Cryptographers' World
 

Ronald L. Rivest


Author's Web Page Link

36 papers in database with 15601 citations StarStarStarStarStar

Editor of 2 conference proceedings books

H-number: 21

Conference Proceedings

 
1. Hideki ImaiRonald L. RivestTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings. Springer, 1993. ISBN 3-540-57332-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. David ChaumRonald L. RivestAlan T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82. Plenum Press, 1983.
[Papers]


Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Mihir Bellare,  Ronald L. Rivest,  Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer, Journal of Cryptology, Volume 12(2), pp. 117 - 139, Springer, 1999.

[Cited 9 times ]

2. Shafi Goldwasser,  Silvio Micali,  Ronald L. Rivest,  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, Volume 17(2), pp. 281 - 308, Society for Industrial and Applied Mathematics, 1988.

[Cited 1392 times Red StarRed StarRed StarRed StarRed Star]

3. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES), Journal of Cryptology, Volume 1(1), pp. 3 - 36, Springer, 1988.

[Cited 44 times ]

4. Ronald L. Rivest,  Adi Shamir,  Leonard M. Adleman,  A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Volume 21(2), pp. 120 - 126, Association for Computing Machinery, 1978.

[Cited 7536 times Red StarRed StarRed StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Leonid Reyzin,  Ronald L. Rivest,  Emily Shen,  Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6, pp. 104 - 121, FSE 2009.

[Electronic Edition][Cited 6 times ]

2. Ran Canetti,  Ronald L. Rivest,  Madhu Sudan,  Luca Trevisan,  Salil P. Vadhan,  Hoeteck Wee,  Amplifying Collision Resistance: A Complexity-Theoretic Treatment, pp. 264 - 283, CRYPTO 2007.

[Electronic Edition][Cited 12 times ]

3. Ronald L. Rivest,  On the Notion of Pseudo-Free Groups, pp. 505 - 521, TCC 2004.

[Electronic Edition][Cited 27 times ]

4. Ronald L. Rivest,  Peppercoin Micropayments, pp. 2 - 8, FC 2004.

[Electronic Edition][Cited 32 times ]

5. Nicko van Someren,  Andrew M. Odlyzko,  Ronald L. Rivest,  Tim Jones,  Duncan Goldie-Scot,  Does Anyone Really Need MicroPayments?, pp. 69 - 76, FC 2003.

[Electronic Edition][Cited 14 times ]

6. Moses Liskov,  Ronald L. Rivest,  David Wagner,  Tweakable Block Ciphers, pp. 31 - 46, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 155 times Red StarRed Star]

7. Rebecca N. Wright,  L. Jean Camp,  Ian Goldberg,  Ronald L. Rivest,  Graham Wood,  Privacy Tradeoffs: Myth or Reality? Panel, pp. 147 - 151, FC 2002.

[Electronic Edition][No citation]

8. Silvio Micali,  Ronald L. Rivest,  Micropayments Revisited, pp. 149 - 163, CT-RSA 2002.

[Electronic Edition][Cited 123 times Red StarRed Star]

9. Silvio Micali,  Ronald L. Rivest,  Transitive Signature Schemes, pp. 236 - 243, CT-RSA 2002.

[Electronic Edition][Cited 82 times Red Star]

10. Ronald L. Rivest,  Adi Shamir,  Yael Tauman,  How to Leak a Secret, pp. 552 - 565, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 601 times Red StarRed StarRed StarRed Star]

11. Ed Gerck,  C. Andrew Neff,  Ronald L. Rivest,  Aviel D. Rubin,  Moti Yung,  The Business of Electronic Voting, pp. 234 - 259, FC 2001.

[Electronic Edition][Cited 5 times ]

12. Anna Lysyanskaya,  Ronald L. Rivest,  Amit Sahai,  Stefan Wolf,  Pseudonym Systems, pp. 184 - 199, SAC 1999.

[Electronic Edition][Cited 289 times Red StarRed StarRed Star]

13. Scott Contini,  Ronald L. Rivest,  Matthew J. B. Robshaw,  Yiqun Lisa Yin,  Improved Analysis of Some Simplified Variants of RC6, pp. 1 - 15, FSE 1999.

