Ronald L. Rivest: Publications and Talks

A fairly complete listing of my publications, talks, drafts, patents, and other miscellania. Another nice listing is available from Google Scholar.

Entries are listed in reverse chronological order. Each entry has a "key" usually consisting of the first letter of each author's last name (truncated and ending with "x" if there are more than five co-authors), followed by a two-digit year (and possibly a final distinguishing lower-case letter to eliminate ambiguities); these keys should be stable (except possibly for the current year). An entry may provide links to content or additional information, such as:

Some links may be "blocked" (for copyright reasons); these links appear italicized in parentheses, but will cause an error if clicked. If for some reason you need help obtaining a copy of an article, please send an email, giving the key (e.g. AR06) of the article you are looking for, to my assistant <rivest-assistant@csail.mit.edu>, who should be able to help you.

This listing produced automagically from a bibtex file (Fri Feb 2 15:04:21 2024). Please let me know of broken links or other errors.

Return to my home page.


431.  [JPRS24] Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners. Douglas W. Jones, Sunoo Park, Ronald L. Rivest, and Adam Sealfon. (2024)Proceedings Financial Cryptography '24. (2024-03-07)
       bib   url   pdf   link   

430.  [AABBx24] Bugs in our pockets: the risks of client-side scanning. Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso. Journal of Cybersecurity (2024)
       bib   url   pdf   link   

429.  [Riv23d] Betting on Doom. Ronald L. Rivest. (2023-12-08)
       bib   pdf   link   

428.  [Riv23b] Learning Learning Curves. Ronald L. Rivest. (2023-11-03) (Unpublished) Slides from talk given at Rob Schapire's 60th birthday party.
       bib   pdf   link   

427.  [Riv23a] Election Security. Ronald L. Rivest. (2023-10-12) (Unpublished) Slides from CSAIL Alliance Workshop on Misinformation
       bib   pptx   link   

426.  [RSZ23] Automated Exposure Notification for COVID-19. R. L. Rivest, M.C. Schiefelbein, M.A. Zissman, J. Bay, E. Bugnion, J. Finnerty, I. Liccardi, B. Nelson, A.S. Norige, E.H. Shen, J. Wanger, R. Yahalom, J.D. Alekseyev, C. Brubaker, L. Ferretti, C. Ishikawa, M. Raykova, B. Schlaman, R.X. Schwartz, E. Sudduth, and S. Tessaro. (2023-02-14) This report is both a Lincoln Lab Technical Report (TR-1288) and a CSAIL Technical Report. It has two URLs, which point to copies of the same report.
       bib   pdf   LL-link   MIT-DSPACE-CSAIL-link   PACT website   link   

425.  [Riv23c] Testimony to WA State Committee on State Government and Tribal Rights. Ronald L. Rivest. (2023-01-25) Testimony against passing a WA bill allowing online ballot return.
       bib   txt   link   

424.  [AGBHx22] Working Group Statement on Developing Standards for Internet Ballot Return. R. Michael Alvarez, Mike Garcia, Josh Benaloh, Roy Herrera, Allie Bones, Henry E. Brady, Amber McReynolds, Jeremy Epstein, Ronald L. Rivest, Anthony Fowler, Maurice Turner, Michael J. Frias, and Mark Wetherford. (2022-12) Center for Security in Politics, U.C. Berkeley
       bib   pdf   press-release   link   

423.  [Riv22d] Alexa Voting. Ronald L. Rivest. (2022-10-29) (Unpublished.)
       bib   pdf   link   

422.  [Riv22c] Coo-balls. Ronald L. Rivest. (2022-08-06) (Unpublished.)
       bib   pdf   link   

421.  [JPRS22] Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners. Douglas W. Jones, Sunoo Park, Ronald L. Rivest, and Adam Sealfon. Cryptology ePrint Archive, Paper 2022/960 (2022-07-25)
       bib   pdf   eprint   link   

420.  [Riv22a] How to Have a Net-Zero Life . Ronald L. Rivest. (2022-06-09) Talk presented at CSAIL 2022 Annual Meeting (Wequassett, Cape Cod)
       bib   pdf   mp4   pptx   link   

419.  [CLRS22] Introduction to Algorithms (Fourth edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press, 2022)
       bib   url   errata   thc-faq   link   

418.  [Riv22b] Remarks on AI to Support Climate Mitigation & Adaptation. Ronald L. Rivest. Talk given at zoom panel held by CSAIL on "AI to Support Climate Mitigation & Adaptation", hosted by Daniela Rus and Elsa Olivetti (2022-01-21)
       bib   pdf   txt   link   

417.  [AABBx21] Bugs in our Pockets: The Risks of Client-Side Scanning. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso. (2021-10-14)
       bib   pdf   arXiv   link   

416.  [BBRSx21] Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections. Michelle Blom, Jurlind Budurushi, Ronald L. Rivest, Philip B. Stark, Peter J. Stuckey, Vanessa Teague, and Damjan Vukcevic. Lecture Notes in Computer Science (2021) pp. 47-62.
       bib   doi   pdf   arXiv   link   

415.  [DRED21] A simple model for assessing climate control trade-offs and responding to unanticipated climate outcomes. Henri F. Drake, Ronald L. Rivest, Alan Edelman, and John Deutch. Environmental Research Letters 16,10 (2021)
       bib   url   pdf   link   

414.  [Riv21a] The RSA Public Key Cryptosystem. Ronald L. Rivest. (2021-06-21) Churchill College Distinguished Lecture (Cambridge, UK)
       bib   video   link   

413.  [PSNR21] Going from Bad to Worse: from Internet Voting to Blockchain Voting. Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Rivest. J. Cybersecurity 7,1 (2021)
       bib   url   pdf   link   

412.  [VCHJx21] An Inquiry into India's Election System (Deposition). Poorvi L Vora, Alok Choudhary, J Alex Halderman, Douglas W Jones, Nasir Memon, Bhagirath Narahari, R Ramanujam, Ronald L Rivest, Philip B Stark, K V Subrahmanyam, and Vanessa Teague. (2021-01-26)
       bib   pdf   report website   link   

411.  [MSWBX20] SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol. John Meklenburg, Michael Specter, Michael Wentz, Hari Balakrishnan, Anantha Chandrakasan, John Cohn, Gary Hatke, Louise Ivers, Ronald Rivest, Gerald Jay Sussman, and Daniel Weitzner. (2020-11-09) {PACT} Technical Report No. 2
       bib   url   pdf   arXiv   link   

410.  [BGHKX20] Optimality of Correlated Sampling Strategies. Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald L. Rivest, and Madhu Sudan. Theory of Computing 16(2020) pp. 1--12.
       bib   url   pdf   link   

409.  [PSNR20] Going from Bad to Worse: from Internet Voting to Blockchain Voting. Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Rivest. (2020-11-06) Replaced by 413. [PSNR21]. (DRAFT of 11/6/2020)
       bib   pdf   link   

408.  [HRSTV20] A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa J. Teague, and Damjan Vukcevic. ()Proceedings E-Vote ID 2020 (Bregenz, Austria). Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Küsters, Oksana Kulyk, David Duenas-Cid, and Mihkel Solvak (eds.) (2020-10-06) pp. 112--128.
       bib   doi   pdf   conference proceedings   arXiv   link   

407.  [BEA20] Letter to support the candidacy of former Vice President Joe Biden for President of the United States and Senator Kamala Harris for Vice President. Manuel Blum, Ed Catmull, Vinton Cerf, Whitfield Diffie, Shafi Goldwasser, Pat Hanrahan, Martin Hellman, John Hennessy, John Hopcroft, Richard Karp, Alan Kay, Donald Knuth, Leslie Lamport, Butler Lampson, Yann LeCun, Barbara Liskov, David Patterson, Raj Reddy, Ronald Rivest, Richard Stearns, Michael Stonebraker, Ivan Sutherland, Robert Tarjan, and Leslie Valiant. (2020-09-18)
       bib   pdf   nytimes   link   

406.  [Hua20] A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods. Zhuoqun Huang, Ronald L. Rivest, Philip B. Stark, Vanessa Teague, and Damjan Vukcevic. (arXiv:2008.08536) (2020-08-19)
       bib   pdf   arXiv   link   

405.  [Riv20e] PACT. Ronald L. Rivest. (2020-07-28) Workshop on Responsible Data in Time of Pandemic
       bib   pptx   workshop   video   panel   link   

404.  [Riv20d] Perspectives on Digital Contact Tracing. Ronald L. Rivest. (2020-07-20) Workshop on Algorithm Design, Law, and Policy
       bib   pptx   workshop   video   link   

403.  [Riv20f] Exploring the Feasibility and Security of Technology to Conduct Remote Voting in the House. Ronald L. Rivest. (2020-07-17) Testimony before the U.S. House Committee on House Administration, chaired by Congressperson Zoe Lofgren
       bib   txt   hearing video   link   

402.  [DHJRx20] Rules of Thumb for Reopening (Part 3: Who was that masked man?). Munzer Dahleh, Peko Hosoi, Simon Johnson, Ron Rivest, Emma Tegling, and Ferrah Vidal. (2020-05-29) IDSS Research blog.
       bib   url   link   

401.  [DRED20] A multi-control climate policy process for a trusted decision maker. Henri F. Drake, Ronald L. Rivest, Alan Edelman, and John Deutch. (2020-05-22) Submitted.
       bib   url   pdf   CPEER Working paper   link   

400.  [TBKOR20] Methods and Apparatus for Private Set Membership Using Aggregation for Reducing Communications. Nikolaos Triandopoulos, Kevin D. Bowers, James A. Kelley, Alina Oprea, and Ronald Rivest. U.S. Patent 10,635,824 B1. Issued April 28, 2020. (2020-04-28)
       bib   pdf   text(google)   link   

399.  [RACCX20] The PACT protocol specification. Ronald L. Rivest, Hal Abelson, Jon Callas, Ran Canetti, Kevin Esvelt, Daniel Kahn Gilmor, Louise Ivers, Yael Tauman Kalai, Anna Lysyanskaya, Adam Norige, Bobby Peletier, Ramesh Raskar, Adi Shamir, Emily Shen, Israel Soibelman, Michael Specter, Vanessa Teague, Ari Tractenberg, Mayank Varia, Marc Viera, Daniel Weitzner, John Wilkinson, and Marc Zissman. (2020-04-08) {PACT} Technical Report No. 1
       bib   url   pdf   link   

398.  [Qua20] Cryptography Pioneer Seeks Secure Elections the Low-Tech Way. Susan D'Agostino. (2020-03-12) Q & A with Quanta Magazine.
       bib   url   link   

397.  [Riv20c] Election Security. Ronald L. Rivest. (2020-02-11) Lincoln Laboratory CORE \& TO Seminar
       bib   pptx   link   

396.  [Riv20b] Auditing Elections ``in other ways''. Ronald L. Rivest. (2020-01-17) Talk given at Joint Mathematics Meetings (Denver, Colorado) in MAA Invited Paper Session ``Can Mathematics Help Us Trust Our Elections Again?''
       bib   pptx   conference   link   

395.  [Riv20a] Double-Bubble Ballots. Ronald L. Rivest. (2020-01-09)
       bib   pdf   link   

394.  [GE20] Random adversarial threshold search enables specific, secure, and automated DNA synthesis screening. Dana Gretton, Brian Wang, Leonard Foner, Jens Berlips, Theia Vogel, Benjamin Weinstein-Raun, Martin Kysel, Walther Chen, Erika A. DeBenedictis, Andrew B. Liu, Emma Chory, Hongrui Cui, Xiang Li, Jiangbin Dong, Andres Fabrega, Christianne Dennison, Otilia Don, Tong Ye, Kaveri Uberoy, Ron Rivest, Mingyu Gao, Yu Yu, Carsten Baum, Ivan Damgard, Andrew C. Yao, and Kevin M. Esvelt. (2020-01)
       bib   url   pdf   SecureDNA   link   

393.  [BE20] Cryptographic Aspects of DNA Screening. Carsten Baum, Hongrui Cui, Ivan Damgard, Kevin Esvelt, Mingyu Gao, Dana Gretton, Omer Paneth, Ron Rivest, Vinod Vaikuntanathan, Daniel Wichs, Andrew Yao, and Yu Yu. (2020-01)
       bib   url   pdf   SecureDNA   link   

392.  [MR19] A Bayesian Approach to Election Audits. Audrey Malagon and Ronald L. Rivest. MAA FOCUS: Newsmagazine of the Mathematical Association of America (December 2019/January 2020) 39,6 (2019) pp. 7.
       bib   url   pdf   link   

391.  [Riv19j] Election Security. Ronald L. Rivest. (2019-10-22) Ding-Shum Lecture given at Harvard University
       bib   pptx   video   link   

390.  [EWG19b] Moving the Encryption Policy Conversation Forward. Encryption Working Group. (2019-09-10) The Encryption Working Group (of which I am member) studies issues relating to encryption policy, and every so often produces informative papers (not policy positions). The group is sponsored by the Carnegie Endowment for International Peace.
       bib   url   pdf   link   

389.  [RIRLx19] Pilot Implementation Study of Risk-Limiting Audit Methods in the State of Rhode Island. Rhode Island Risk Limiting Audit Working Group. (2019-09-04) The Rhode Island Risk-Limiting Audit Working Group (of which I am a member) conducted pilot audits in January 2019.
       bib   url   pdf   link   

388.  [Riv19i] Voting and Auditing with Ternary Plurality Trees. Ronald L. Rivest. (2019-08-23)
       bib   nbviewer   github   link   

387.  [Riv19g] Election Security. Ronald L. Rivest. (2019-06-26) Talk given at Cyber Everything --- 2019 Judicial Conference of the District of Columbia Circuit
       bib   pdf   pptx   link   

386.  [Riv19h] Visualizing CO2 Levels. Ronald L. Rivest. (2019-05-22)
       bib   pdf   link   

385.  [Riv19f] LCS35 Time Lock Crypto Puzzle. Ronald L. Rivest. (2019-05-15) Talks given at MIT CSAIL Time Lock Puzzle and Time Capsule Opening Event, and VDF Day
       bib   pdf   ppt   new-puzzle.pdf   new-puzzle.txt   Original puzzle   VDF Day   VDF Day (YouTube)   link   

384.  [EWG19a] Papers related to encryption policy. Encryption Working Group. (2019-04-25) The Encryption Working Group (of which I am member) studies issues relating to encryption policy, and every so often produces informative papers (not policy positions). The group is sponsored by the Carnegie Endowment for International Peace.
       bib   url   link   

383.  [Riv19e] Election Integrity. Ronald L. Rivest. (2019-04-03) Talk given at BU Cyber Security, Law, and Society Alliance (Cyber Alliance).
       bib   pptx   link   

