides.pdf   FC'04   link   

205.  [JRS03] The Blocker Tag: Selective blocking of RFID Tags for Consumer Privacy. Ari Juels, Ronald L. Rivest, and Michael Szydlo. CCS'03 (Washington, DC, ) pp. 103--111.
       bib   acm   doi   pdf   juels-slides.pdf   prepub.pdf   RSA page   link   

204.  [ARS03] 2002 ACM A. M. Turing Award Lectures. Leonard M. Adleman, Ronald L. Rivest, and Adi Shamir. Talks given June 8, 2003 at FCRC in San Diego, California. (2003-06-08) Rivest's lecture titled ``The Early Days of RSA: History and Lessons''.
       bib   acm   doi   rivest-slides.pdf   rivest-slides.ppt   ACM Turing Award   Adleman   Rivest   Shamir   link   

203.  [RCBDR03] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald [L.] Rivest. SAC '03 (Melbourne, Florida, 2003) pp. 338--345.
       bib   acm   doi   pdf   prepub.pdf   SAC'03   link   

202.  [SORJx03] Does Anyone Really Need Micropayments?. Nicko van Someren, Andrew Odlyzko, Ronald L. Rivest, Tim Jones, and Duncan Goldie-Scot. FC'03 (Guadeloupe, French West Indies, 2003) pp. 69--76.
       bib   doi   pdf   FC'03   link   

201.  [BCGKx02] The Untrusted Computer Problem and Camera-Based Authentication. Matt Burnside, Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Marten van Dijk, Srinivas Devadas, and Ronald [L.] Rivest. Pervasive 2002 (Zurich, Switzerland, 2002) pp. 114--124.
       bib   doi   pdf   prepub.pdf   link   

200.  [LRW02] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. CRYPTO'02 (Santa Barbara, California, 2002) pp. 31--46. Replaced by 267. [LRW11].
       bib   doi   pdf   prepub.pdf   link   

199.  [JJR02] Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. Markus Jakobsson, Ari Juels, and Ronald L. Rivest. SEC'02 (San Francisco, California, 2002) pp. 339--353. Also available as IACR eprint 2002/025.
       bib   pdf   prepub.pdf   SEC'02   eprint   link   

198.  [WCGRW02] Privacy Tradeoffs: myth or reality? (Panel Summary). Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, and Graham Wood. FC'02 (Southampton, Bermuda, 2002) pp. 147--151.
       bib   doi   pdf   link   

197.  [BCMMx02] Proxy-based Security Protocols in Networked Mobile Devices. M. Burside, D. Clarke, T. Mills, A. Maywah, S. Devadas, and R[onald L.] Rivest. SAC 2002 (Madrid, Spain, 2002) pp. 265--272.
       bib   acm   doi   pdf   prepub.pdf   SAC'02   link   

196.  [MR02b] Transitive signature schemes. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002) pp. 236--243. A related talk Riv00 was given in 2000.
       bib   doi   pdf   prepub.pdf   link   

195.  [MR02a] Micropayments revisited. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002) pp. 149--163. A related talk RM02 was given at the FC'02 ``rump session''.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

194.  [CRR02] An Efficient Scheme for Route Aggregation. Suresh Chari, Tal Rabin, and Ronald L. Rivest. (2002-02-01) A related talk Riv00 was given in 2000.
       bib   pdf   link   

193.  [RM02] Peppercorn Micropayments via better ``Lottery Tickets''. Ronald L. Rivest and Silvio Micali. Talk given at the ``rump session'' of Financial Cryptography 2002. (2002)
       bib   slides.pdf   slides.ppt   link   

192.  [RST01] How to Leak a Secret. Ronald L. Rivest, Adi Shamir, and Yael Tauman. ASIACRYPT 2001 (Gold Coast, Australia, 2001) pp. 552--565.
       bib   doi   pdf   link   

191.  [BJR01] A Modular Voting Architecture (``Frogs''). Shuki Bruck, David Jefferson, and Ronald L. Rivest. Talk presented at WOTE 2001 (Workshop on Trustworthy Elections) (2001-08) Reprinted in CJRRx10.
       bib   pdf   slides.pdf   slides.ppt   link   

190.  [RRSY01] Enchanced block ciphers with data-dependent rotations. Ronald L. Rivest, Matthew John Barton Robshaw, Raymond Mark Sidney, and Yiqun Lisa Yin. U.S. Patent 6,269,163. Issued July 31, 2001. (2001-07-31)
       bib   pdf   google-patent-page   link   

189.  [VTP01] Voting---What is, What Could Be. CalTech MIT Voting Technology Project. California Institute of Technology and The Massachusetts Institute of Technology (2001)
       bib   pdf   rivest-press-conference-remarks.txt   VTP site for report   link   

188.  [Riv01e] Security in Voting Technology. Ronald L. Rivest. (2001-05-24) Testimony given to U.S. Committee on House Administration May 24, 2001.
       bib   txt   link   

187.  [Riv01d] Multi-grade cryptography. Ronald L. Rivest. (2001-04-29) Unpublished draft.
       bib   pdf   link   

186.  [Riv01c] Permutation polynomials modulo 2^w. Ronald L. Rivest. Finite Fields and Their Applications 7,2 (2001) pp. 287--292.
       bib   doi   pdf   link   

185.  [Riv01a] Issues in Cryptography. Ronald L. Rivest. Short luncheon talk given March 7, 2001 at Computers, Freedom, and Privacy 2001 Conference (2001-03-07)
       bib   slides.pdf   slides.ppt   link   

184.  [Riv01b] Electronic voting. Ronald L. Rivest. Talk given for Cambridge Club at Harvard Faculty Club, March 5, 2001. (2001-03-05)
       bib   slides.pdf   slides.ppt   link   