[Electronic Edition][Cited 20 times ]

14. Oded Goldreich,  Birgit Pfitzmann,  Ronald L. Rivest,  Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop, pp. 153 - 168, CRYPTO 1998.

[Electronic Edition][Cited 36 times ]

15. Lars R. Knudsen,  Vincent Rijmen,  Ronald L. Rivest,  Matthew J. B. Robshaw,  On the Design and Security of RC2, pp. 206 - 221, FSE 1998.

[Electronic Edition][Cited 17 times ]

16. Ronald L. Rivest,  Can We Eliminate Certificate Revocations Lists?, pp. 178 - 183, FC 1998.

[Electronic Edition][Cited 202 times Red StarRed Star]

17. Ronald L. Rivest,  Perspectives on Financial Cryptography, pp. 145 - 150, FC 1997.

[Electronic Edition][Cited 6 times ]

18. Ronald L. Rivest,  Electronic Lottery Tickets as Micropayments, pp. 307 - 314, FC 1997.

[Electronic Edition][Cited 95 times Red Star]

19. Ronald L. Rivest,  All-or-Nothing Encryption and the Package Transform, pp. 210 - 218, FSE 1997.

[Electronic Edition][Cited 149 times Red StarRed Star]

20. Ronald L. Rivest,  The RC5 Encryption Algorithm, pp. 86 - 96, FSE 1994.

[Electronic Edition][Cited 688 times Red StarRed StarRed StarRed Star]

21. Ronald L. Rivest,  On NIST's Proposed Digital Signature Standard, pp. 481 - 484, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

22. Ronald L. Rivest,  Cryptography and Machine Learning, pp. 427 - 439, ASIACRYPT 1991.

[Electronic Edition][Cited 12 times ]

23. Ronald L. Rivest,  The MD4 Message Digest Algorithm, pp. 303 - 311, CRYPTO 1990.

[Electronic Edition][Cited 3564 times Red StarRed StarRed StarRed StarRed StarRed Star]

24. Ronald L. Rivest,  Finding Four Million Large Random Primes, pp. 625 - 626, CRYPTO 1990.

[Electronic Edition][Cited 19 times ]

25. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is DES a Pure Cipher? (Results of More Cycling Experiments on DES), pp. 212 - 226, CRYPTO 1985.

[Electronic Edition][Cited 12 times ]

26. Ronald L. Rivest,  Adi Shamir,  Efficient Factoring Based on Partial Information, pp. 31 - 34, EUROCRYPT 1985.

[Electronic Edition][Cited 42 times ]

27. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is the Data Encryption Standard a Group? (Preliminary Abstract), pp. 81 - 95, EUROCRYPT 1985.

[Electronic Edition][Cited 21 times ]

28. Benny Chor,  Ronald L. Rivest,  A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields, pp. 54 - 65, CRYPTO 1984.

[Electronic Edition][Cited 222 times Red StarRed Star]

29. Shafi Goldwasser,  Silvio Micali,  Ronald L. Rivest,  A "Paradoxical" Solution to the Signature Problem (Abstract), pp. 467 - 467, CRYPTO 1984.

[Electronic Edition][Cited 107 times Red StarRed Star]

30. Ronald L. Rivest,  RSA Chips (Past/Present/Future), pp. 159 - 165, EUROCRYPT 1984.

[Electronic Edition][Cited 36 times ]

31. Ronald L. Rivest,  A Short Report on the RSA Chip, pp. 327 - 327, CRYPTO 1982.

[Electronic Edition][Cited 3 times ]

32. Ronald L. Rivest,  Alan T. Sherman,  Randomized Encryption Techniques, pp. 145 - 163, CRYPTO 1982.

[Electronic Edition][Cited 21 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...