382.  [Riv19d] Panel remarks on "Milestones in Post-Election Audits". Ronald L. Rivest. (2019-03-15) Panel remarks given at Election Verification Conference 2019
       bib   video (start at 42:20)   conference   link   

381.  [SR19] k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits. Mayuri Sridhar and Ronald L. Rivest. (St. Kitts, 2019)Proceedings Voting'19. (2019-02-22) (Talk by Mayuri Sridhar.)
       bib   pdf   mp4   link   

380.  [OBHRS19] Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, and Philip B. Stark. (2019)Proceedings Voting'19. (2019-02-22)
       bib   pdf   link   

379.  [Riv19c] Bayesian Audits (by example). Ronald L. Rivest. (2019-01-31) Short talk given at meeting 'Making Every Vote Count: A Practical Guide to Risk-Limiting Audits', Microsoft Innovation Lab (Washington DC)
       bib   pptx   video of entire meeting (my talk starts at 44:40)   program   link   

378.  [Riv19b] Ballot-polling audits . Ronald L. Rivest. (2019-01-16) Short talk given at Rhode Island pilot election audit.
       bib   pptx   link   

377.  [Riv19a] Voting and ZK . Ronald L. Rivest. (2019-01-13) Short talk given at ShafiFest.
       bib   ppt   link   

376.  [OBHRS18] Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, and Philip B. Stark. (2018-12-15)
       bib   pdf   arXiv   link   

375.  [Riv18g] Two new election audit tools: sampling with k-cut, and Bayesian audits. Ronald L. Rivest. (2018-12-07) Short talk given at 2018 Election Audit Summit
       bib   docx   pptx   Summit   video--see Day 1 AM Session 2 around 2:00   link   

374.  [SR18b] k-cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits. Mayuri Sridhar and Ronald L. Rivest. (2018-11-21)
       bib   pdf   arXiv   link   

373.  [Riv18f] How do we vote? How should we vote?. Ronald L. Rivest. (2018-09-13) Short talk given at 2018 EmTech Conference
       bib   pdf   Panel video   link   

372.  [NASEM18] Securing the Vote: Protecting American Democracy. {National Academies of Sciences, Engineering, and Medicine}. (The National Academies Press, 2018) (I was on the committee that produced this report.)
       bib   pdf   NASEM site   press   link   

371.  [Riv18e] Consistent Sampling with Replacement. Ronald L. Rivest. arXiv (2018-08-29)
       bib   pdf   arXiv   github   link   

370.  [MR18] Bayesian Election Audits in One Page. Audrey Malagon and Ronald L. Rivest. (2018-07-13)
       bib   pdf   link   

369.  [SR18a] Four-Cut: An Approximate Sampling Procedure for Election Audits. Mayuri Sridhar and Ronald L. Rivest. (2018-06-19) Talk given by Mayuri Sridhar at 2018 State Certification Testing of Voting Systems National Conference
       bib   pptx   conference agenda   confererence-ppt   link   

368.  [Riv18d] On ``exceptional access''. Ronald L. Rivest. (2018-05-31) Slides for informal talk given at CSAIL PI lunch (2018-05-31).
       bib   pdf   link   

367.  [BBBLR18a] Analysis of the CLEAR Protocol per the National Academies' Framework. Steven M. Bellovin, Matt Blaze, Dan Boneh, Susan Landau, and Ronald L. Rivest. Department of Computer Science, Columbia University, CUCS-003-18 (2018)
       bib   url   pdf   link   

366.  [BBBLR18b] Op-ed: Ray Ozzie's crypto proposal-a dose of technical reality. Steven M. Bellovin, Matt Blaze, Dan Boneh, Susan Landau, and Ronald L. Rivest. Ars Technica Op-Ed (2018-05-07)
       bib   pdf   ArsTechnica   link   

365.  [Riv18c] Dealing Cards with Cryptography. Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2018-03-22) Using commutative cryptography to play poker over the internet.
       bib   url   link   

364.  [BBDHx18] From Battlefields to Elections: Winning Strategies of Blotto and Auditing Games. Soheil Behnezhad, Avrim Blum, Mahsa Derakhshan, MohammadTaghi Hajiaghayi, Mohammad Mahdian, Christos H. Papadimitriou, Ronald L. Rivest, Saeed Seddighin, and Philip B. Stark. (New Orleans, Louisiana, 2018)Proceedings SODA'18. (2018-01-07)
       bib   pdf   conference   link   

363.  [Riv18a] Bayesian Tabulation Audits: Explained and Extended. Ronald L. Rivest. (2018-01-01)
       bib   pdf   arXiv   link   

362.  [Riv17f] Risk-Limiting Audits. Ronald L. Rivest. (2017-12-07) Talk given at Fourth NASEM committee meeting on Future of Voting
       bib   pdf   ppt   NASEM Future of Voting   link   

361.  [BHRVx17] Public Evidence from Secret Ballots. Matthew Bernhard, J. Alex Halderman, Ronald Rivest, Poorvi Vora, Peter Ryan, Vanessa Teague, Josh Benaloh, Philip Stark, and Dan Wallach. {E-Vote-ID 2017} (Bregenz, Austria, 2017)(2017-10-25)
       bib   pdf   conference   arXiv   link   

360.  [LRLGx17] MIT Turing laureates propose creation of School of Computing. Butler Lampson, Ronald L. Rivest, Barbara Liskov, Shafi Goldwasser, Silvio Micali, Michael Stonebraker, and Tim Berners-Lee. The Tech (2017-09-21)
       bib   pdf   Tech   link   

359.  [Riv17e] Remarks on Election Integrity. Ronald L. Rivest. (2017-09-12) Testimony given at meeting of the Presidential Advisory Committee on Election Integrity (Verbal testimony as notes in ppt file, and in pdf file.)
       bib   pdf   ppt   video   commission   link   

358.  [Bis17] Open-Source Software Won't Ensure Election Security. Matt Bishop. Lawfare (2017-08-24) (Matt Bishop is author; I was just one of several contributors whose ideas are represented in this article.)
       bib   pdf   lawfare   link   

357.  [BJR17] Wireless wearable authenticators using attachment to confirm user possession. Kevin D. Bowers, Ari Juels, and Ronald L. Rivest. U.S. Patent 9,740,844. Issued August 22, 2017. (2017-08-22)
       bib   text(google)   link   

356.  [Riv17d] Post-Election Audits. Ronald L. Rivest. (2017-06-12) Talk given at NASEM Future of Voting meeting
       bib   ppt   committee   link   

355.  [RS17] When is an election verifiable?. Ronald L. Rivest and Philip B. Stark. {IEEE Security and Privacy} (2017) pp. 48--50.
       bib   doi   pdf   link   

354.  [RSP17] BatchVote: Voting rules designed for auditability. Ronald L. Rivest, Philip B. Stark, and Zara Perumal. Voting'17 workshop (associated with Financial Crypto 2017) (Malta, 2017)(2017-04-07)
       bib   workshop   paper   link   

353.  [PR17a] Marked mix-nets. Olivier Pereira and Ronald L. Rivest. Voting'17 workshop (associated with Financial Crypto 2017) (Malta, 2017)(2017-04-07)
       bib   workshop   paper   link   

352.  [PR17] Towards Secure Quadratic Voting. Sunoo Park and Ronald L. Rivest. Public Choice (2017) pp. 1--25.
       bib   doi   pdf   link   

351.  [Riv17c] Charities for the Trump Era. Alexander J. Rivest and Ronald L. Rivest. Medium (2017-02-05)
       bib   pdf   medium   link   

350.  [Riv17a] 11438162575788886766923577997614661201 (etc). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2017-02-02) The RSA-129 story.
       bib   url   link   

349.  [Riv17b] ClipAudit---A Simple Post-Election Risk-Limiting Audit. Ronald L. Rivest. arXiv:1701.08312 (2017-01-28)
       bib   pdf   arXiv   link   

348.  [AAEGR17] Time-space trade-offs in population protocols. Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, and Ronald L. Rivest. SODA'17 (Barcelona, Spain, 2017)Proceedings of the Twenty-Eighth Symposium on Discrete Algorithms. (2017-01) pp. 2560-2579.
       bib   pdf   conference version   link   

347.  [JR17] Determining authenticity based on indicators derived from information relating to historical events. Ari Juels and Ronald L. Rivest. U.S. Patent 9,537,845. Issued January 3, 2017. (2017-01-03)
       bib   pdf   link   

346.  [RV16] Software Independence Revisited. Ronald L. Rivest and Madars Virza. Chapter 1. Real-World Electronic Voting: Design, Analysis, and Deployment. Feng Hao and Peter Y. A. Ryan (eds.) (CRC Press, 2016) pp. 3--17. (2016)
       bib   pdf   CRC   Amazon   link   

345.  [Riv16q] Oral History of Ronald L. Rivest . Ronald L. Rivest. (2016-12-06) Interview by Roy Levin at the Computer Museum in Mountain View, CA.
       bib   pdf   YouTube   Metadata   link   

344.  [BGHKx16] The Optimality of Correlated Sampling. Mohammad Bavarian, Badih Ghazi, Elad Haramaty, Pritish Kamath, Ronald Rivest, and Madhu Sudan. ECCC Report TR16-194 (2016-12-04)
       bib   url   pdf   arXiv   link   

343.  [Riv16t] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk presented at U.C. Davis Computer Science Department (2016-12-01)
       bib   slides.pdf   video   link   

342.  [RS16] Still time for an election audit. Ron Rivest and Philip Stark. USA Today (2016-11-18)
       bib   url   pdf   link   

341.  [Riv16v] Technical Remarks on Government Access to Plaintext. Ronald L. Rivest. Talk presented at meeting of National Academies panel on "Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Tradeoffs" (2016-11-11)
       bib   url   pdf   link   

340.  [Riv16w] Was YOUR vote counted? (feat. homomorphic encryption). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2016-11-07)
       bib   url   link   

339.  [Riv16r] How to Check Election Results (feat. Polya's Urn). Ronald L. Rivest. YouTube Numberphile interview by Brady Haran. (2016-11-07)
       bib   url   link   

338.  [JVDOR16] Scheduling Of Defensive Security Actions In Information Processing Systems. Ari Juels, Marten Erik van Dijk, Alina M. Oprea, and Ronald L. Rivest. U.S. Patent 9,471,777. Issued October 18, 2016. (2016-10-18)
       bib   pdf   link   

337.  [CPRBx16] Auditing Australian Senate Ballots. Berj Chilingirian, Zara Perumal, Ronald L. Rivest, Grahame Bowland, Andrew Conway, Philip B. Stark, Michelle Blom, Chris Culnane, and Vanessa Teague. arXiv:1610.00127 (2016-10-01)
       bib   pdf   arXiv   link   

336.  [Spe16] Apple's Cloud Key Vault, Exceptional Access, and False Equivalences. Michael A. Specter et al.. Lawfare (2016-09-07) (Under byline of Michael A. Specter, but full list of contributors is: Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner.)
       bib   url   link   

335.  [KR16] Election Auditing and Verifiability. Joseph Kiniry and Ronald L. Rivest. (2016-09) Letter to the Editor in response to Mercuri/Neurmann "Inside Risks" article in June 2016 CACM issue.
       bib   pdf   link   

334.  [Riv16u] Symmetric Encryption via Keyrings and ECC. Ronald L. Rivest. Talk given for ArcticCrypt 2016 (Svalbard, Norway). (2016-07-18)
       bib   pdf   link   

333.  [Wei16] Warning Signs: A Checklist for Recognizing Flaws of Proposed ``Exceptional Access'' Systems. Daniel J. Weitzner et al.. Lawfare (2016-05-11) (Under byline of Danny Weitzner, but full list of contributors is: Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner.)
       bib   url   pdf   link   

332.  [PR16] Towards Secure Quadratic Voting. Sunoo Park and Ronald L. Rivest. Cryptology ePrint Archive, Report 2016/400 (rev. 23 Aug 2016) (2016-04-21) Commissioned to appear in Public Choice 2017.
       bib   url   pdf   link   

331.  [Riv16s] On the Growth of Cryptography. Ronald L. Rivest. Talk given at Brown University as part of their 2016 Cybersecurity Speaker Series. (2016-04-14)
       bib   url   pdf   link   

330.  [JTVDx16z] Server methods and apparatus for processing passcodes generated by configurable one-time authentication tokens. Ari Juels, Nikolaos Triandopoulos, Marten Van Dijk, John Brainard, Ronald Rivest, and Kevin Bowers. U.S. Patent 9,294,473 (2016-03-22)
       bib   pdf   google-patent-page   link   

329.  [Riv16x] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk sponsored by ACM and IEEE; given at MIT Broad Institute. (2016-03-16)
       bib   pdf   ppt   link   

328.  [Riv16z] Internet Voting---Seriously?. Ronald L. Rivest. Talk on panel on Internet Voting at EVN Conference 2016 (2016-03-11)
       bib   slides.pdf   conference   link   

327.  [AAEGR16] Time-Space Trade-offs in Population Protocols. Dan Alistarh, James Aspnes, David Eisenstat, Rati Gelashvili, and Ronald L. Rivest. CoRR abs/1602.08032(2016) (version 7: April 17, 2017)
       bib   url   pdf   link   

326.  [JTVDx16y] Configurable one-time authentication tokens with improved resilience to attacks. Ari Juels, Nikolaos Triandopoulos, Marten Van Dijk, John Brainard, Ronald Rivest, and Kevin Bowers. U.S. Patent 9,270,655 (2016-02-23)
       bib   pdf   google-patent-page   link   

325.  [Riv16y] Keys Under Doormats. Ronald L. Rivest. Invited ("surprise speaker") talk given at the Enigma Conference (San Francisco) (2016-01-27)
       bib   pdf   ppt   conference   conference-media   video   link   

324.  [MNFRH15] Paris, San Bernardino, law enforcement and encryption . Rep. Jerry McNerney (D-Calif.), Rep. Bill Foster (D-Ill.), Ronald Rivest, and Martin Hellman. The Hill. (2015-12-14)
       bib   url   pdf   link   

323.  [AABBx15x] Keys under doormats: mandating insecurity by requiring government access to all data and communications. Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. Journal of Cybersecurity (2015)
       bib   doi   pdf   link   

322.  [Riv15y] Auditability and Verifiability of Elections. Ronald L. Rivest. Talk given as Capital One Fall Distinguished Lecture, Georgia Tech Institute for Security and Privacy (2015-10-27)
       bib   pdf   ppt   web-site   video   link   

321.  [AABBx15y] Keys Under Doormats. Harold ``Hal'' Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matthew Blaze, Whitfield ``Whit'' Diffie, John Gilmore, Matthew Green, Peter G. Neumann, Susan Landau, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner. Comm. ACM 58,10 (2015) pp. 24--26. For full report see AABBx15.
       bib   doi   pdf   link   