183.  [GNRRY01] The Business of Electronic Voting. Ed Gerck, Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, and Moti Yung. FC'01 (Grand Cayman, British West Indies, 2001) pp. 243--268.
       bib   doi   pdf   rivest-only-prepub.pdf   link   

182.  [RS01] Are ``Strong'' Primes Needed for RSA?. Ronald L. Rivest and Robert D. Silverman. IACR Cryptology ePrint archive, paper 2001/007 (Version 1998-12-01 Submitted January 30, 2001). (2001-01-30)
       bib   url   pdf   version-1999-11-22.pdf   link   

181.  [CLRS01] Introduction to Algorithms (Second edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press and McGraw Hill, 2001)
       bib   url   link   

180.  [CEEFx01] Certificate chain discovery in SPKI/SDSI. Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Journal of Computer Security 9,4 (2001) pp. 285--322.
       bib   pdf   link   

179.  [Riv00] Two signature schemes. Ronald L. Rivest. Talk given October 17, 2000 at Cambridge University. (2000-10-17)
       bib   slides.pdf   scheme 1:MR02b   scheme 2:CRR02   link   

178.  [RRY00] The Case for RC6 as the AES. Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Yin. Comment submitted to NIST May 16, 2000 for round 2 of AES competition. (2000-05-16)
       bib   pdf   NIST-round-2-comments   link   

177.  [Riv99d] Unconditionally secure commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer. Ronald L. Rivest. (1999-11-08)
       bib   pdf   link   

176.  [BR99] Translucent Cryptography---An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. Mihir Bellare and Ronald L. Rivest. Journal of Cryptology 12,2 (1999) pp. 117--139.
       bib   doi   pdf   prepub.MIT-LCS-TR-683.pdf   link   

175.  [EFLRx99b] SPKI Certificate Theory. C[arl] Ellison, B[ill] Frantz, B[utler] Lampson, R[onald L.] Rivest, B[rian M.] Thomas, and T[atu] Ylonen. Internet Network Working Group Request for Comments: RFC 2693 (September 1999). (1999-09)
       bib   txt   link   

174.  [LRSW99] Pseudonym Systems. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. SAC'99 (Kingston, Ontario, Canada, 1999) pp. 184--199.
       bib   doi   pdf   prepub.pdf   link   

173.  [ABRS99] Piecemeal graph exploration by a mobile robot. Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. Information and Computation 152,2 (1999) pp. 155--172.
       bib   doi   pdf   link   

172.  [EFLRx99a] Simple Public Key Certificate. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ietf-spki-cert-structure-06.txt, July 26, 1999. (1999-07-26)
       bib   txt   link   

171.  [CRRY99b] Some Comments on the First Round AES Evaluation of RC6. Scott Contini, Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Lisa Yin. Submitted as a public comment in response to NIST's call for comments on the AES Candidates. Posted on NIST web site. (1999-04-15)
       bib   url   pdf   link   

170.  [Riv99b] Description of the LCS35 Time Capsule Crypto-Puzzle. Ronald L. Rivest. (1999-04) Unpublished note.
       bib   lcs35-code.java   lcs35-parameters.txt   lcs35-puzzle-description.txt   related-paper:RSW96   Dan-Bricklin's-LCS35-page   link   

169.  [CRRY99a] Improved Analysis of some Simplified Variants of RC6. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. FSE '99 (Rome, Italy, 1999) pp. 1--15.
       bib   doi   pdf   link   

168.  [Riv99c] Some Thoughts on Serial Numbers on Intel CPU's. Ronald L. Rivest. (1999-01-26) Unpublished note, drafted 1/26/99, revised 8/23/99.
       bib   txt   link   

167.  [Riv99a] The Beer Bottle Cipher. Ronald L. Rivest. CCE Quarterly Journal (Pricewaterhouse Coopers Cryptographic Center of Excellence) ,3 (1999) pp. 28--30.
       bib   txt   link   

166.  [Riv98f] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,835,600. Issued November 10, 1998. (1998-11-10)
       bib   pdf   google-patent-page   link   

165.  [Riv98e] The Case against Regulating Encryption Technology. Ronald L. Rivest. Scientific American 279,4 (1998) pp. 116--117.
       bib   doi   pdf   prepub.txt   link   

164.  [GPR98] Self-Delegation with Controlled Propagation ---or--- What if you lose your laptop. Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. CRYPTO'98 (Santa Barbara, California, 1998) pp. 153--168. This paper also appears as IACR Cryptology ePrint Archive Report 1997/012.
       bib   doi   pdf   prepub.pdf   ePrint-1997/012   link   

163.  [RRSY98] The RC6 Block Cipher. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. Posted on the RC6 site of RSA Laboratories. (1998-08-20) Slides from NIST AES1 (1998-08-21) and AES3 (2000-04-14) conferences.
       bib   url   pdf   AES1.slides.pdf   AES1.slides.ppt   AES3.slides.pdf   AES3.slides.ppt   note.txt   RSA-labs-RC6-site   link   

162.  [CRRY98] The Security of the RC6 Block Cipher. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. Posted on the RC6 site of RSA Laboratories. (1998-08-20)
       bib   url   pdf   RSA-labs-RC6-site   link   

161.  [KRRR98] On the Design and Security of RC2. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and Matthew J. B. Robshaw. FSE '98 (Paris, France, 1998) pp. 206--221.
       bib   doi   pdf   link   

160.  [EFLRx98] SPKI examples. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ieft-spki-cert-examples-01.txt, March 10, 1998. (1998-03-10)
       bib   txt   link   