320.  [Riv15x] DiffSum---A Simple Post-Election Risk-Limiting Audit. Ronald L. Rivest. arXiv:1509.00127 (2015-09-01)
       bib   pdf   arXiv   link   

319.  [VDTJR15] Forward secure pseudorandom number generation resilient to forward clock attacks. Marten Van Dijk, Nickolaos Triandopoulos, Ari Juels, and Ronald Rivest. U.S. Patent 9,083,515. Issued July 14, 2015. (2015-07-14)
       bib   pdf   google-patent-page   link   

318.  [AABBx15] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications. Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, y Matthew Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Peter G. Neumann, Susan Landau, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, and Daniel J. Weitzner. MIT CSAIL, TR-2015-026 (2015)
       bib   url   pdf   link   

317.  [OVF15] The Future of Voting: End-to-End Verifiable Internet Voting --- Specification and Feasibility Study. Overseas Vote Foundation. (2015-07) (I was on the Advisory Council for this report.)
       bib   pdf   OVF project page   link   

316.  [Riv15z] On the growth of cryptography. Ronald L. Rivest. Talk given June 3, 2015 at Simons Institute Program in Cryptography (U.C. Berkeley), Historical talk series (2015-06-03)
       bib   slides.pdf   video-and-slides   link   

315.  [BRRSx15] End-to-end verifiability. Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, and Poorvi L. Vora. (2015-04-15) (This work is also part of the OVF E2EIV report.)
       bib   arxiv   link   

314.  [MR15] Method and system for micropayment transactions. Silvio Micali and Ronald L. Rivest. U.S. Patent 8,983,874. Issued March 17, 2015. (2015-03-17)
       bib   pdf   google-patent-page   link   

313.  [NABDx15] System and method providing disconnected authentication. A. Nanopoulos, K. Ackerman, P. Bowness, W. Duane, M. Jakobsson, B. Kaliski, D. Pal, S.D. Rice, and R.L. Rivest. U.S. Patent 8,966,276. Issued February 24, 2015. (2015-02-24)
       bib   pdf   google-patent-page   link   

312.  [ERS14] Leading the Field: Fortune Favors the Bold in Thurstonian Choice Models. Steven N. Evans, Ronald L. Rivest, and Philip B. Stark. (2014-09-20)
       bib   arxiv   link   

311.  [RS14] Spritz---A spongy RC4-like stream cipher and hash function. Ronald L. Rivest and Jacob C. N. Schuldt. (2014-08-19) Presented at Charles River Crypto Day (2014-10-24).
       bib   pdf   slides.pdf   crypto-day   iacr/eprint/2016/856   link   

310.  [BVDJx14] Graph-based approach to deterring persistent security threats. K.D. Bowers, M.E. Van Dijk, A. Juels, A.M. Oprea, R.L. Rivest, and N. Triandopoulos. U.S. Patent 8,813,234. Issued August 19, 2014. (2014-08-19)
       bib   pdf   google-patent-page   link   

309.  [RR14b] Efficient End to End Verifiable Electronic Voting Employing Split Value Representations. Michael O. Rabin and Ronald L. Rivest. (2014-08-11) Proc. EVOTE 2014 (Bregenz, Austria). (Improvement of an earlier version)
       bib   pdf   conference-version   conference   link   

308.  [NIST14] VCAT Report on NIST Cryptographic Standards and Guidelines Process. NIST. (2014-07)
       bib   url   pdf   link   

307.  [Riv14b] University of Waterloo Convocation Address (Faculty of Mathematics). Ronald L. Rivest. (LiveStream) (2014-06-13)
       bib   pdf   video   link   

306.  [RR14a] Practical Provably Correct Voter Privacy Protecting End to End Voting Employing Multiparty Computations and Split Value Representations of Votes. Michael O. Rabin and Ronald L. Rivest. (2014-05-12) CalTech/MIT Voting Technology Project Working Paper 124.
       bib   pdf   VTP-WP-124   code   link   

305.  [RJ14] Key Update with Compromise Detection. Ronald L. Rivest and Ari Juels. U.S. Patent 8,699,713. Issued April 15, 2014 (2014-04-15)
       bib   pdf   google-patent-page   link   

304.  [RR14] Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking. Michael O. Rabin and Ronald L. Rivest. (2014-04-03) CalTech/MIT Voting Technology Project Working Paper 122.
       bib   pdf   VTP-WP-122   link   

303.  [DDMMx14] Picture-Hanging Puzzles. Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, and Mihai P\u{a}tra\c{s}cu. Theory of Computing Systems 54,4 (2014) pp. 531--550.
       bib   pdf   link   

302.  [BR14] Honeywords: A New Tool for Protections From Password Database Breach. Kevin Bowers and Ronald L. Rivest. Presented at RSA Conference 2014 (2014-02-26)
       bib   pdf   pptx   RSA Conference 2014   link   

301.  [Riv14a] Genetic Modification For Cell Pedigree Labels To Aid Disease Treatment. Ronald L. Rivest. (2014-02-18) Unpublished draft.
       bib   pdf   link   

300.  [Riv14c] Reflections on SDSI. Ronald L. Rivest. (2014-02-13) Given at LampsonFest (Microsoft, Cambridge, MA) in celebration of Butler Lampson's birthday.
       bib   pdf   link   

299.  [Ax14] An Open Letter from US Researchers in Cryptography and Information Security. Martin Abadi and others. (2014-01-24)
       bib   url   pdf   link   

298.  [JR13] Honeywords: Making Password-Cracking Detectable. Ari Juels and Ronald L. Rivest. CCS'13 (Berlin, Germany, 2013)Proc. ACM CCS'13. (2013-11-04) pp. 145--159.
       bib   acm   doi   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   gen.py   Honeywords-Project-Page   link   

297.  [BJRS13a] User Authentication Based on Voucher Codes. John G. Brainard, Ari Juels, Ronald L. Rivest, and Michael Szyldo. U.S. Patent 8,438,617. Issued May 7, 2013. (2013-05-07)
       bib   pdf   google-patent-page   link   

296.  [BJRS13b] Drifting Keys: Impersonation Detection for Constrained Devices. Kevin D. Bowers, Ari Juels, Ronald L. Rivest, and Emily Shen. INFOCOM 2013 (Turin, Italy, 2013)Proc. INFOCOM 2013. (2013-04-14)
       bib   pdf   INFOCOM'13   link   

295.  [JVDOx13] Remote Verification of File Protections for Cloud Data Storage. Ari Juels, Marten van Dijk, Alina Oprea, Ronald L. Rivest, and Emil P. Stefanov. U.S. Patent 8,346,742. Issued January 1, 2013. (2013-01-01)
       bib   pdf   google-patent-page   link   

294.  [DJOR13] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. J. Cryptology 26(2013) pp. 655-713.
       bib   doi   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   link   

293.  [SE12] Letter to President Obama on Voting. Barbara Simons and others. (2012-12-05)
       bib   pdf   VV-posting   blog   link   

292.  [AE12] Letter to President Obama on Election Reform and Verification. Kim Alexander and others. (2012-11-20)
       bib   pdf   CalVoter-posting   blog   link   

291.  [Riv12d] Turing and the Growth of Cryptography. Ronald L. Rivest. Invited talk at Boston University Turing 100 Celebration. (2012-11-11)
       bib   slides.pdf   event   link   

290.  [BVDGx12] Defending against the Unknown Enemy: Applying FlipIt to System Security. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, and Nikos Triandopoulos. GameSec'12 (Budapest, Hungary, 2012)Proc. GameSec 2012. Jens Grossklags and Jean Walrand (eds.) (2012-11-05) pp. 248--263.
       bib   doi   pdf   GameSec'12   ePrint(extended-version)   link   

289.  [Riv12c] Thoughts On Appropriate Technologies for Voting. Ronald L. Rivest. Invited keynote given at online special event, ``E-Voting: Risk and Opportunity,'' organized by the Center for Information Technology and Policy (CITP) at Princeton University. (2012-11-01)
       bib   slides.pdf   event   video   link   

288.  [AKSRx12] Voting: What Has Changed, What Hasn't, & What Needs Improvement. R. Michael Alvarez, Jonathan N. Katz, Charles Stewart III, Ronald L. Rivest, Stephen Ansolabehere, and Thad E. Hall. Caltech/MIT Voting Technology Project (2012)
       bib   url   pdf   link   

287.  [DJORx12] Hourglass schemes: how to prove that cloud files are encrypted. Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, and Nikos Triandopoulos. CCS'12 (Raleigh, NC, 2012)Proc. CCS'12 ACM Conference on Computer and Communications Security. George Danezis and Virgil Gligor (eds.) (2012-10-16/2012-10-18) pp. 265--280.
       bib   acm   doi   pdf   CCS'12   link   

286.  [RLAWG12] Risk-Limiting Post-Election Audits: Why and How. Risk-Limiting Audits Working Group. (2012-10) (Version 1.1)
       bib   pdf   link   

285.  [RS12b] A Bayesian Method for Auditing Elections. Ronald L. Rivest and Emily Shen. EVT/WOTE'12 (Seattle, WA, 2012)Proceedings 2012 EVT/WOTE Conference. J. Alex Halderman and Olivier Pereira (eds.) (2012-08-07)
       bib   url   pdf   slides.pdf   EVT/WOTE'12   video   interactive implementation   link   

284.  [Riv12b] Remarks on Turing and cryptography. Ronald L. Rivest. (2012-06-16) This note contains remarks made at a panel discussion entitled "Information Data Security in a Networked Future" June 16, 2012 at the ACM Turing Centenary in San Francisco, CA.
       bib   txt   ACM-Turing-Centenary   webcast   link   

283.  [DDMMx12] Picture-Hanging Puzzles. Erik D. Demaine, Martin L. Demaine, Yair N. Minsky, Joseph S. B. Mitchell, Ronald L. Rivest, and Mihai P{\u a}trascu. FUN 2012 (Venice, Italy, 2012)Proceedings of the Sixth International Conference on Fun with Algorithms. Evangelos Kranakis, Danny Krizanc, and Flaminia Luccio (eds.) (2012-06) pp. 81--93.
       bib   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   conference   arXiv   link   

282.  [Riv12a] Protecting your vote. Ronald L. Rivest. Published in The Boston Globe, in The Podium section (2012-04-03)
       bib   url   txt   link   

281.  [DJOR12] FlipIt: The Game of ``Stealthy Takeover''. Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. (2012-02-26) IACR ePrint Archive Report 2012/103.
       bib   url   pdf   associated-talk   RSA-Labs-FlipIt-site   link   

280.  [RS12a] Statistical Robustness of Voting Rules. Ronald L. Rivest and Emily Shen. (2012-01-25)
       bib   ver-2012-01-25.pdf   link   

279.  [RSX11] Complexity of Computing the Margin of Victory for Various Voting Rules. Ronald L. Rivest, Emily Shen, and Lirong Xia. Poster session at First Cambridge Area Economics and Computation Day (2011-11-18)
       bib   shen-slides.pdf   shen-slides.pptx   CAEC'11   link   

278.  [Riv11d] Remarks on On-line Voting (aka ``Internet Voting''). Ronald L. Rivest. Panel discussion, reported on by Luther Weeks. (2011-10-27) On October 27th, 2011, I participated in a panel about on-line voting ("internet voting"), held at Central Connecticut State University, that was organized by the office of Connecticut's Secretary of State, Denise Miller. A sumary of this event, including videos, can be found at the following url. A PBS NewsHour report (2/16/2012) on ``Internet Voting: Will Democracy or Hackers Win?'' featured clips from this event.
       bib   url   PBS-NewsHour   link   

277.  [BDJOR11] How to Tell if Your Cloud Files are Vulnerable to Drive Crashes. Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. CCS'11 (Chicago, Illinois, 2011)Proceedings 18th Annual ACM Conference on Computer and Communications Security. George Danezis and Vitaly Shmatikov (eds.) (2011) pp. 501--514.
       bib   acm   doi   pdf   CCS'11   link   

276.  [Riv11c] Remarks on the Future of Election Integrity. Ronald L. Rivest. Panel discussion (2011-10-01) Panel remarks given at EIPPF 2011 (Election Integrity: Past, Present, and Future) workshop, held at MIT on October 1, 2011. The following links give (a rough version of) my remarks, and the url links to videos of EIPPF 2011 (my talk in is the third panel, on "The Future").
       bib   url   txt   link   

275.  [Riv11b] Illegitimi non carborundum. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2011 (2011-08-15) A link to the slides and associated movie (which needs to be in the same directory when shown) is given below. (This talk was given again, in brisker form, at the 2011-08-30 Celebration for Michael Rabin at Harvard.) More information on FlipIt, including a link to an interactive version of the game, will become available at http://www.rsa.com/flipit.
       bib   slides.mov   slides.pdf   associated-paper   link   

274.  [MRSW11] Computing the Margin of Victory in IRV Elections. Thomas R. Magrino, Ronald L. Rivest, Emily Shen, and David Wagner. EVT/WOTE'11 (San Francisco, California, 2011)Proceedings 2011 EVT/WOTE Conference. Hovav Shacham and Vanessa Teague (eds.) (2011-08-08) The online conference proceedings provide a link to Magrino's talk slides and a video of his presentation.
       bib   url   pdf   link   

273.  [Riv11f] On the contributions of Alan Turing. Ronald L. Rivest. Remarks given March 15, 2011 at the American Academy of Arts and Science, Cambridge, MA, in association with readings from "Breaking the Code". (2011-03-15)
       bib   remarks-video   event-site   link   

272.  [Riv11a] The growth of cryptography. Ronald L. Rivest. Talk given February 8, 2011 at my Killian award lecture. (2011-02-08)
       bib   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   slides.pdf   video   better-video   press   link   

271.  [Riv11e] On the invertibility of the XOR of rotations of a binary word. Ronald L. Rivest. International Journal of Computer Mathematics 88,2 (2011) pp. 281--284.
       bib   doi   prepub.pdf   link   

270.  [LRW11] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. Journal of Cryptology 24,3 (2011) pp. 588--613.
       bib   doi   pdf   link   

269.  [HRS11] Sharper p-values for stratified election audits. Michael J. Higgins, Ronald L. Rivest, and Philip B. Stark. Statistics, Politics, and Policy 2,1, Article 7 (2011)
       bib   doi   pdf   link   

268.  [RS10] An Optimal Single-Winner Preferential Voting System Based on Game Theory. Ronald L. Rivest and Emily Shen. COMSOC 2010 (D\"{u}sseldorf, Germany, 2010)Proceedings Third International Workshop on Computational Social Choice. Vincent Conitzer and J\"{o}rg Rothe (eds.) (2010-09)
       bib   url   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   conference.pdf   full.pdf   workshop   code   Wikipedia on maximal lotteries   link   

267.  [CCCCx10] Scantegrity II Municipal Election at Takoma Park: The first E2E Binding Governmental Election with Ballot Privacy. Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. USENIX '10 (Washington, D.C., 2010)Proceedings USENIX Security 2010. Ian Goldberg (ed.) (2010)
       bib   url   pdf   link   

266.  [Riv10] Thoughts on UOCAVA voting. Ronald L. Rivest. Talk at Workshop on UOCAVA Remote Voting Systems (2010-08-06)
       bib   slides.pdf   workshop   link   

265.  [SCCCx10] Scantegrity Mock Election at Takoma Park. Alan T. Sheman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, and Poorvi Vora. EVOTE2010 (Bregenz, Austria, 2010)Proceedings of Electronic Voting 2010. Proceedings of the 4th Conference on Electronic Voting. Robert Kimmer and R\"udiger Grimm (eds.) (2010) pp. 35--51.
       bib   pdf   conference   link   

264.  [Gx10] Climate change and the integrity of science. P. H. Gleick and others. Science 328(2010) pp. 689--690.
       bib   url   pdf   alt.pdf   link   

263.  [Kan10] Voting and Verifiability. Christine Kane. Vantage Magazine 7,1 (2010) pp. 13--15. (Interview with Ronald L. Rivest.)
       bib   pdf   link   

262.  [CJRRx10] Towards Trustworthy Elections: New Directions in Electronic Voting. David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, and Ben Adida (eds.) (Springer, 2010)
       bib   url   link   

261.  [RCPRx09] Guest editorial: Special Issue on Electronic Voting. Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 593--596.
       bib   doi   pdf   link   

260.  [CCCEx09] Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes. David Chaum, Richard T. Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, and Poorvi L. Vora. IEEE Transactions on Information Forensics and Security 4,4 (2009) pp. 611--627.
       bib   doi   pdf   correction.pdf   link   

259.  [Riv09d] Security of Voting Systems. Ronald L. Rivest. Talk given at George Washington University Computer Science Department on November 9, 2009. (2009-11-09)
       bib   slides.pdf   slides.ppt   link   

258.  [Riv09c] Audit Thoughts. Ronald L. Rivest. Slides for a brief talk on post-election auditing, given at the Post-Election Audit Workshop, organized by the American Statistical Association on October 24, 2009 (Alexandria, Virginia) (2009-10-24)
       bib   slides.pdf   slides.ppt   link   

257.  [Riv09b] Perspectives on E2E Voting Systems. Ronald L. Rivest. Keynote talk given at NIST End-to-End Voting Systems Workshop on October 13, 2009 (2009-10-13)
       bib   slides.pdf   slides.ppt   link   

256.  [Riv09a] The ``Taint'' Leakage Model. Ronald L. Rivest. Talk given at rump session at the 2009 Crypto in the Clouds Workshop (MIT) on August 4, 2009 (2009-08-04)
       bib   slides.pdf   slides.pptx   link   

255.  [BKNR09] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 7,502,467. Issued March 10, 2009. (2009-03-10)
       bib   pdf   google-patent-page   link   

254.  [DRRS09] Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, and Emily Shen. FSE '09 (Leuven, Belgium, 2009)Proceedings of Fast Software Encryption 2009. Orr Dunkelman (ed.) (2009) pp. 104--121.
       bib   doi   pdf   prepub.pdf   link   

253.  [CLRS09] Introduction to Algorithms (Third edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press, 2009)
       bib   url   errata   thc-faq   link   

252.  [RABCx08] The MD6 Hash Function---A Proposal to NIST for SHA-3. Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott Fleming, Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, and Yiqun Lisa Yin. Submitted to NIST on October 27, 2008 (2008-10-27) (pdf given revised April 5, 2010.)
       bib   pdf   MD6 project website   link   

251.  [Riv08b] On the notion of `software independence' in voting systems. Ronald L. Rivest. Philosophical Transactions of The Royal Society A 366,1881 (2008) pp. 3759--3767.
       bib   doi   pdf   link   

250.  [Riv08c] The MD6 Hash Function. Ronald L. Rivest. Invited keynote talk given at CRYPTO 2008 (2008-08)
       bib   slides.pdf   slides.ppt   link   

249.  [CCCEx08] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, and Alan T. Sherman. EVT'08 (San Jose, California, 2008)Proceedings 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. David Dill and Tadayoshi Kohno (eds.) (2008)
       bib   url   pdf   EVT'08   link   

248.  [APR08] On Auditing Elections When Precincts Have Different Sizes. Javed Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT'08 (San Jose, California, 2008)Proceedings 2008 USENIX/ACCURATE Electronic Voting Technology Workshop. David Dill and Tadayoshi Kohno (eds.) (2008)
       bib   url   pdf   slides.pdf   EVT'08   link   

247.  [Riv08a] A "Sum of Square Roots" (SSR) Pseudorandom Sampling Method for Election Audits. Ronald L. Rivest. (2008-04-25) Unpublished draft.
       bib   pdf   link   

246.  [BKR08] Method and apparatus for performing enhanced time-based authentication. John G. Brainard, Burton S. Kaliski, and Ronald L. Rivest. U.S. Patent 7,363,494. Issued April 22, 2008. (2008-04-22)
       bib   pdf   google-patent-page   link   

245.  [Riv07b] A Simple Rule of Thumb for Election Audit Size Determination. Ronald L. Rivest. (2007-10-31) Unpublished draft.
       bib   pdf   link   

244.  [TGDC07] VVSG Recommendations to the EAC. Technical Guidelines Development Committee. Delivered to the EAC on September 4, 2007 for consideration and public comment. (2007-08-31) (VVSG means ``Voluntary Voting System Guidelines''.)
       bib   pdf   VVSG   EAC   link   

243.  [CRSTx07] Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan, Salil Vadhan, and Hoeteck Wee. CRYPTO '07 (Santa Barbara, California, 2007)Advanced in Cryptology -- CRYPTO '07, 27th Annual International Cryptology Conference. Alfred Menezes (ed.) (2007) pp. 264--283.
       bib   pdf   link   

242.  [RS07] Three Voting Protocols: ThreeBallot, VAV, and Twin. Ronald L. Rivest and Warren D. Smith. EVT '07 (Boston, Massachusetts, 2007)Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop. Ray Martinez and David Wagner (eds.) (2007)
       bib   url   pdf   slides.pdf   slides.ppt   EVT'07   link   

241.  [APR07] On Estimating the Size and Confidence of a Statistical Audit. Javed A. Aslam, Raluca A. Popa, and Ronald L. Rivest. EVT '07 (Boston, Massachusetts, 2007)Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop. Ray Martinez and David Wagner (eds.) (2007)
       bib   url   pdf   popa-slides.pdf   popa-slides.ppt   EVT'07   link   

240.  [CKRR08] Frontiers of Electronic Voting---Dagstuhl Seminar 07311: Executive Summary. David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, and Peter Y. A. Ryan. Dagstuhl Seminar 07311--Frontiers of Electronic Voting (Schloss Dagstuhl, Germany, 2007)Frontiers of Electronic Voting. David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, and Peter Y. A. Ryan (eds.) (2008-07)
       bib   url   pdf   Abstracts-of-meeting   link   

239.  [Riv07a] On Auditing Elections When Precincts Have Different Sizes. Ronald L. Rivest. (2007-04-29) Replaced by 248. [APR08]. Unpublished draft.
       bib   pdf   dataset.txt   link   

238.  [YABCx07] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. SPW'10 (Brno, Czech Republic, 2007)Proceedings of the Fifteenth International Conference on Security Protocols. Bruce Christianson, Bruno Crispo, James Malcolm, and Michael Roe (eds.) (2007) pp. 171. For full report see YABCx05.
       bib   doi   pdf   discussion.pdf   discussion.doi   link   

237.  [ABCLx07] On the security of the EMV secure messaging API (Extended Abstract). Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, and Ronald L. Rivest. SPW '07 (Brno, Czech Republic, 2007)Proceedings of Security Protocols Workshop 2007. Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe (eds.) (2010) pp. 147--149.
       bib   doi   pdf   prepub.pdf   link   

236.  [WLM07] Engaging Privacy and Information Technology in a Digital Age. James Waldo, Herbert S. Lin, and Lynette Millett (eds.) (National Academies Press, 2007) (Rivest served on the NRC Committee on Privacy in the Information Age, which produced this report.)
       bib   url   (pdf)   link   

235.  [ACHR07] Lightweight Email Signatures. Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. Chapter 10.6. Phishing and Countermeasures---Understanding the Increasing Problem of Electronic Identity Theft. Markus Jakobsson and Steven Myers (eds.) (Wiley, 2007) pp. 435--453. (2007) Revised version of ACHR06.
       bib   pdf   link   

234.  [Riv06d] On Estimating the Size of a Statistical Audit. Ronald L. Rivest. (2006-11-14) Replaced by 241. [APR07]. Unpublished draft.
       bib   pdf   link   

233.  [BJRSY06] Fourth Factor Authentication: Somebody you know. John Brainard, Air Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung. CCS '06 (Alexandria, Virginia, 2006)Proceedings of the 13th ACM conference on computer and communications security. Rebecca Wright and Sabrina De Capitani di Vimercati (eds.) (2006) pp. 168--178.
       bib   acm   doi   pdf   CCS'06   link   

232.  [AR06] Scratch & vote: self-contained paper-based cryptographic voting. Ben Adida and Ronald L. Rivest. WPES '06 (Alexandria, Virginia, 2006)Proceedings of the 5th ACM workshop on privacy in electronic society. Roger Dingledine and Ting Yu (eds.) (2006) pp. 29--39.
       bib   acm   doi   pdf   adida-slides.pdf   WPES'06   link   

231.  [Riv06c] The ThreeBallot Voting System. Ronald L. Rivest. (2006-10-01) Replaced by 242. [RS07]. Unpublished draft.
       bib   pdf   link   

230.  [ACHR06] Lightweight Email Signatures (Extended Abstract). Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest. SCN '06 (Maiori, Italy, 2006)Proceedings 5th Conference on Security and Cryptography for Networks. Roberto De Prisco and Moti Yung (eds.) (2006) pp. 288--302.
       bib   doi   pdf   prepub.pdf   link   

229.  [RW06] On the notion of ``software independence'' in voting systems. Ronald L. Rivest and John P. Wack. Prepared for the TGDC, and posted by NIST at the given url. (2006-07-28) Replaced by 251. [Riv08b].
       bib   url   pdf   link   

228.  [ABCLx06] Phish and Chips --- Traditional and New Recipes for Attacking EMV. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven Murdoch, Ross Anderson, and Ron[ald L.] Rivest. SPW'06 (Cambridge, UK, 2006)Revised Selected Papers from Fourteenth International Workshop on Security Protocols. Bruce Christianson, Bruno Crispo, James Malcolm, and Michael Roe (eds.) (2006) pp. 40--48.
       bib   doi   pdf   link   

227.  [Riv06b] Recollections of Stanford CS 1969--1973. Ronald L. Rivest. Talk given March 21, 2006 at Stanford Computer Science Forum celebrating the 40th anniversary of the Stanford CS Department (2006-03-21)
       bib   slides.pdf   slides.ppt   link   

226.  [Riv06a] Perspectives on Financial Cryptography (revisited). Ronald L. Rivest. Invited keynote talk given 2/27/06 at Financial Cryptography 2006. (An update on talk given 2/27/97 at Financial Cryptography 1997.) (2006-02-27)
       bib   slides.pdf   slides.ppt   FC'97 talk   link   

225.  [BKNR06] System and method for authentication seed distribution. John G. Brainard, Burton S. Kaliski, Magnus Nystr\"{o}m, and Ronald L. Rivest. U.S. Patent 6,985,583. Issued January 10, 2006. (2006-01-10)
       bib   pdf   google-patent-page   link   

224.  [RST06] How to Leak a Secret: Theory and Application of Ring Signatures. Ronald L. Rivest, Adi Shamir, and Yael Tauman. Theoretical Computer Science: Essays in Memory of Shimon Even. Oded Goldreich, Arnold L. Rosenberg, and Alan L. Selman (eds.) (Springer, 2006) pp. 164--186. (2006)
       bib   doi   pdf   link   

223.  [JRS05] Method and apparatus for selective blocking of radio frequency identification devices. Ari Juels, Ronald L. Rivest, and Michael Szydlo. U.S. Patent 6,970,070. Issued November 29, 2005. (2005-11-29)
       bib   pdf   google-patent-page   link   

222.  [Riv05c] Abelian square-free dithering for iterated hash functions. Ronald L. Rivest. HASH'05 (NIST Gaithersburg, Maryland, 2005)Proceedings NIST First Cryptographic Hash Workshop. (2005-11-01)
       bib   url   pdf   code.c   HASH'05   related-talk   link   

221.  [Riv05b] Preliminary Voting---Prevoting. Ronald L. Rivest. Unpublished draft. (2005-08-06)
       bib   pdf   link   

220.  [YABCx05] Robbing the bank with a theorem prover. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, and Ross Anderson. University of Cambridge Computer Laboratory (2005) Technical Report UCAM-CL-TR-644. Also see YABCx07.
       bib   url   pdf   link   

219.  [AHR05b] Lightweight Encryption for Email. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. SRUTI '05 (Cambridge, MA, 2005)Proceedings 2005 Workshop on Steps to Reducing Unwanted Traffic on the Internet. Dina Katabi and Balachander Krishnamurthy (eds.) (2005) pp. 93--99.
       bib   url   pdf   adida-slides.pdf   link   

218.  [Riv05a] Abelian Square-free-dithering for iterated hash functions. Ronald L. Rivest. Talk given at ECRYPT workshop on Hash Functions (Przegorzaly (Krakow), Poland) (2005-06-23)
       bib   slides.pdf   slides.ppt   related-paper   link   

217.  [AHR05a] Ad-Hoc Group Signatures from Hijacked Keypairs. Ben Adida, Susan Hohenberger, and Ronald L. Rivest. Unpublished draft. A preliminary version was presented by Ben Adida at the April 14--15, 2005 DIMACS Workshop on Theft in E-Commerce. (2005-06-24)
       bib   pdf   workshop   link   

216.  [RK03] RSA Problem. Ronald L. Rivest and Burt Kaliski. Encyclopedia of Cryptography and Security. Henk C. A. Van Tilborg (ed.) (Springer, 2005) (2005)
       bib   prepub.pdf   link   

215.  [LSYRR05] Permutation Operations in Block Ciphers. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. Chapter 13. Embedded Cryptographic Hardware: Design \& Security. Nadia Nedjah and Luiza de Macedo Mourelle (eds.) (Nova Science, 2005) pp. 219--234. (2005) A previous version appeared as LSYRR04.
       bib   link   