159.  [Riv98d] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,724,428. Issued March 3, 1998. (1998-03-03)
       bib   pdf   google-patent-page   link   

158.  [Riv98c] A Description of the RC2(r) Encryption Algorithm. Ronald L. Rivest. Internet Network Working Group Request for Comments: RFC 2268. (1998-03)
       bib   txt   link   

157.  [Riv98b] Can We Eliminate Certificate Revocation Lists?. Ronald L. Rivest. FC'98 (Anguilla, British West Indies, 1998) pp. 178--183.
       bib   doi   pdf   prepub.pdf   link   

156.  [Riv98a] Chaffing and Winnowing: Confidentiality without Encryption. Ronald L. Rivest. CryptoBytes (RSA Laboratories), volume 4, number 1 (summer 1998), 12--17. (1998)
       bib   url   pdf   prepub.txt   remarks.txt   slides.pdf   slides.ppt   CryptoBytes   link   

155.  [AABBx98] The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption --- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, and Bruce Schneier. Report issued by the CDT (Center for Democracy and Technology). (1998) 1998 revision of May 1997 report.
       bib   url   pdf   link   

154.  [BRS97] Geometric Cryptography: Identification by Angle Trisection. Mike Burmester, Ronald L. Rivest, and Adi Shamir. (1997-11-04) Unpublished draft.
       bib   pdf   link   

153.  [Riv97c] Cryptography as Duct Tape. Ronald L. Rivest. A short note written to the U.S. Senate Commerce and Judiciary Committee in opposition to mandatory key recovery proposals (1997-06-12)
       bib   txt   link   

152.  [Riv97b] Electronic Lottery Tickets as Micropayments. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997) pp. 307--314.
       bib   doi   pdf   link   

151.  [Riv97a] Perspectives on Financial Cryptography. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997) pp. 145--149.
       bib   doi   pdf   slides.pdf   slides.ppt   link   

150.  [Riv97d] All-Or-Nothing Encryption and The Package Transform. Ronald L. Rivest. FSE'97 (Haifa, Israel, 1997) pp. 210--218.
       bib   doi   pdf   prepub.pdf   link   

149.  [BR96] The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. R[obert] Baldwin and R[onald L.] Rivest. Internet Network Working Group Request for Comments: RFC 2040 (1996-10)
       bib   url   txt   link   

148.  [GMR96] On breaking a Huffman code. David W. Gillman, Mojdeh Mohtashemi, and Ronald L. Rivest. IEEE Transaction on Information Theory 42,3 (1996) pp. 972--976.
       bib   doi   pdf   link   

147.  [RL96] SDSI -- A Simple Distributed Security Infrastructure. Ronald L. Rivest and Butler Lampson. (1996-04-30)
       bib   slides-crypto96.pdf   slides-crypto96.ppt   slides-maryland.pdf   slides-maryland.ppt   slides-rsalabs96.pdf   slides-rsalabs96.ppt   slides-usenix.pdf   slides-usenix.ppt   ver-1.0.pdf   ver-1.1.html   CIS-SDSI-page   link   

146.  [RS96a] PayWord and MicroMint--Two Simple Micropayment Schemes. Ronald L. Rivest and Adi Shamir. SPW'96 (Cambridge, United Kingdom, 1996) pp. 69--87.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

145.  [RSW96] Time-lock puzzles and timed-release crypto. Ronald L. Rivest, Adi Shamir, and David A. Wagner. MIT Laboratory for Computer Science, Technical memo MIT/LCS/TR-684 (1996) (Revision 3/10/96)
       bib   pdf   link   

144.  [BDRSx96] Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shinomura, Eric Thompson, and Michael Wiener. Released by the Business Software Alliance (January 1996). (1996-01)
       bib   pdf   link   

143.  [RS96b] PayWord and MicroMint (extended abstract). Ronald L. Rivest and Adi Shamir. CryptoBytes (RSA Laboratories), volume 2, number 1 (spring 1996), 7--11. (1996) Reprint of RS96a.
       bib   url   pdf   CryptoBytes   link   

142.  [RY95] Being Taught Can be Faster than Asking Questions. Ronald L. Rivest and Yiqun Lisa Yin. COLT'95 (Santa Cruz, California, 1995) pp. 144--151.
       bib   acm   doi   pdf   prepub.pdf   link   

141.  [ABRS95] Piecemeal graph exploration by a mobile robot (extended abstract). Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'95 (Santa Cruz, California, 1995) pp. 321--328.
       bib   acm   doi   pdf   link   

140.  [BRS95] Piecemeal Learning of an Unknown Environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. Machine Learning 18,2 (1995) pp. 231--254.
       bib   doi   pdf   link   

139.  [Riv95] The RC5 Encryption Algorithm. Ronald L. Rivest. Dr. Dobb's Journal 20,1 (1995) pp. 146--148.
       bib   pdf   link   

138.  [BR95] Picking the Best Expert from a Sequence. Ruth Bergman and Ronald L. Rivest. WAIS'95 (Fort Lauerdale, Florida, 1995) pp. 219--228.
       bib   pdf   prepub.pdf   link   

137.  [GR95] Complete Variable-Length ``Fix-Free'' Codes. David Gillman and Ronald L. Rivest. Designs, Codes and Cryptography 5,2 (1995) pp. 109--114.
       bib   doi   pdf   link   

136.  [Riv94] The RC5 Encryption Algorithm. Ronald L. Rivest. FSE'94 (Leuven, Belgium, 1994) pp. 86--96.
       bib   doi   pdf   errata-1997-03-20.txt   prepub.pdf   revised-1997-03-20.pdf   link   

135.  [RS94b] A Formal Model of Hierarchical Concept-Learning. Ronald L. Rivest and Robert Sloan. Information and Computation 114,1 (1994) pp. 88--114.
       bib   doi   pdf   link   

134.  [HPKR94] Computational Learning Theory and Natural Learning Systems: Intersections between Theory and Experiment. Stephen Jos\'{e} Hanson, Thomas Petsche, Michael Kearns, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

133.  [RS94a] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. Journal of the ACM 41,3 (1994) pp. 555--589.
       bib   acm   doi   pdf   link   

132.  [RY94] Simulation Results for a new two-armed bandit heuristic. Ronald L. Rivest and Yiqun Yin. Proceedings of a workshop on Computational Learning Theory and Natural Learning Systems (Princeton, New Jersey, 1994) pp. 477--486.
       bib   pdf   link   

131.  [HDR94] Computational Learning Theory and Natural Learning Systems: Constraints and Prospects. Stephen Jos\'{e} Hanson, George A. Drastal, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

130.  [GRS93] Learning binary relations and total orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. SIAM Journal on Computing 22,5 (1993) pp. 1006--1034.
       bib   doi   pdf   link   

129.  [RS93b] On choosing between experimenting and thinking when learning. Ronald L. Rivest and Robert H. Sloan. Information and Computation 106,1 (1993) pp. 1--25.
       bib   doi   pdf   link   

128.  [BRS93] Piecemeal learning of an unknown environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'93 (Santa Cruz, California, 1993) pp. 277--286.
       bib   acm   doi   pdf   link   

127.  [RS93a] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. Information and Computation 103,2 (1993) pp. 299--347.
       bib   doi   pdf   link   

126.  [GBRBx93] Commentators. Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, and Gary T. Marx. Communications of the ACM 36,3 (1993) pp. 34--41. (Commentary on preceding article ``To tap or not to tap'' by Dorothy Denning.)
       bib   acm   doi   pdf   link   

125.  [GR93] Scapegoat trees. Igal Galperin and Ronald L. Rivest. SODA '93 (Austin, Texas, 1993) pp. 165--174. Chapter 19.
       bib   url   pdf   link   

124.  [KACDx93] Group Report: Architectures of Intelligent Systems. D. Kirsh, J. S. Altman, J.-P Changeux, A. R. Damasio, R. Durbin, A. K. Engel, W. D. Hillis, D. Premack, R. Rivest, P. E. Roland, P. S. Rosenbloom, G. S. Stent, and P. Stoerig. Exploring Brain Functions: Models in Neuroscience. T. A. Poggio and D. A. Glaser (eds.) (1993)
       bib   pdf   link   

123.  [HRR93] Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (Springer, 1993)
       bib   link   

122.  [BR93] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (1993) (Reprinted with permission from Neural Networks 5,1 (January 1992), Avrim Blum and Ronald L. Rivest, ``Training a three-node neural net is NP-complete''.)
       bib   doi   pdf   link   

121.  [RHAL92] Responses to NIST's proposal. Ronald L. Rivest, Martin E. Hellman, John C. Anderson, and John W. Lyons. Communications of the ACM 35,7 (1992) pp. 41--54.
       bib   acm   doi   pdf   link   

120.  [Riv92c] The MD5 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1321 (1992-04)
       bib   txt   link   

119.  [Riv92b] The MD4 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1320 (1992-04)
       bib   txt   link   

118.  [Riv92a] Vortex air rings. Ronald L. Rivest. Nature (Scientific Correspondence) 356(1992) pp. 199--200.
       bib   doi   pdf   link   

117.  [BR92] Training a 3-node neural network is NP-complete. Avrim L. Blum and Ronald L. Rivest. Neural Networks 5,1 (1992) pp. 117--127.
       bib   doi   pdf   prepub.pdf   link   

116.  [Riv91] Cryptography and Machine Learning. Ronald L. Rivest. ASIACRYPT '91 (Fujiyoshida, Japan, 1991) pp. 427--439.
       bib   doi   pdf   link   

115.  [IRM91] Advances in Cryptography - ASIACRYPT '91. Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (eds.) ASIACRYPT '91 (Fujiyoshida, Japan, 1991)
       bib   link   

114.  [MGRS91] Research Directions in Computer Science: An MIT Perspective. Albert R. Meyer, John V. Guttag, Ronald L. Rivest, and Peter Szolovits (eds.) (MIT Press, 1991)
       bib   link   

113.  [RG91] A Fast Multiport Memory Based on Single-Port Memory Cells. R. Rivest and L. Glasser. MIT Lab for Computer Science, MIT/LCS/TM-455 (1991)
       bib   pdf   link   

112.  [LMR91] Results on Learnability and the Vapnik-Chervonenkis Dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. Information and Computation 90,1 (1991) pp. 33--49.
       bib   doi   pdf   link   

111.  [PR92] Method of secure remote access. Russell W. Pogue and Ronald L. Rivest. U.S. Patent 5,144,667. Issued December 20, 1990. (1990-12-20)
       bib   pdf   google-patent-page   link   

110.  [KPR90] Learning time-varying concepts. Anthony Kuh, Thomas Petsche, and Ronald L. Rivest. NIPS'90 (Denver, Colorado, 1990) pp. 183--189.
       bib   url   pdf   link   

109.  [Riv90b] Finding Four Million Large Random Primes. Ronald L. Rivest. CRYPTO '90 (Santa Barbara, California, 1990) pp. 625--626.
       bib   doi   pdf   link   

108.  [ER90] On the sample complexity of PAC-learning using random and chosen examples. Bonnie Eisenberg and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990) pp. 154--162.
       bib   link   

107.  [AR90] Inferring Graphs from Walks. Javed A. Aslam and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990) pp. 359--370.
       bib   prepub.pdf   link   