214.  [RCBDR04] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald L. Rivest. Concurrency and Computation: Practice and Experience 16,11 (2004) pp. 1099--1120. An extended version of RCBDR03.
       bib   doi   pdf   link   

213.  [Riv04b] Electronic Voting. Ronald L. Rivest. Talk given at the NSA June 3, 2004. (2004-06-03)
       bib   slides.pdf   slides.ppt   link   

212.  [Riv04a] Remarks on Electronic Voting. Ronald L. Rivest. Talk given at the Harvard Kennedy School of Government Digital Voting Symposium, June 1, 2004. (2004-06-01)
       bib   remarks.txt   link   

211.  [Riv04d] Some thoughts on electronic voting. Ronald L. Rivest. Talk given May 26, 2004 at DIMACS Workshop on Electronic Voting (2004-05-26)
       bib   url   slides.pdf   slides.ppt   workshop   link   

210.  [LSYRR04] On Permutation Operations in Cipher Design. Ruby B. Lee, Zhijie J. Shi, Yiqun Lisa Yin, Ronald L. Rivest, and Matthew J. B. Robshaw. ITCC'04 (Las Vegas, Nevada, 2004)Proceedings International Conference on Information Technology: Coding and Computing, 2004. Pradip K. Srimani (ed.) (2004-04) pp. 569--577.
       bib   doi   pdf   link   

209.  [Riv04e] On the Notion of Pseudo-Free Groups. Ronald L. Rivest. TCC'04 (Cambridge, Massachusetts, 2004)Proceedings First Theory of Cryptography Conference 2004. Moni Naor (ed.) (2004) pp. 505--521.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   TCC'04   link   

208.  [Riv04c] Peppercoin Micropayments. Ronald L. Rivest. FC'04 (Key West, 2004)Proceedings Financial Cryptography 2004. Ari Juels (ed.) (2004-02) pp. 2--8.
       bib   doi   pdf   slides.ppt   slides.slides.pdf   FC'04   link   

207.  [JRS03] The Blocker Tag: Selective blocking of RFID Tags for Consumer Privacy. Ari Juels, Ronald L. Rivest, and Michael Szydlo. CCS'03 (Washington, DC, )Proceedings Tenth ACM Conference on Computer and Communications Security. Vijay Atluri and Trent Jaeger (eds.) (2003-10) pp. 103--111.
       bib   acm   doi   pdf   juels-slides.pdf   prepub.pdf   RSA page   link   

206.  [ARS03] 2002 ACM A. M. Turing Award Lectures. Leonard M. Adleman, Ronald L. Rivest, and Adi Shamir. Talks given June 8, 2003 at FCRC in San Diego, California. (2003-06-08) Rivest's lecture titled ``The Early Days of RSA: History and Lessons''.
       bib   acm   doi   rivest-slides.pdf   rivest-slides.ppt   ACM Turing Award   Adleman   Rivest   Shamir   link   

205.  [RCBDR03] Access-Controlled Resource Discovery for Pervasive Networks. Sanjay Raman, Dwaine Clarke, Matt Burnside, Srinivas Devadas, and Ronald [L.] Rivest. SAC '03 (Melbourne, Florida, 2003)Proceedings of the 2003 Symposium on Applied Computing. Hisham Haddad and George Papadopoulos (eds.) (2003) pp. 338--345.
       bib   acm   doi   pdf   prepub.pdf   SAC'03   link   

204.  [SORJx03] Does Anyone Really Need Micropayments?. Nicko van Someren, Andrew Odlyzko, Ronald L. Rivest, Tim Jones, and Duncan Goldie-Scot. FC'03 (Guadeloupe, French West Indies, 2003)Proceedings Financial Cryptography 2003. Rebecca N. Wright (ed.) (2003-01) pp. 69--76.
       bib   doi   pdf   FC'03   link   

203.  [BCGKx02] The Untrusted Computer Problem and Camera-Based Authentication. Matt Burnside, Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Marten van Dijk, Srinivas Devadas, and Ronald [L.] Rivest. Pervasive 2002 (Zurich, Switzerland, 2002)Proceedings of the International Conference on Pervasive Computing. Friedemann Mattern and Mahmoud Naghshineh (eds.) (2002) pp. 114--124.
       bib   doi   pdf   prepub.pdf   link   

202.  [LRW02] Tweakable Block Ciphers. Moses Liskov, Ronald L. Rivest, and David Wagner. CRYPTO'02 (Santa Barbara, California, 2002)Advances in Cryptology - CRYPTO 2002. Moti Yung (ed.) (2002-08) pp. 31--46. Replaced by 270. [LRW11].
       bib   doi   pdf   prepub.pdf   link   

201.  [JJR02] Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. Markus Jakobsson, Ari Juels, and Ronald L. Rivest. SEC'02 (San Francisco, California, 2002)Proceedings USENIX Security 2002. Dan Boneh (ed.) (2002-08) pp. 339--353. Also available as IACR eprint 2002/025.
       bib   pdf   prepub.pdf   SEC'02   eprint   link   

200.  [WCGRW02] Privacy Tradeoffs: myth or reality? (Panel Summary). Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, and Graham Wood. FC'02 (Southampton, Bermuda, 2002)Proceedings of the Sixth International Conference on Financial Cryptography. Matt Blaze (ed.) (2002-03) pp. 147--151.
       bib   doi   pdf   link   

199.  [BCMMx02] Proxy-based Security Protocols in Networked Mobile Devices. M. Burside, D. Clarke, T. Mills, A. Maywah, S. Devadas, and R[onald L.] Rivest. SAC 2002 (Madrid, Spain, 2002)Proceedings 2002 ACM Symposium on Applied Computing. Hisham Haddad and George Papadopoulos (eds.) (2002) pp. 265--272.
       bib   acm   doi   pdf   prepub.pdf   SAC'02   link   

198.  [MR02b] Transitive signature schemes. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002)Topics in Cryptology - CT-RSA 2002: Cryptographer's Track at the RSA Conference 2002. Bart Preneel (ed.) (2002-02) pp. 236--243. A related talk Riv00 was given in 2000.
       bib   doi   pdf   prepub.pdf   link   

197.  [MR02a] Micropayments revisited. Silvio Micali and Ronald L. Rivest. CT-RSA'02 (San Jose, California, 2002)Topics in Cryptology - CT-RSA 2002: Cryptographer's Track at the RSA Conference 2002. Bart Preneel (ed.) (2002-02) pp. 149--163. A related talk RM02 was given at the FC'02 ``rump session''.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

196.  [CRR02] An Efficient Scheme for Route Aggregation. Suresh Chari, Tal Rabin, and Ronald L. Rivest. (2002-02-01) A related talk Riv00 was given in 2000.
       bib   pdf   link   

195.  [RM02] Peppercorn Micropayments via better ``Lottery Tickets''. Ronald L. Rivest and Silvio Micali. Talk given at the ``rump session'' of Financial Cryptography 2002. (2002)
       bib   slides.pdf   slides.ppt   link   

194.  [RST01] How to Leak a Secret. Ronald L. Rivest, Adi Shamir, and Yael Tauman. ASIACRYPT 2001 (Gold Coast, Australia, 2001)Advances in Cryptology -- ASIACRYPT 2001. Colin Boyd (ed.) (2001) pp. 552--565.
       bib   doi   pdf   link   

193.  [BJR01] A Modular Voting Architecture (``Frogs''). Shuki Bruck, David Jefferson, and Ronald L. Rivest. Talk presented at WOTE 2001 (Workshop on Trustworthy Elections) (2001-08) Reprinted in CJRRx10.
       bib   pdf   slides.pdf   slides.ppt   link   

192.  [RRSY01] Enchanced block ciphers with data-dependent rotations. Ronald L. Rivest, Matthew John Barton Robshaw, Raymond Mark Sidney, and Yiqun Lisa Yin. U.S. Patent 6,269,163. Issued July 31, 2001. (2001-07-31)
       bib   pdf   google-patent-page   link   

191.  [VTP01] Voting---What is, What Could Be. CalTech MIT Voting Technology Project. California Institute of Technology and The Massachusetts Institute of Technology (2001)
       bib   pdf   rivest-press-conference-remarks.txt   VTP site for report   link   

190.  [Riv01e] Security in Voting Technology. Ronald L. Rivest. (2001-05-24) Testimony given to U.S. Committee on House Administration May 24, 2001.
       bib   txt   link   

189.  [Riv01d] Multi-grade cryptography. Ronald L. Rivest. (2001-04-29) Unpublished draft.
       bib   pdf   link   

188.  [Riv01c] Permutation polynomials modulo 2^w. Ronald L. Rivest. Finite Fields and Their Applications 7,2 (2001) pp. 287--292.
       bib   doi   pdf   link   

187.  [Riv01a] Issues in Cryptography. Ronald L. Rivest. Short luncheon talk given March 7, 2001 at Computers, Freedom, and Privacy 2001 Conference (2001-03-07)
       bib   slides.pdf   slides.ppt   link   

186.  [Riv01b] Electronic voting. Ronald L. Rivest. Talk given for Cambridge Club at Harvard Faculty Club, March 5, 2001. (2001-03-05)
       bib   slides.pdf   slides.ppt   link   

185.  [GNRRY01] The Business of Electronic Voting. Ed Gerck, Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, and Moti Yung. FC'01 (Grand Cayman, British West Indies, 2001)Proceedings Fifth International Conference on Financial Cryptography 2001. Paul F. Syverson (ed.) (2001-02) pp. 243--268.
       bib   doi   pdf   rivest-only-prepub.pdf   link   

184.  [RS01] Are ``Strong'' Primes Needed for RSA?. Ronald L. Rivest and Robert D. Silverman. IACR Cryptology ePrint archive, paper 2001/007 (Version 1998-12-01 Submitted January 30, 2001). (2001-01-30)
       bib   url   pdf   version-1999-11-22.pdf   link   

183.  [CLRS01] Introduction to Algorithms (Second edition). Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. (MIT Press and McGraw Hill, 2001)
       bib   url   link   

182.  [CEEFx01] Certificate chain discovery in SPKI/SDSI. Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Journal of Computer Security 9,4 (2001) pp. 285--322.
       bib   pdf   link   

181.  [Riv00] Two signature schemes. Ronald L. Rivest. Talk given October 17, 2000 at Cambridge University. (2000-10-17)
       bib   slides.pdf   scheme 1:MR02b   scheme 2:CRR02   link   

180.  [RRY00] The Case for RC6 as the AES. Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Yin. Comment submitted to NIST May 16, 2000 for round 2 of AES competition. (2000-05-16)
       bib   pdf   NIST-round-2-comments   link   

179.  [Riv99d] Unconditionally secure commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer. Ronald L. Rivest. (1999-11-08)
       bib   pdf   link   

178.  [BR99] Translucent Cryptography---An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. Mihir Bellare and Ronald L. Rivest. Journal of Cryptology 12,2 (1999) pp. 117--139.
       bib   doi   pdf   prepub.MIT-LCS-TR-683.pdf   link   

177.  [EFLRx99b] SPKI Certificate Theory. C[arl] Ellison, B[ill] Frantz, B[utler] Lampson, R[onald L.] Rivest, B[rian M.] Thomas, and T[atu] Ylonen. Internet Network Working Group Request for Comments: RFC 2693 (September 1999). (1999-09)
       bib   txt   link   

176.  [LRSW99] Pseudonym Systems. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. SAC'99 (Kingston, Ontario, Canada, 1999)Proceedings of the Sixth Annual International Workshop on Selected Areas in Cryptography 1999. Howard M. Heys and Carlisle M. Adams (eds.) (1999) pp. 184--199.
       bib   doi   pdf   prepub.pdf   link   

175.  [ABRS99] Piecemeal graph exploration by a mobile robot. Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. Information and Computation 152,2 (1999) pp. 155--172.
       bib   doi   pdf   link   

174.  [EFLRx99a] Simple Public Key Certificate. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ietf-spki-cert-structure-06.txt, July 26, 1999. (1999-07-26)
       bib   txt   link   

173.  [CRRY99b] Some Comments on the First Round AES Evaluation of RC6. Scott Contini, Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Lisa Yin. Submitted as a public comment in response to NIST's call for comments on the AES Candidates. Posted on NIST web site. (1999-04-15)
       bib   url   pdf   link   

172.  [Riv99b] Description of the LCS35 Time Capsule Crypto-Puzzle. Ronald L. Rivest. (1999-04) Unpublished note.
       bib   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   lcs35-code.java   lcs35-parameters.txt   lcs35-puzzle-description.txt   related-paper:RSW96   Dan-Bricklin's-LCS35-page   link   

171.  [CRRY99a] Improved Analysis of some Simplified Variants of RC6. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. FSE '99 (Rome, Italy, 1999)Proceedings of the Sixth International Workshop on Fast Software Encryption. Lars Knudsen (ed.) (1999) pp. 1--15.
       bib   doi   pdf   link   

170.  [Riv99c] Some Thoughts on Serial Numbers on Intel CPU's. Ronald L. Rivest. (1999-01-26) Unpublished note, drafted 1/26/99, revised 8/23/99.
       bib   txt   link   

169.  [Riv99a] The Beer Bottle Cipher. Ronald L. Rivest. CCE Quarterly Journal (Pricewaterhouse Coopers Cryptographic Center of Excellence) ,3 (1999) pp. 28--30.
       bib   txt   link   

168.  [Riv98f] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,835,600. Issued November 10, 1998. (1998-11-10)
       bib   pdf   google-patent-page   link   

167.  [Riv98e] The Case against Regulating Encryption Technology. Ronald L. Rivest. Scientific American 279,4 (1998) pp. 116--117.
       bib   doi   pdf   prepub.txt   link   

166.  [GPR98] Self-Delegation with Controlled Propagation ---or--- What if you lose your laptop. Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest. CRYPTO'98 (Santa Barbara, California, 1998)Advances in Cryptology -- Proceedings 18th Annual Cryptology Conference. Hugo Krawczyk (ed.) (1998-08) pp. 153--168. This paper also appears as IACR Cryptology ePrint Archive Report 1997/012.
       bib   doi   pdf   prepub.pdf   ePrint-1997/012   link   

165.  [RRSY98] The RC6 Block Cipher. Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. ()First Advanced Encryption Standard (AES) Conference. (1998-08-20) Slides from NIST AES1 (1998-08-21) and AES3 (2000-04-14) conferences.
       bib   url   pdf   AES1.slides.pdf   AES1.slides.ppt   AES3.slides.pdf   AES3.slides.ppt   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   note.txt   link   