106.  [CLR90] Introduction to Algorithms (First edition). Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. (MIT Press and McGraw Hill, 1990)
       bib   link   

105.  [BOGMR90] A Fair Protocol for Signing Contracts. Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. IEEE Transactions on Information Theory 36(1990) pp. 40--46.
       bib   doi   pdf   link   

104.  [Riv90a] Cryptography. Ronald L. Rivest. Chapter 13. Handbook of Theoretical Computer Science. J. Van Leeuwen (ed.) (Elsevier, 1990) pp. 717--755.
       bib   pdf   link   

103.  [RS90] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Machine Learning: An Artificial Intelligence Approach. Yves Kodratoff and Ryszard Michalski (eds.) (1990)
       bib   link   

102.  [GRS89] Learning Binary Relations and Total Orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. FOCS '89 (Research Triangle Park, North Carolina, 1989) pp. 46--51.
       bib   doi   pdf   link   

101.  [RHW89] COLT '89. Ronald L. Rivest, David Haussler, and Manfred K. Warmuth (eds.) (Santa Cruz, California, 1989)
       bib   link   

100.  [RS89] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. STOC '89 (Seattle, Washington, 1989) pp. 411--420.
       bib   acm   doi   pdf   link   

99.  [QR89] Inferring decision trees using the Minimum Description Length principle. J. Ross Quinlan and Ronald L. Rivest. Information and Computation 80,3 (1989) pp. 227--248.
       bib   doi   pdf   link   

98.  [BR88b] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. NIPS '88 (Denver, Colorado, 1988) pp. 494--501.
       bib   link   

97.  [LMR88b] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yihshay Mansour, and Ronald L. Rivest. FOCS'88 (White Plains, New York, 1988) pp. 120--129. Replaced by 112. [LMR91].
       bib   doi   pdf   link   

96.  [CR88] A Knapsack-type public key cryptosystem based on arithmetic in finite fields. Benny Chor and Ronald L. Rivest. IEEE Transactions on Information Theory 34,5 (1988) pp. 901--909.
       bib   doi   pdf   link   

95.  [RS88b] Learning Complicated Concepts Reliably and Usefully (Extended Abstract). Ronald L. Rivest and Robert [H.] Sloan. AAAI-88 (St. Paul, Minnesota, 1988) pp. 635--640. Replaced by 135. [RS94b].
       bib   pdf   link   

94.  [LMR88a] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988) pp. 56--68. Replaced by 112. [LMR91].
       bib   link   

93.  [BR88a] Training a 3-node neural net is NP-complete. Avrim Blum and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988) pp. 9--18.
       bib   url   link   

92.  [GMR88] A digital signature scheme secure against adaptive chosen-message attacks. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. SIAM J. Computing 17,2 (1988) pp. 281--308.
       bib   doi   pdf   link   

91.  [RS88a] A New Model for Inductive Inference. Ronald L. Rivest and Robert H. Sloan. TARK II (Asilomar, Pacific Grove, California, 1988) pp. 13--27.
       bib   url   pdf   link   

90.  [KRS88] Is the Data Encryption Standard a Group? (Results of cycling experiments on DES). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. Journal of Cryptology 1,1 (1988) pp. 3--36.
       bib   doi   pdf   link   

89.  [RF88] A ``greedy'' channel router. Ronald L. Rivest and Charles M. Fiduccia. Papers on Twenty-five years of electronic design automation. (1988) Reprint of RF83.
       bib   acm   doi   pdf   link   

88.  [GR88] Making Maximum Entropy Computations Easier by Adding Extra Constraints (Extended Abstract). Sally A. Goldman and Ronald L. Rivest. Maximum-Entropy and Bayesian Methods in Science and Engineering. G. J. Erickson and C. R. Smith (eds.) (1988)
       bib   prepub.pdf   link   

87.  [Riv87c] Game tree searching by min/max approximation. Ronald L. Rivest. Artificial Intelligence 34,1 (1987) pp. 77--96.
       bib   doi   pdf   link   

86.  [Riv87b] Learning Decision Lists. Ronald L. Rivest. Machine Learning 2,3 (1987) pp. 229--246.
       bib   doi   pdf   link   

85.  [RS87c] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. FOCS '87 (Los Angeles, California, 1987) pp. 78--87. Replaced by 133. [RS94a].
       bib   doi   pdf   link   

84.  [RS87b] Method and apparatus for resuing non-erasable memory media. Ronald L. Rivest and Adi Shamir. U.S. Patent 4,691,299. (1987-09-01)
       bib   pdf   google-patent-page   link   

83.  [RS87a] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Fourth International Workshop on Machine Learning (U.C. Irvine, Irvine, California, 1987) pp. 364--375.
       bib   prepub.pdf   link   

82.  [Riv87a] Network control by Bayesian broadcast. Ronald L. Rivest. IEEE Trans. on Information Theory IT-33,3 (1987) pp. 323--328.
       bib   doi   pdf   link   

81.  [KLRTx87] Global wire routing in two-dimensional arrays. R[ichard] M. Karp, F[rank] T. Leighton, R[onald] L. Rivest, U[mesh] V. Vazirani, and V[ijay] V. Vazirani. Algorithmica 2,1 (1987) pp. 113--129.
       bib   doi   pdf   link   

80.  [LR86] Estimating a Probability using Finite Memory. F. Thomson Leighton and Ronald L. Rivest. IEEE Trans. on Information Theory IT-32,6 (1986) pp. 733--742.
       bib   doi   pdf   link   

79.  [GR86] A Non-iterative Maximum Entropy Algorithm. Sally A. Goldman and Ronald L. Rivest. UAI '86 (Philadelphia, Pennsylvania, 1986) pp. 133--148.
       bib   (pdf)   link   

78.  [CLRS86] An application of number theory to the organization of raster-graphics memory. Benny Chor, Charles E. Leiseron, Ronald L. Rivest, and James B. Shearer. JACM 33,1 (1986) pp. 86--104.
       bib   acm   doi   pdf   link   

77.  [KRS85b] Is DES a pure cipher? (Results of more cycling experiments on DES) (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. CRYPTO '85 (Santa Barbara, California, 1985) pp. 212--226.
       bib   doi   pdf   link   

76.  [BOGMR85] A Fair Protocol for Signing Contracts (Extended Abstract). Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. ICALP '85 (Nafplion, Greece, 1985) pp. 43--52. Replaced by 105. [BOGMR90].
       bib   doi   pdf   link   

75.  [RS85] Efficient Factoring Based on Partial Information. Ronald L. Rivest and Adi Shamir. EUROCRYPT '85 (Linz, Austria, 1985) pp. 31--34.
       bib   doi   pdf   link   

74.  [KRS85a] Is the Data Encryption Standard a Group? (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. EUROCRYPT '85 (Linz, Austria, 1985) pp. 81--95. Replaced by 90. [KRS88].
       bib   doi   pdf   link   

73.  [Riv85] Testing Implementations of DES. Ronald L. Rivest. (1985-02) Unpublished draft.
       bib   txt   link   

72.  [BLRVW84] Problem 84-2. Counting Chordal Intersections. J[on] L. Bentley, C[harles] E. Leiserson, R[onald] L. Rivest, and C. J. Van Wyk. Journal of Algorithms 5,4 (1984) pp. 592--594.
       bib   doi   pdf   link   

71.  [GMR84b] A ``Paradoxical'' Solution to the Signature Problem. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. FOCS '84 (Singer Island, Florida, 1984) pp. 441--448. Replaced by 92. [GMR88].
       bib   doi   pdf   link   

70.  [GMR84a] A `Paradoxical' solution to the signature problem (brief abstract). Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984) pp. 467. Replaced by 92. [GMR88].
       bib   doi   pdf   link   

69.  [CR84] A Knapsack Type Public Key Cryptosystem Based on Arithmetic in Finite Fields (preliminary draft). Benny Chor and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984) pp. 54--65. Replaced by 96. [CR88].
       bib   doi   pdf   link   

68.  [Riv84] RSA chips (past/present/future). Ronald L. Rivest. EUROCRYPT '84 (Paris, France, 1984) pp. 159--165.
       bib   doi   pdf   link   

67.  [RS84] How to expose an eavesdropper. Ronald L. Rivest and Adi Shamir. CACM 27,4 (1984) pp. 393--395.
       bib   acm   doi   pdf   link   

66.  [KLRTx83] Global wire routing in two-dimensional arrays. R. M. Karp, F. T. Leighton, R. L. Rivest, C. D. Thompson, U. Vazirani, and V. Vazirani. FOCS '83 (Tucson, Arizona, 1983) pp. 453--459.
       bib   doi   pdf   link   

65.  [RSA83b] Cryptographic Communications system and method. Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. U.S. Patent 4,405,829. Issued September 20, 1983. (1983-09-20)
       bib   pdf   google-patent-page   link   

64.  [LR83] Estimating a Probability Using Finite Memory (Extended Abstract). Frank Thomson Leighton and Ronald L. Rivest. FCT'83 (Borgholm, Sweden, 1983) pp. 255-269. Replaced by 80. [LR86].
       bib   doi   pdf   link   

63.  [RF83] A `greedy' channel router. Ronald L. Rivest and Charles M. Fiduccia. Computer-Aided Design 15,3 (1983) pp. 135--140. Reprinted in RF88.
       bib   doi   pdf   link   

62.  [Riv83b] Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals. Ronald L. Rivest. U.S. Patent 4,376,299. Issued March 8, 1983. (1983-03-08)
       bib   pdf   google-patent-page   link   

61.  [RSA83a] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 26,1 (1983) pp. 96--99. (This is a reprint of the "RSA paper" RSA78.)
       bib   acm   doi   pdf   link   

60.  [Riv83a] Data Encryption. Ronald L. Rivest. Encyclopedia of Computer Science and Engineering. Anthony Ralston (ed.) (1983)
       bib   pdf   link   

59.  [CLR82] An Application of Number Theory to the Organization of Raster-Graphics Memory. Benny Chor, Charles E. Leiserson, and Ronald L. Rivest. FOCS '82 (Chicago, Illinois, 1982) pp. 92--99. Replaced by 78. [CLRS86].
       bib   doi   pdf   link   

58.  [LPRS82] Minimum Edge-Length Partitioning of Rectilinear Polygons. Andrzej Lingas, Ron Y. Pinter, Ronald L. Rivest, and Adi Shamir. Allerton '82 (Monticello, Illinois, 1982) pp. 53--63.
       bib   pdf   link   

57.  [RS82c] How to reuse a ``write-once'' memory. Ronald L. Rivest and Adi Shamir. Information and Control 55,1--3 (1982) pp. 1--19.
       bib   doi   pdf   link   

56.  [Riv82b] A Short Report on the RSA Chip. Ronald L. Rivest. CRYPTO '82 (U. C. Santa Barbara, 1982) pp. 327.
       bib   pdf   link   

55.  [RS82b] Randomized Encryption Techniques. Ronald L. Rivest and Alan T. Sherman. CRYPTO '82 (U. C. Santa Barbara, 1982) pp. 145--163.
       bib   pdf   link   

54.  [CRS82] Advances In Cryptology---Proceedings of CRYPTO 82. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (U. C. Santa Barbara, 1982)
       bib   link   