164.  [CRRY98] The Security of the RC6 Block Cipher. Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, and Yiqun Lisa Yin. Posted on the RC6 site of RSA Laboratories. (1998-08-20)
       bib   url   pdf   RSA-labs-RC6-site   link   

163.  [KRRR98] On the Design and Security of RC2. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and Matthew J. B. Robshaw. FSE '98 (Paris, France, 1998)Proceedings Fast Software Encryption, Fifth International Workshop. Serge Vaudenay (ed.) (1998) pp. 206--221.
       bib   doi   pdf   link   

162.  [EFLRx98] SPKI examples. Carl M. Ellison, Bill Frantz, Butler Lampson, Ron[ald L.] Rivest, Brian M. Thomas, and Tatu Ylonen. Internet-draft draft-ieft-spki-cert-examples-01.txt, March 10, 1998. (1998-03-10)
       bib   txt   link   

161.  [Riv98d] Block encryption algorithm with data-dependent rotations. Ronald L. Rivest. U.S. Patent 5,724,428. Issued March 3, 1998. (1998-03-03)
       bib   pdf   google-patent-page   link   

160.  [Riv98c] A Description of the RC2(r) Encryption Algorithm. Ronald L. Rivest. Internet Network Working Group Request for Comments: RFC 2268. (1998-03)
       bib   txt   link   

159.  [Riv98b] Can We Eliminate Certificate Revocation Lists?. Ronald L. Rivest. FC'98 (Anguilla, British West Indies, 1998)Proceedings Financial Cryptography '98. Rafael Hirschfeld (ed.) (1998-02) pp. 178--183.
       bib   doi   pdf   prepub.pdf   link   

158.  [Riv98a] Chaffing and Winnowing: Confidentiality without Encryption. Ronald L. Rivest. CryptoBytes (RSA Laboratories), volume 4, number 1 (summer 1998), 12--17. (1998)
       bib   url   pdf   prepub.txt   remarks.txt   slides.pdf   slides.ppt   CryptoBytes   link   

157.  [AABBx98] The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption --- A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, and Bruce Schneier. Report issued by the CDT (Center for Democracy and Technology). (1998) 1998 revision of May 1997 report.
       bib   url   pdf   link   

156.  [BRS97] Geometric Cryptography: Identification by Angle Trisection. Mike Burmester, Ronald L. Rivest, and Adi Shamir. (1997-11-04) Unpublished draft.
       bib   pdf   link   

155.  [Riv97c] Cryptography as Duct Tape. Ronald L. Rivest. A short note written to the U.S. Senate Commerce and Judiciary Committee in opposition to mandatory key recovery proposals (1997-06-12)
       bib   txt   link   

154.  [Riv97b] Electronic Lottery Tickets as Micropayments. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997)Proceedings Financial Cryptography '97. Rafael Hirschfeld (ed.) (1997) pp. 307--314.
       bib   doi   pdf   link   

153.  [Riv97a] Perspectives on Financial Cryptography. Ronald L. Rivest. FC '97 (Anguilla, British West Indies, 1997)Proceedings Financial Cryptography '97. Rafael Hirschfeld (ed.) (1997) pp. 145--149.
       bib   doi   pdf   slides.pdf   slides.ppt   link   

152.  [Riv97d] All-Or-Nothing Encryption and The Package Transform. Ronald L. Rivest. FSE'97 (Haifa, Israel, 1997)Proceedings Fourth International Conference on Fast Software Encryption. Eli Biham (ed.) (1997-01) pp. 210--218.
       bib   doi   pdf   prepub.pdf   link   

151.  [BR96] The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. R[obert] Baldwin and R[onald L.] Rivest. Internet Network Working Group Request for Comments: RFC 2040 (1996-10)
       bib   url   txt   link   

150.  [GMR96] On breaking a Huffman code. David W. Gillman, Mojdeh Mohtashemi, and Ronald L. Rivest. IEEE Transaction on Information Theory 42,3 (1996) pp. 972--976.
       bib   doi   pdf   link   

149.  [RL96] SDSI -- A Simple Distributed Security Infrastructure. Ronald L. Rivest and Butler Lampson. (1996-04-30)
       bib   slides-crypto96.pdf   slides-crypto96.ppt   slides-maryland.pdf   slides-maryland.ppt   slides-rsalabs96.pdf   slides-rsalabs96.ppt   slides-usenix.pdf   slides-usenix.ppt   ver-1.0.pdf   ver-1.1.html   CIS-SDSI-page   link   

148.  [RS96a] PayWord and MicroMint--Two Simple Micropayment Schemes. Ronald L. Rivest and Adi Shamir. SPW'96 (Cambridge, United Kingdom, 1996)Proceedings of the 1996 International Workshop on Security Protocols. Mark Lomas (ed.) (1996-04) pp. 69--87.
       bib   doi   pdf   prepub.pdf   slides.pdf   slides.ppt   link   

147.  [RSW96] Time-lock puzzles and timed-release crypto. Ronald L. Rivest, Adi Shamir, and David A. Wagner. MIT Laboratory for Computer Science, Technical memo MIT/LCS/TR-684 (1996) (Revision 3/10/96)
       bib   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   LCS page   link   

146.  [BDRSx96] Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shinomura, Eric Thompson, and Michael Wiener. Released by the Business Software Alliance (January 1996). (1996-01)
       bib   pdf   link   

145.  [RS96b] PayWord and MicroMint (extended abstract). Ronald L. Rivest and Adi Shamir. CryptoBytes (RSA Laboratories), volume 2, number 1 (spring 1996), 7--11. (1996) Reprint of RS96a.
       bib   url   pdf   CryptoBytes   link   

144.  [RY95] Being Taught Can be Faster than Asking Questions. Ronald L. Rivest and Yiqun Lisa Yin. COLT'95 (Santa Cruz, California, 1995)Proceedings of the Eighth Annual Conference on Computational Learning Theory. Wolfgang Maas (ed.) (1995-07) pp. 144--151.
       bib   acm   doi   pdf   prepub.pdf   link   

143.  [ABRS95] Piecemeal graph exploration by a mobile robot (extended abstract). Baruch Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'95 (Santa Cruz, California, 1995)Proceedings Eighth Annual Conference on Computational Learning Theory. Wolfgang Maas (ed.) (1995-07) pp. 321--328.
       bib   acm   doi   pdf   link   

142.  [BRS95] Piecemeal Learning of an Unknown Environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. Machine Learning 18,2 (1995) pp. 231--254.
       bib   doi   pdf   link   

141.  [Riv95] The RC5 Encryption Algorithm. Ronald L. Rivest. Dr. Dobb's Journal 20,1 (1995) pp. 146--148.
       bib   pdf   link   

140.  [BR95] Picking the Best Expert from a Sequence. Ruth Bergman and Ronald L. Rivest. WAIS'95 (Fort Lauerdale, Florida, 1995)Proceedings of the Fifth International Workshop on Artificial Intelligence and Statistics. Doug Fisher and Hans-J. Lenz (eds.) (1995-01) pp. 219--228.
       bib   pdf   prepub.pdf   link   

139.  [GR95] Complete Variable-Length ``Fix-Free'' Codes. David Gillman and Ronald L. Rivest. Designs, Codes and Cryptography 5,2 (1995) pp. 109--114.
       bib   doi   pdf   link   

138.  [Riv94] The RC5 Encryption Algorithm. Ronald L. Rivest. FSE'94 (Leuven, Belgium, 1994)Proceedings of the 1994 Leuven Workshop on Fast Software Encryption. Bart Preneel (ed.) (1994-12) pp. 86--96.
       bib   doi   pdf   errata-1997-03-20.txt   prepub.pdf   revised-1997-03-20.pdf   link   

137.  [RS94b] A Formal Model of Hierarchical Concept-Learning. Ronald L. Rivest and Robert Sloan. Information and Computation 114,1 (1994) pp. 88--114.
       bib   doi   pdf   link   

136.  [HPKR94] Computational Learning Theory and Natural Learning Systems: Intersections between Theory and Experiment. Stephen Jos\'{e} Hanson, Thomas Petsche, Michael Kearns, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

135.  [RS94a] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. Journal of the ACM 41,3 (1994) pp. 555--589.
       bib   acm   doi   pdf   link   

134.  [RY94] Simulation Results for a new two-armed bandit heuristic. Ronald L. Rivest and Yiqun Yin. Proceedings of a workshop on Computational Learning Theory and Natural Learning Systems (Princeton, New Jersey, 1994)Computational Learning Theory and Natural Learning Systems. G. A. Drastal, S. J. Hanson and R. L. Rivest (eds.) (1994) pp. 477--486.
       bib   pdf   link   

133.  [HDR94] Computational Learning Theory and Natural Learning Systems: Constraints and Prospects. Stephen Jos\'{e} Hanson, George A. Drastal, and Ronald L. Rivest (eds.) (MIT Press, 1994)
       bib   link   

132.  [GRS93] Learning binary relations and total orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. SIAM Journal on Computing 22,5 (1993) pp. 1006--1034.
       bib   doi   pdf   link   

131.  [RS93b] On choosing between experimenting and thinking when learning. Ronald L. Rivest and Robert H. Sloan. Information and Computation 106,1 (1993) pp. 1--25.
       bib   doi   pdf   link   

130.  [BRS93] Piecemeal learning of an unknown environment. Margrit Betke, Ronald L. Rivest, and Mona Singh. COLT'93 (Santa Cruz, California, 1993)Proceedings of the Sixth Annual Conference on Computational Learning Theory. Lenny Pitt (ed.) (1993-07) pp. 277--286.
       bib   acm   doi   pdf   link   

129.  [RS93a] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. Information and Computation 103,2 (1993) pp. 299--347.
       bib   doi   pdf   link   

128.  [GBRBx93] Commentators. Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M. Branscomb, Anne M. Branscomb, Ronald L. Rivest, Andrew Grosso, and Gary T. Marx. Communications of the ACM 36,3 (1993) pp. 34--41. (Commentary on preceding article ``To tap or not to tap'' by Dorothy Denning.)
       bib   acm   doi   pdf   link   

127.  [GR93] Scapegoat trees. Igal Galperin and Ronald L. Rivest. SODA '93 (Austin, Texas, 1993)Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. Vijaya Ramachandran (ed.) (1993) pp. 165--174. Chapter 19.
       bib   url   pdf   link   

126.  [KACDx93] Group Report: Architectures of Intelligent Systems. D. Kirsh, J. S. Altman, J.-P Changeux, A. R. Damasio, R. Durbin, A. K. Engel, W. D. Hillis, D. Premack, R. Rivest, P. E. Roland, P. S. Rosenbloom, G. S. Stent, and P. Stoerig. Exploring Brain Functions: Models in Neuroscience. T. A. Poggio and D. A. Glaser (eds.) (1993)
       bib   pdf   link   

125.  [HRR93] Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (Springer, 1993)
       bib   link   

124.  [BR93] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. Machine Learning: From Theory to Applications. Stephen Jos\'{e} Hanson, Werner Remmele, and Ronald L. Rivest (eds.) (1993) (Reprinted with permission from Neural Networks 5,1 (January 1992), Avrim Blum and Ronald L. Rivest, ``Training a three-node neural net is NP-complete''.)
       bib   doi   pdf   link   

123.  [RHAL92] Responses to NIST's proposal. Ronald L. Rivest, Martin E. Hellman, John C. Anderson, and John W. Lyons. Communications of the ACM 35,7 (1992) pp. 41--54.
       bib   acm   doi   pdf   link   

122.  [Riv92c] The MD5 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1321 (1992-04)
       bib   txt   link   

121.  [Riv92b] The MD4 Message Digest Algorithm. Ronald L. Rivest. Internet RFC 1320 (1992-04)
       bib   txt   link   

120.  [Riv92a] Vortex air rings. Ronald L. Rivest. Nature (Scientific Correspondence) 356(1992) pp. 199--200.
       bib   doi   pdf   link   

119.  [BR92] Training a 3-node neural network is NP-complete. Avrim L. Blum and Ronald L. Rivest. Neural Networks 5,1 (1992) pp. 117--127.
       bib   doi   pdf   prepub.pdf   link   

118.  [Riv91] Cryptography and Machine Learning. Ronald L. Rivest. ASIACRYPT '91 (Fujiyoshida, Japan, 1991)Advances in Cryptography - ASIACRYPT '91. Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (eds.) (1993) pp. 427--439.
       bib   doi   pdf   link   

117.  [IRM91] Advances in Cryptography - ASIACRYPT '91. Hideki Imai, Ronald L. Rivest, and Tsutomu Matsumoto (eds.) ASIACRYPT '91 (Fujiyoshida, Japan, 1991)
       bib   link   

116.  [MGRS91] Research Directions in Computer Science: An MIT Perspective. Albert R. Meyer, John V. Guttag, Ronald L. Rivest, and Peter Szolovits (eds.) (MIT Press, 1991)
       bib   link   

115.  [RG91] A Fast Multiport Memory Based on Single-Port Memory Cells. R. Rivest and L. Glasser. MIT Lab for Computer Science, MIT/LCS/TM-455 (1991)
       bib   pdf   link   

114.  [LMR91] Results on Learnability and the Vapnik-Chervonenkis Dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. Information and Computation 90,1 (1991) pp. 33--49.
       bib   doi   pdf   link   

113.  [PR92] Method of secure remote access. Russell W. Pogue and Ronald L. Rivest. U.S. Patent 5,144,667. Issued December 20, 1990. (1990-12-20)
       bib   pdf   google-patent-page   link   

112.  [KPR90] Learning time-varying concepts. Anthony Kuh, Thomas Petsche, and Ronald L. Rivest. NIPS'90 (Denver, Colorado, 1990)Proceedings of the 1990 Conference on Advances in Neural Information Processing Systems 3. Richard P. Lippmann, John E. Moody, and David S. Touretzky (eds.) (1990) pp. 183--189.
       bib   url   pdf   link   

111.  [Riv90b] Finding Four Million Large Random Primes. Ronald L. Rivest. CRYPTO '90 (Santa Barbara, California, 1990)Advances in Cryptology - CRYPTO '90, 10th Annual Internation Cryptology Conference. Alfred Menezes and Scott A. Vanstone (eds.) (1990) pp. 625--626.
       bib   doi   pdf   link   

110.  [ER90] On the sample complexity of PAC-learning using random and chosen examples. Bonnie Eisenberg and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990)Proceedings of the third annual workshop on computational learning theory. Mark A. Fulk and John Case (eds.) (1990) pp. 154--162.
       bib   link   

109.  [AR90] Inferring Graphs from Walks. Javed A. Aslam and Ronald L. Rivest. COLT '90 (Rochester, New York, 1990)Proceedings of the third annual workshop on computational learning theory. Mark A. Fulk and John Case (eds.) (1990) pp. 359--370.
       bib   prepub.pdf   link   