53.  [Riv82a] The ``PI'' Placement and Interconnect System. Ronald L. Rivest. DAC '82 (Las Vegas, Nevada, 1982) pp. 475--481.
       bib   pdf   link   

52.  [RF82] A `Greedy' Channel Router. Ronald L. Rivest and Charles M. Fiduccia. DAC '82 (Las Vegas, Nevada, 1982) pp. 418--424.
       bib   pdf   link   

51.  [RS82a] How to reuse a ``write-once'' memory (Preliminary version). Ronald L. Rivest and Adi Shamir. STOC'82 (San Francisco, California, 1982) pp. 105--113. Replaced by 57. [RS82c].
       bib   acm   doi   pdf   link   

50.  [RBM81] Provably Good Channel Routing Algorithms. Ronald L. Rivest, Alan E. Baratz, and Gary [L.] Miller. CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981) pp. 153--159.
       bib   pdf   link   

49.  [BR81] New Lower Bounds on Channel Width. Donna Brown and Ronald L. Rivest. Proceedings CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981) pp. 178--185.
       bib   pdf   link   

48.  [Riv81] Statistical analysis of the Hagelin cryptograph. Ronald L. Rivest. Cryptologia 5,1 (1981) pp. 27--32.
       bib   doi   (pdf)   link   

47.  [SRA81] Mental Poker. Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman. The Mathematical Gardner. David A. Klarner (ed.) (Prindle, Weber, and Schmidt, 1981) pp. 37--43.
       bib   pdf   link   

46.  [BCR80] Orthogonal Packings in Two Dimensions. Brenda S. Baker, Edward G. Coffman Jr., and Ronald L. Rivest. SIAM J. Comput. 9,4 (1980) pp. 846--855.
       bib   doi   pdf   link   

45.  [RMSKW80] Coping with errors in binary search procedures. R[onald] L. Rivest, A[lbert] R. Meyer, D[aniel] J. Kleitman, and K. Winklmann. JCSS 20,3 (1980) pp. 396--404.
       bib   doi   pdf   link   

44.  [YR80] On the polyhedral decision problem. Andrew C. Yao and Ronald L. Rivest. SIAM J. Computing 9,2 (1980) pp. 343--347.
       bib   doi   pdf   link   

43.  [LPR80] The Subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. JCSS 20,2 (1980) pp. 133--149.
       bib   doi   pdf   link   

42.  [Riv80a] ``Forwards and Backwards'' encryption. Ronald L. Rivest. Cryptologia 4,1 (1980) pp. 30--33.
       bib   doi   (pdf)   link   

41.  [Riv80b] A description of a single-chip implementation of the RSA cipher. Ronald L. Rivest. Lambda 1(1980) pp. 14--18.
       bib   pdf   link   

40.  [Riv79b] The BLIZZARD Computer Architecture. Ronald L. Rivest. ACM SIGARCH Computer Architecture News 7,9 (1979) pp. 2--10.
       bib   acm   doi   pdf   link   

39.  [RVW79] An Omega((n/lg n)^1/2 lower bound on the number of additions necessary to compute 0-1 polynomials over the ring of integer polynomials. Ronald L. Rivest and Jean-Paul Van de Wiele. Information Processing Letters 8,4 (1979) pp. 178--180.
       bib   doi   pdf   link   

38.  [Riv79a] Critical remarks on ``Critical remarks on some public-key cryptosystems'' by T. Herlestam. Ronald L. Rivest. BIT Numerical Mathematics 19,2 (1979) pp. 274--275.
       bib   doi   pdf   link   

37.  [AR78a] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. NCC '78 (Birmingham, Alabama, 1978) Replaced by 36. [AR78b].
       bib   prepub.pdf   link   

36.  [AR78b] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. IEEE Communications Society Magazine (Special Issue on Communications Privacy) 16,6 (1978) pp. 20--23.
       bib   doi   pdf   link   

35.  [BCR78] Orthogonal Packings in Two Dimensions. B. S. Baker, E. G. Coffman, and R. L. Rivest. Allerton '78 (Monticello, Illinois, 1978) pp. 626--635. Replaced by 46. [BCR80].
       bib   link   

34.  [Riv78c] The Impact of Technology on Cryptography. Ronald L. Rivest. ICC '78 (Toronto, Canada, 1978)
       bib   pdf   link   

33.  [RMK78] Coping with errors in binary search procedures (Preliminary report). Ronald L. Rivest, Albert R. Meyer, and Daniel J. Kleitman. STOC '78 (San Diego, California, 1978) pp. 227--232. Replaced by 45. [RMSKW80].
       bib   acm   doi   pdf   link   

32.  [LPR78] The subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. STOC '78 (San Diego, California, 1978) pp. 40--50. Replaced by 43. [LPR80].
       bib   acm   doi   pdf   link   

31.  [YR78] k+1 heads are better than k. Andrew C. Yao and Ronald L. Rivest. JACM 25,2 (1978) pp. 337--340.
       bib   acm   doi   pdf   link   

30.  [Riv78b] Optimal arrangement of keys in a hash table. Ronald L. Rivest. JACM 25,2 (1978) pp. 200--209.
       bib   acm   doi   pdf   link   

29.  [RSA78] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 21,2 (1978) pp. 120--126. (This is the "RSA paper".)
       bib   acm   doi   pdf   link   

28.  [Riv78a] Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem. Ronald L. Rivest. Cryptologia 2,1 (1978) pp. 62--65.
       bib   doi   (pdf)   prepub.pdf   link   

27.  [RAD78] On Data Banks and Privacy Homomorphisms. Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. Foundations of Secure Computation. Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton (eds.) (1978)
       bib   pdf   link   