108.  [CLR90] Introduction to Algorithms (First edition). Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. (MIT Press and McGraw Hill, 1990)
       bib   link   

107.  [BOGMR90] A Fair Protocol for Signing Contracts. Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. IEEE Transactions on Information Theory 36(1990) pp. 40--46.
       bib   doi   pdf   link   

106.  [Riv90a] Cryptography. Ronald L. Rivest. Chapter 13. Handbook of Theoretical Computer Science. J. Van Leeuwen (ed.) (Elsevier, 1990) pp. 717--755. (1990)
       bib   pdf   link   

105.  [RS90] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Machine Learning: An Artificial Intelligence Approach. Yves Kodratoff and Ryszard Michalski (eds.) (1990)
       bib   link   

104.  [GRS89] Learning Binary Relations and Total Orders. Sally A. Goldman, Ronald L. Rivest, and Robert E. Schapire. FOCS '89 (Research Triangle Park, North Carolina, 1989)Proceedings Thirtieth IEEE Annual Symposium on Foundations of Computer Science. (1989) pp. 46--51.
       bib   doi   pdf   link   

103.  [RHW89] COLT '89. Ronald L. Rivest, David Haussler, and Manfred K. Warmuth (eds.) (Santa Cruz, California, 1989)
       bib   link   

102.  [RS89] Inference of Finite Automata Using Homing Sequences. Ronald L. Rivest and Robert E. Schapire. STOC '89 (Seattle, Washington, 1989)Proceedings Twenty-First Annual ACM Symposium on Theory of Computation. D. S. Johnson (ed.) (1989) pp. 411--420.
       bib   acm   doi   pdf   link   

101.  [QR89] Inferring decision trees using the Minimum Description Length principle. J. Ross Quinlan and Ronald L. Rivest. Information and Computation 80,3 (1989) pp. 227--248.
       bib   doi   pdf   link   

100.  [BR88b] Training a 3-node neural network is NP-complete. Avrim Blum and Ronald L. Rivest. NIPS '88 (Denver, Colorado, 1988)Advances in Neural Information Processing Systems. David S. Touretzky (ed.) (1989) pp. 494--501.
       bib   link   

99.  [LMR88b] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yihshay Mansour, and Ronald L. Rivest. FOCS'88 (White Plains, New York, 1988)Proceedings of the Twenty-Ninth Annual Symposium on the Foundations of Computer Science. (1988-10) pp. 120--129. Replaced by 114. [LMR91].
       bib   doi   pdf   link   

98.  [CR88] A Knapsack-type public key cryptosystem based on arithmetic in finite fields. Benny Chor and Ronald L. Rivest. IEEE Transactions on Information Theory 34,5 (1988) pp. 901--909.
       bib   doi   pdf   link   

97.  [RS88b] Learning Complicated Concepts Reliably and Usefully (Extended Abstract). Ronald L. Rivest and Robert [H.] Sloan. AAAI-88 (St. Paul, Minnesota, 1988)Proceedings AAAI-88. Tom Mitchell and Reid Smith (eds.) (1988-08) pp. 635--640. Replaced by 137. [RS94b].
       bib   pdf   link   

96.  [LMR88a] Results on Learnability and the Vapnik-Chervonenkis dimension. Nathan Linial, Yishay Mansour, and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988)Proceedings of the first annual workshop on computational learning theory. David Haussler and Leonard Pitt (eds.) (1988-08) pp. 56--68. Replaced by 114. [LMR91].
       bib   link   

95.  [BR88a] Training a 3-node neural net is NP-complete. Avrim Blum and Ronald L. Rivest. COLT '88 (Cambridge, MA, 1988)Proceedings of the first annual workshop on computational learning theory. David Haussler and Leonard Pitt (eds.) (1988) pp. 9--18.
       bib   url   link   

94.  [GMR88] A digital signature scheme secure against adaptive chosen-message attacks. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. SIAM J. Computing 17,2 (1988) pp. 281--308.
       bib   doi   pdf   link   

93.  [RS88a] A New Model for Inductive Inference. Ronald L. Rivest and Robert H. Sloan. TARK II (Asilomar, Pacific Grove, California, 1988)Proceedings Second Annual Conference on Theoretical Aspects of Rationality and Knowledge. Moshe Y. Vardi (ed.) (1988) pp. 13--27.
       bib   url   pdf   link   

92.  [KRS88] Is the Data Encryption Standard a Group? (Results of cycling experiments on DES). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. Journal of Cryptology 1,1 (1988) pp. 3--36.
       bib   doi   pdf   link   

91.  [RF88] A ``greedy'' channel router. Ronald L. Rivest and Charles M. Fiduccia. Papers on Twenty-five years of electronic design automation. (1988) Reprint of RF83.
       bib   acm   doi   pdf   link   

90.  [GR88] Making Maximum Entropy Computations Easier by Adding Extra Constraints (Extended Abstract). Sally A. Goldman and Ronald L. Rivest. Maximum-Entropy and Bayesian Methods in Science and Engineering. G. J. Erickson and C. R. Smith (eds.) (1988)
       bib   prepub.pdf   link   

89.  [Riv87c] Game tree searching by min/max approximation. Ronald L. Rivest. Artificial Intelligence 34,1 (1987) pp. 77--96.
       bib   doi   pdf   link   

88.  [Riv87b] Learning Decision Lists. Ronald L. Rivest. Machine Learning 2,3 (1987) pp. 229--246.
       bib   doi   pdf   link   

87.  [RS87c] Diversity-based inference of finite automata. Ronald L. Rivest and Robert E. Schapire. FOCS '87 (Los Angeles, California, 1987)Proceedings Twenth-Eighth IEEE Annual Symposium on Foundations of Computer Science. Tom Leighton (ed.) (1987) pp. 78--87. Replaced by 135. [RS94a].
       bib   doi   pdf   link   

86.  [RS87b] Method and apparatus for resuing non-erasable memory media. Ronald L. Rivest and Adi Shamir. U.S. Patent 4,691,299. (1987-09-01)
       bib   pdf   google-patent-page   link   

85.  [RS87a] A New Approach to Unsupervised Learning in Deterministic Environments. Ronald L. Rivest and Robert E. Schapire. Fourth International Workshop on Machine Learning (U.C. Irvine, Irvine, California, 1987)Proceedings Fourth International Workshop on Machine Learning. Pat Langley (ed.) (1987) pp. 364--375.
       bib   prepub.pdf   link   

84.  [Riv87a] Network control by Bayesian broadcast. Ronald L. Rivest. IEEE Trans. on Information Theory IT-33,3 (1987) pp. 323--328.
       bib   doi   pdf   link   

83.  [KLRTx87] Global wire routing in two-dimensional arrays. R[ichard] M. Karp, F[rank] T. Leighton, R[onald] L. Rivest, U[mesh] V. Vazirani, and V[ijay] V. Vazirani. Algorithmica 2,1 (1987) pp. 113--129.
       bib   doi   pdf   link   

82.  [LR86] Estimating a Probability using Finite Memory. F. Thomson Leighton and Ronald L. Rivest. IEEE Trans. on Information Theory IT-32,6 (1986) pp. 733--742.
       bib   doi   pdf   link   

81.  [GR86] A Non-iterative Maximum Entropy Algorithm. Sally A. Goldman and Ronald L. Rivest. UAI '86 (Philadelphia, Pennsylvania, 1986)Proceedings of the Second Annual Conference on Uncertainty in Artificial Intelligence. John F. Lemmer and Laveen N. Kanal (eds.) (1986) pp. 133--148.
       bib   (pdf)   link   

80.  [CLRS86] An application of number theory to the organization of raster-graphics memory. Benny Chor, Charles E. Leiseron, Ronald L. Rivest, and James B. Shearer. JACM 33,1 (1986) pp. 86--104.
       bib   acm   doi   pdf   link   

79.  [KRS85b] Is DES a pure cipher? (Results of more cycling experiments on DES) (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. CRYPTO '85 (Santa Barbara, California, 1985)Advances in Cryptology---CRYPTO '85 Proceedings. Hugh C. Williams (ed.) (1985) pp. 212--226.
       bib   doi   pdf   link   

78.  [BOGMR85] A Fair Protocol for Signing Contracts (Extended Abstract). Michael Ben-Or, Oded Goldreich, Silvio Micali, and Ronald L. Rivest. ICALP '85 (Nafplion, Greece, 1985)Proceedings 1985 International Colloquium on Automata, Languages, and Programming. Wilfried Brauer (ed.) (1985) pp. 43--52. Replaced by 107. [BOGMR90].
       bib   doi   pdf   link   

77.  [RS85] Efficient Factoring Based on Partial Information. Ronald L. Rivest and Adi Shamir. EUROCRYPT '85 (Linz, Austria, 1985)Advances in Cryptology---EUROCRYPT '85, Workshop on the Theory and Applications of Cryptographic Techniques. Franz Pichler (ed.) (1986) pp. 31--34.
       bib   doi   pdf   link   

76.  [KRS85a] Is the Data Encryption Standard a Group? (Preliminary Abstract). Burton S. Kaliski, Ronald L. Rivest, and Alan T. Sherman. EUROCRYPT '85 (Linz, Austria, 1985)Advances in Cryptology---EUROCRYPT '85, Workshop on the Theory and Applications of Cryptographic Techniques. Franz Pichler (ed.) (1986) pp. 81--95. Replaced by 92. [KRS88].
       bib   doi   pdf   link   

75.  [Riv85] Testing Implementations of DES. Ronald L. Rivest. (1985-02) Unpublished draft.
       bib   txt   link   

74.  [BLRVW84] Problem 84-2. Counting Chordal Intersections. J[on] L. Bentley, C[harles] E. Leiserson, R[onald] L. Rivest, and C. J. Van Wyk. Journal of Algorithms 5,4 (1984) pp. 592--594.
       bib   doi   pdf   link   

73.  [GMR84b] A ``Paradoxical'' Solution to the Signature Problem. Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. FOCS '84 (Singer Island, Florida, 1984)Proceedings Twenty-Fifth IEEE Annual Symposium on Foundations of Computer Science. (1984-10) pp. 441--448. Replaced by 94. [GMR88].
       bib   doi   pdf   link   

72.  [GMR84a] A `Paradoxical' solution to the signature problem (brief abstract). Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984)Advances in Cryptology -- Proceedings of CRYPTO 1984. George Blakley and David Chaum (eds.) (1985) pp. 467. Replaced by 94. [GMR88].
       bib   doi   pdf   link   

71.  [CR84] A Knapsack Type Public Key Cryptosystem Based on Arithmetic in Finite Fields (preliminary draft). Benny Chor and Ronald L. Rivest. CRYPTO '84 (Santa Barbara, California, 1984)Advances in Cryptology -- Proceedings of CRYPTO 1984. George Blakley and David Chaum (eds.) (1985) pp. 54--65. Replaced by 98. [CR88].
       bib   doi   pdf   link   

70.  [Riv84] RSA chips (past/present/future). Ronald L. Rivest. EUROCRYPT '84 (Paris, France, 1984)Advances in Cryptology: Proceedings of EUROCRYPT 84: A workshop on the theory and application of cryptographic techniques. T. Beth, N. Cot, and I. Ingemarsson (eds.) (1985) pp. 159--165.
       bib   doi   pdf   link   

69.  [RS84] How to expose an eavesdropper. Ronald L. Rivest and Adi Shamir. CACM 27,4 (1984) pp. 393--395.
       bib   acm   doi   pdf   link   

68.  [KLRTx83] Global wire routing in two-dimensional arrays. R. M. Karp, F. T. Leighton, R. L. Rivest, C. D. Thompson, U. Vazirani, and V. Vazirani. FOCS '83 (Tucson, Arizona, 1983)Proceedings Twenth-Fourth Annual Symposium on Foundations of Computer Science. Lawrence Snyder (ed.) (1983) pp. 453--459.
       bib   doi   pdf   link   

67.  [RSA83b] Cryptographic Communications system and method. Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. U.S. Patent 4,405,829. Issued September 20, 1983. (1983-09-20)
       bib   pdf   google-patent-page   link   

66.  [LR83] Estimating a Probability Using Finite Memory (Extended Abstract). Frank Thomson Leighton and Ronald L. Rivest. FCT'83 (Borgholm, Sweden, 1983)Proceedings of the 1983 International FCT--Conference on Foundations of Computation Theory. Marek Karpinski (ed.) (1983-08) pp. 255-269. Replaced by 82. [LR86].
       bib   doi   pdf   link   

65.  [Riv83x] What is the purpose and structure of intelligence?. Ronald L. Rivest. (1983-08-16) (Unpublished draft.)
       bib   pdf   link   

64.  [RF83] A `greedy' channel router. Ronald L. Rivest and Charles M. Fiduccia. Computer-Aided Design 15,3 (1983) pp. 135--140. Reprinted in RF88.
       bib   doi   pdf   link   

63.  [Riv83b] Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals. Ronald L. Rivest. U.S. Patent 4,376,299. Issued March 8, 1983. (1983-03-08)
       bib   pdf   google-patent-page   link   

62.  [RSA83a] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 26,1 (1983) pp. 96--99. (This is a reprint of the "RSA paper" RSA78.)
       bib   acm   doi   pdf   link   

61.  [Riv83a] Data Encryption. Ronald L. Rivest. Encyclopedia of Computer Science and Engineering. Anthony Ralston (ed.) (1983)
       bib   pdf   link   

60.  [CLR82] An Application of Number Theory to the Organization of Raster-Graphics Memory. Benny Chor, Charles E. Leiserson, and Ronald L. Rivest. FOCS '82 (Chicago, Illinois, 1982)Proceedings 23rd Annual Symposium on Foundations of Computer Science. Nicholas Pippenger (ed.) (1982) pp. 92--99. Replaced by 80. [CLRS86].
       bib   doi   pdf   link   

59.  [LPRS82] Minimum Edge-Length Partitioning of Rectilinear Polygons. Andrzej Lingas, Ron Y. Pinter, Ronald L. Rivest, and Adi Shamir. Allerton '82 (Monticello, Illinois, 1982)Proceedings 20th Annual Allerton Conference on Communication, Control, and Computing. H. V. Poor and W. K. Jenkins (eds.) (1982-10) pp. 53--63.
       bib   pdf   link   

58.  [RS82c] How to reuse a ``write-once'' memory. Ronald L. Rivest and Adi Shamir. Information and Control 55,1--3 (1982) pp. 1--19.
       bib   doi   pdf   link   

57.  [Riv82b] A Short Report on the RSA Chip. Ronald L. Rivest. CRYPTO '82 (U. C. Santa Barbara, 1982)Advances in Cryptology---Proceedings of {CRYPTO 82}. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (1983) pp. 327.
       bib   pdf   link   