26.  [Riv77c] On the worst-case behavior of string-searching algorithms. Ronald L. Rivest. SIAM J. Computing 6,4 (1977) pp. 669--674.
       bib   doi   pdf   link   

25.  [RMKS77] Binary search using unreliable comparisons. Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, and Joel Spencer. Allerton '77 (Monticello, Illinois, 1977) pp. 165--168. Replaced by 45. [RMSKW80].
       bib   link   

24.  [Riv77b] The necessity of feedback in minimal monotone combinational circuits. Ronald L. Rivest. IEEE Trans. on Computers C-26,6 (1977) pp. 606--607.
       bib   doi   pdf   link   

23.  [YAR77] An Omega(n^2 log n) lower bound to the shortest paths problem. Andrew C. Yao, David M. Avis, and Ronald L. Rivest. STOC '77 (Boulder, Colorado, 1977) pp. 11--17. (Claim withdrawn.)
       bib   acm   doi   pdf   link   

22.  [Riv77a] The game of ``N questions'' on a tree. Ronald L. Rivest. Discrete Mathematics 17,2 (1977) pp. 181--186.
       bib   doi   pdf   link   

21.  [RV76b] On recognizing graph properties from adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Theoretical Computer Science 3,3 (1976) pp. 371--384.
       bib   doi   pdf   link   

20.  [DR76] Linear expected time of a simple union-find algorithm. Jon Doyle and Ronald L. Rivest. Information Processing Letters 5,5 (1976) pp. 146--148.
       bib   doi   pdf   link   

19.  [YR76] K+1 heads are better than K. Andrew C. Yao and Ronald L. Rivest. FOCS '76 (Houston, Texas, 1976) pp. 67--70. Replaced by 31. [YR78].
       bib   doi   pdf   link   

18.  [RP76] The Mutual Exclusion Problem for Unreliable Processes: Preliminary Report. Ronald L. Rivest and Vaughan R. Pratt. FOCS '76 (Houston, Texas, 1976) pp. 1--8.
       bib   doi   pdf   link   

17.  [HR76] Constructing optimal binary decision trees is NP-complete. Laurent Hyafil and Ronald L. Rivest. Information Processing Letters 5,1 (1976) pp. 15--17.
       bib   doi   pdf   link   

16.  [Riv76b] Partial-match retrieval algorithms. Ronald L. Rivest. SIAM J. Computing 5,1 (1976) pp. 19--50.
       bib   doi   pdf   link   

15.  [Riv76a] On self-organizing sequential search heuristics. Ronald L. Rivest. Communications of the ACM 19,2 (1976) pp. 63--67.
       bib   acm   doi   pdf   link   

14.  [RV76a] On the time required to recognize properties of graphs from their adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Ast\'{e}risque 38--39(1976) pp. 213--227.
       bib   pdf   link   

13.  [RV75] A Generalization and Proof of the Aanderaa-Rosenberg Conjecture. Ronald L. Rivest and Jean Vuillemin. STOC '75 (Albuquerque, New Mexico, 1975) pp. 6--11. Replaced by 21. [RV76b].
       bib   acm   doi   pdf   link   

12.  [FR75b] Algorithm 489: the algorithm SELECT---for finding the ith smallest of n elements [M1]. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 173.
       bib   acm   doi   pdf   link   

11.  [FR75a] Expected time bounds for selection. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 165--172.
       bib   acm   doi   pdf   link   

10.  [Riv74d] On self-organizing sequential search heuristics. Ronald L. Rivest. SWAT '74 (New Orleans, 1974) pp. 122--126. Replaced by 15. [Riv76a].
       bib   doi   pdf   link   

9.  [Riv74c] On hash-coding algorithms for partial-match retrieval. Ronald L. Rivest. SWAT '74 (New Orleans, 1974) pp. 95--103.
       bib   doi   pdf   link   

8.  [Riv74b] On the optimality of Elias's algorithm for performing best-match searches. Ronald L. Rivest. IFIP '74 (Stockholm, Sweden, 1974) pp. 678--681.
       bib   pdf   link   

7.  [KR74] Asymptotic Bounds for the Number of Convex n-ominoes. David A. Klarner and Ronald L. Rivest. Discrete Mathematics 8,1 (1974) pp. 31--40.
       bib   doi   pdf   link   

6.  [Riv74a] Analysis of Associate Retrieval Algorithms. Ronald L. Rivest. phdthesis. Stanford University Computer Science Department (1974)
       bib   link   

5.  [HR73] Graph Partitioning and Constructing Optimal Decision Trees are Polynomial Complete Problems. L[aurent] Hyafil and R[onald] L. Rivest. IRIA -- Laboratoire de Recherche en Informatique et Automatique, Rapport de Recherche no. 33 (1973) The decision tree result from this paper was published in HR76.
       bib   pdf   link   

4.  [BFPRT73] Time Bounds for Selection. Manual Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. Journal of Computer and System Sciences 7,4 (1973) pp. 448--461.
       bib   doi   pdf   link   

3.  [KR73] A procedure for improving the upper bound for the number of N-ominoes. David A. Klarner and Ronald L. Rivest. Canadian Journal of Math. 25,3 (1973) pp. 585--602.
       bib   doi   pdf   link   

2.  [RK72] Bibliography 26. Computer Sorting. Ronald L. Rivest and Donald E. Knuth. Computing Reviews 13(1972) pp. 283--289.
       bib   pdf   link   

1.  [BFPRT72] Linear time bounds for median computations. Manuel Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. STOC'72 (Denver, Colorado, 1972) pp. 119--124. Replaced by 4. [BFPRT73].
       bib   acm   doi   pdf   link