56.  [RS82b] Randomized Encryption Techniques. Ronald L. Rivest and Alan T. Sherman. CRYPTO '82 (U. C. Santa Barbara, 1982)Advances in Cryptology---Proceedings of {CRYPTO 82}. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (1982-08) pp. 145--163.
       bib   pdf   link   

55.  [CRS82] Advances In Cryptology---Proceedings of CRYPTO 82. David Chaum, Ronald L. Rivest, and Alan T. Sherman (eds.) (U. C. Santa Barbara, 1982)
       bib   link   

54.  [Riv82a] The ``PI'' Placement and Interconnect System. Ronald L. Rivest. DAC '82 (Las Vegas, Nevada, 1982)Proceedings 19th IEEE Design Automation Conference. (1982) pp. 475--481.
       bib   pdf   link   

53.  [RF82] A `Greedy' Channel Router. Ronald L. Rivest and Charles M. Fiduccia. DAC '82 (Las Vegas, Nevada, 1982)Proceedings 19th IEEE Design Automation Conference. (1982) pp. 418--424.
       bib   pdf   link   

52.  [RS82a] How to reuse a ``write-once'' memory (Preliminary version). Ronald L. Rivest and Adi Shamir. STOC'82 (San Francisco, California, 1982)Proceedings of the fourteenth annual ACM symposium on Theory of Computing. (1982-05) pp. 105--113. Replaced by 58. [RS82c].
       bib   acm   doi   pdf   link   

51.  [RBM81] Provably Good Channel Routing Algorithms. Ronald L. Rivest, Alan E. Baratz, and Gary [L.] Miller. CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981)Proceedings CMU Conference on VLSI Systems and Computations. H. T. Kung, Bob Sproull, and Guy Steele (eds.) (1981) pp. 153--159.
       bib   pdf   link   

50.  [BR81] New Lower Bounds on Channel Width. Donna Brown and Ronald L. Rivest. Proceedings CMU Conference on VLSI Systems and Computations (Pittsburgh, Pennsylvania, 1981)H. T. Kung, Bob Sproull, and Guy Steele (eds.) (1981) pp. 178--185.
       bib   pdf   link   

49.  [Riv81] Statistical analysis of the Hagelin cryptograph. Ronald L. Rivest. Cryptologia 5,1 (1981) pp. 27--32.
       bib   doi   (pdf)   link   

48.  [SRA81] Mental Poker. Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman. The Mathematical Gardner. David A. Klarner (ed.) (Prindle, Weber, and Schmidt, 1981) pp. 37--43. (1981)
       bib   pdf   link   

47.  [BCR80] Orthogonal Packings in Two Dimensions. Brenda S. Baker, Edward G. Coffman Jr., and Ronald L. Rivest. SIAM J. Comput. 9,4 (1980) pp. 846--855.
       bib   doi   pdf   link   

46.  [RMKWS80] Coping with errors in binary search procedures. R[onald] L. Rivest, A[lbert] R. Meyer, D[aniel] J. Kleitman, K. Winklmann, and J(oel) Spencer. JCSS 20,3 (1980) pp. 396--404.
       bib   doi   pdf   link   

45.  [YR80] On the polyhedral decision problem. Andrew C. Yao and Ronald L. Rivest. SIAM J. Computing 9,2 (1980) pp. 343--347.
       bib   doi   pdf   link   

44.  [LPR80] The Subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. JCSS 20,2 (1980) pp. 133--149.
       bib   doi   pdf   link   

43.  [Riv80a] ``Forwards and Backwards'' encryption. Ronald L. Rivest. Cryptologia 4,1 (1980) pp. 30--33.
       bib   doi   (pdf)   link   

42.  [Riv80b] A description of a single-chip implementation of the RSA cipher. Ronald L. Rivest. Lambda 1(1980) pp. 14--18.
       bib   pdf   link   

41.  [Riv79b] The BLIZZARD Computer Architecture. Ronald L. Rivest. ACM SIGARCH Computer Architecture News 7,9 (1979) pp. 2--10.
       bib   acm   doi   pdf   link   

40.  [RVW79] An Omega((n/lg n)^1/2 lower bound on the number of additions necessary to compute 0-1 polynomials over the ring of integer polynomials. Ronald L. Rivest and Jean-Paul Van de Wiele. Information Processing Letters 8,4 (1979) pp. 178--180.
       bib   doi   pdf   link   

39.  [Riv79a] Critical remarks on ``Critical remarks on some public-key cryptosystems'' by T. Herlestam. Ronald L. Rivest. BIT Numerical Mathematics 19,2 (1979) pp. 274--275.
       bib   doi   pdf   link   

38.  [AR78a] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. NCC '78 (Birmingham, Alabama, 1978)Proceedings National Conference on Communications. (1978) Replaced by 37. [AR78b].
       bib   prepub.pdf   link   

37.  [AR78b] The Use of Public Key Cryptography in Communication System Design. Leonard M. Adleman and Ronald L. Rivest. IEEE Communications Society Magazine (Special Issue on Communications Privacy) 16,6 (1978) pp. 20--23.
       bib   doi   pdf   link   

36.  [BCR78] Orthogonal Packings in Two Dimensions. B. S. Baker, E. G. Coffman, and R. L. Rivest. Allerton '78 (Monticello, Illinois, 1978)Proc. 16th Annual Allerton Conf. on Communication, Control, and Computing. (1981) pp. 626--635. Replaced by 47. [BCR80].
       bib   link   

35.  [Riv78c] The Impact of Technology on Cryptography. Ronald L. Rivest. ICC '78 (Toronto, Canada, 1978)Proceedings 1978 International Conference on Communications. (1978)
       bib   pdf   link   

34.  [RMKWS78] Coping with errors in binary search procedures (Preliminary report). R(onald) L. Rivest, A(lbert) R. Meyer, D(aniel) J. Kleitman, K(arl) Winklmann, and J(oel) Spencer. STOC '78 (San Diego, California, 1978)Proceedings of the tenth annual ACM symposium on Theory of computing. Richard J. Lipton (ed.) (1978) pp. 227--232. Replaced by 46. [RMKWS80].
       bib   acm   doi   pdf   link   

33.  [LPR78] The subgraph homeomorphism problem. Andrea S. LaPaugh and Ronald L. Rivest. STOC '78 (San Diego, California, 1978)Proceedings of the tenth annual ACM symposium on Theory of computing. Richard J. Lipton (ed.) (1978) pp. 40--50. Replaced by 44. [LPR80].
       bib   acm   doi   pdf   link   

32.  [YR78] k+1 heads are better than k. Andrew C. Yao and Ronald L. Rivest. JACM 25,2 (1978) pp. 337--340.
       bib   acm   doi   pdf   link   

31.  [Riv78b] Optimal arrangement of keys in a hash table. Ronald L. Rivest. JACM 25,2 (1978) pp. 200--209.
       bib   acm   doi   pdf   link   

30.  [RSA78] A method for obtaining digital signatures and public-key cryptosystems. R[onald] L. Rivest, A[di] Shamir, and L[eonard M.] Adleman. CACM 21,2 (1978) pp. 120--126. (This is the "RSA paper".)
       bib   acm   doi   pdf   link   

29.  [Riv78a] Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem. Ronald L. Rivest. Cryptologia 2,1 (1978) pp. 62--65.
       bib   doi   (pdf)   prepub.pdf   link   

28.  [RAD78] On Data Banks and Privacy Homomorphisms. Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. Foundations of Secure Computation. Richard A. DeMillo, David P. Dobkin, Anita K. Jones, and Richard J. Lipton (eds.) (1978)
       bib   pdf   link   

27.  [Riv77c] On the worst-case behavior of string-searching algorithms. Ronald L. Rivest. SIAM J. Computing 6,4 (1977) pp. 669--674.
       bib   doi   pdf   link   

26.  [RMKS77] Binary search using unreliable comparisons. Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, and Joel Spencer. Allerton '77 (Monticello, Illinois, 1977)Proceedings 15th Annual Allerton Conference on Communication, Control, and Computing. F. P. Preparata and M. B. Pursley (eds.) (1977) pp. 165--168. Replaced by 46. [RMKWS80].
       bib   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   link   

25.  [Riv77b] The necessity of feedback in minimal monotone combinational circuits. Ronald L. Rivest. IEEE Trans. on Computers C-26,6 (1977) pp. 606--607.
       bib   doi   pdf   link   

24.  [YAR77] An Omega(n^2 log n) lower bound to the shortest paths problem. Andrew C. Yao, David M. Avis, and Ronald L. Rivest. STOC '77 (Boulder, Colorado, 1977)Proceedings of the ninth annual ACM symposium on Theory of computing. John E. Hopcroft, Emily P. Friedman, and Michael A. Harrison (eds.) (1977) pp. 11--17. (Claim withdrawn.)
       bib   acm   doi   pdf   link   

23.  [Riv77a] The game of ``N questions'' on a tree. Ronald L. Rivest. Discrete Mathematics 17,2 (1977) pp. 181--186.
       bib   doi   pdf   link   

22.  [RV76b] On recognizing graph properties from adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Theoretical Computer Science 3,3 (1976) pp. 371--384.
       bib   doi   pdf   link   

21.  [DR76] Linear expected time of a simple union-find algorithm. Jon Doyle and Ronald L. Rivest. Information Processing Letters 5,5 (1976) pp. 146--148.
       bib   doi   pdf   link   

20.  [YR76] K+1 heads are better than K. Andrew C. Yao and Ronald L. Rivest. FOCS '76 (Houston, Texas, 1976)Proceedings 17th Annual Symposium on Foundations of Computer Science. Michael J. Fischer (ed.) (1976) pp. 67--70. Replaced by 32. [YR78].
       bib   doi   pdf   link   

19.  [RP76] The Mutual Exclusion Problem for Unreliable Processes: Preliminary Report. Ronald L. Rivest and Vaughan R. Pratt. FOCS '76 (Houston, Texas, 1976)Proceedings 17th Annual Symposium on Foundations of Computer Science. Michael J. Fischer (ed.) (1976) pp. 1--8.
       bib   doi   pdf   link   

18.  [HR76] Constructing optimal binary decision trees is NP-complete. Laurent Hyafil and Ronald L. Rivest. Information Processing Letters 5,1 (1976) pp. 15--17.
       bib   doi   pdf   link   

17.  [Riv76b] Partial-match retrieval algorithms. Ronald L. Rivest. SIAM J. Computing 5,1 (1976) pp. 19--50.
       bib   doi   pdf   link   

16.  [Riv76a] On self-organizing sequential search heuristics. Ronald L. Rivest. Communications of the ACM 19,2 (1976) pp. 63--67.
       bib   acm   doi   pdf   link   

15.  [RV76a] On the time required to recognize properties of graphs from their adjacency matrices. Ronald L. Rivest and Jean Vuillemin. Ast\'{e}risque 38--39(1976) pp. 213--227.
       bib   pdf   link   

14.  [RV75] A Generalization and Proof of the Aanderaa-Rosenberg Conjecture. Ronald L. Rivest and Jean Vuillemin. STOC '75 (Albuquerque, New Mexico, 1975)Proceedings of seventh annual ACM symposium on Theory of computing. William C. Rounds (ed.) (1975) pp. 6--11. Replaced by 22. [RV76b].
       bib   acm   doi   pdf   link   

13.  [FR75b] Algorithm 489: the algorithm SELECT---for finding the ith smallest of n elements [M1]. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 173.
       bib   acm   doi   pdf   link   

12.  [FR75a] Expected time bounds for selection. Robert W. Floyd and Ronald L. Rivest. Communications of the ACM 18,3 (1975) pp. 165--172.
       bib   acm   doi   pdf   link   

11.  [Riv74d] On self-organizing sequential search heuristics. Ronald L. Rivest. SWAT '74 (New Orleans, 1974)IEEE Conference Record of 15th Annual Symposium on Switching and Automata Theory. Ronald Book (ed.) (1974) pp. 122--126. Replaced by 16. [Riv76a].
       bib   doi   pdf   link   

10.  [Riv74c] On hash-coding algorithms for partial-match retrieval. Ronald L. Rivest. SWAT '74 (New Orleans, 1974)IEEE Conference Record of 15th Annual Symposium on Switching and Automata Theory. Ronald Book (ed.) (1974) pp. 95--103.
       bib   doi   pdf   link   

9.  [Riv74b] On the optimality of Elias's algorithm for performing best-match searches. Ronald L. Rivest. IFIP '74 (Stockholm, Sweden, 1974)Proceedings of IFIP Congress. Jack L. Rosenfeld (ed.) (1974) pp. 678--681.
       bib   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   link   

8.  [KR74] Asymptotic Bounds for the Number of Convex n-ominoes. David A. Klarner and Ronald L. Rivest. Discrete Mathematics 8,1 (1974) pp. 31--40.
       bib   doi   pdf   link   

7.  [Riv74a] Analysis of Associative Retrieval Algorithms. Ronald L. Rivest. phdthesis. Stanford University Computer Science Department (1974)
       bib   pdf   bib (rivest-macbook-pro-C.local's conflicted copy 2020-12-06).txt   link   

6.  [Riv73] A fast stable minimum-storage sorting algorithm. Ronald L. Rivest. , Rapport de Recherce no. 43 (1973)
       bib   pdf   link   

5.  [HR73] Graph Partitioning and Constructing Optimal Decision Trees are Polynomial Complete Problems. L[aurent] Hyafil and R[onald] L. Rivest. IRIA -- Laboratoire de Recherche en Informatique et Automatique, Rapport de Recherche no. 33 (1973) The decision tree result from this paper was published in HR76.
       bib   pdf   link   

4.  [BFPRT73] Time Bounds for Selection. Manual Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. Journal of Computer and System Sciences 7,4 (1973) pp. 448--461.
       bib   doi   pdf   link   

3.  [KR73] A procedure for improving the upper bound for the number of N-ominoes. David A. Klarner and Ronald L. Rivest. Canadian Journal of Math. 25,3 (1973) pp. 585--602.
       bib   doi   pdf   link   

2.  [RK72] Bibliography 26. Computer Sorting. Ronald L. Rivest and Donald E. Knuth. Computing Reviews 13(1972) pp. 283--289.
       bib   pdf   link   

1.  [BFPRT72] Linear time bounds for median computations. Manuel Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. STOC'72 (Denver, Colorado, 1972)Proceedings of the fourth annual ACM symposium on Theory of Computing. Patrick C. Fischer, H. Paul Zeiger, Jeffery D. Ullman, and Arnold L. Rosenberg (eds.) (1972-05) pp. 119--124. Replaced by 4. [BFPRT73].
       bib   acm   doi   pdf   link