What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ronald L. Rivest
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
Efficient Maliciously Secure Oblivious Exponentiations.
Carsten Baum
Jens Berlips
Walther Chen
Ivan Bjerre Damgård
Kevin M. Esvelt
Leonard Foner
Dana Gretton
Martin Kysel
Ronald L. Rivest
Lawrence Roy
Francesca Sage-Ling
Adi Shamir
Vinod Vaikuntanathan
Lynn Van Hauwe
Theia Vogel
Benjamin Weinstein-Raun
Daniel Wichs
Stephen Wooster
Andrew C. Yao
Yu Yu
2024
conf/fc
Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners.
Douglas W. Jones
Sunoo Park
Ronald L. Rivest
Adam Sealfon
2019
conf/fc
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits.
Mayuri Sridhar
Ronald L. Rivest
2019
conf/fc
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits.
Kellie Ottoboni
Matthew Bernhard
J. Alex Halderman
Ronald L. Rivest
Philip B. Stark
2017
conf/fc
Marked Mix-Nets.
Olivier Pereira
Ronald L. Rivest
2017
conf/fc
BatchVote: Voting Rules Designed for Auditability.
Ronald L. Rivest
Philip B. Stark
Zara Perumal
2013
journals/joc
FlipIt: The Game of "Stealthy Takeover".
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2013
conf/ccs
Honeywords: making password-cracking detectable.
Ari Juels
Ronald L. Rivest
2012
conf/ccs
Hourglass schemes: how to prove that cloud files are encrypted.
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Emil Stefanov
Nikos Triandopoulos
2012
conf/uss
A Bayesian Method for Auditing Elections.
Ronald L. Rivest
Emily Shen
2011
journals/joc
Tweakable Block Ciphers.
Moses D. Liskov
Ronald L. Rivest
David A. Wagner
2011
conf/ccs
How to tell if your cloud files are vulnerable to drive crashes.
Kevin D. Bowers
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2011
conf/uss
Computing the Margin of Victory in IRV Elections.
Thomas R. Magrino
Ronald L. Rivest
Emily Shen
2010
journals/tifs
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
Poorvi L. Vora
2010
conf/uss
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Richard Carback
David Chaum
Jeremy Clark
John Conway
Aleksander Essex
Paul S. Herrnson
Travis Mayberry
Stefan Popoveniuc
Ronald L. Rivest
Emily Shen
Alan T. Sherman
Poorvi L. Vora
2009
journals/tifs
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
Poorvi L. Vora
2009
journals/tifs
Guest editorial: special issue on electronic voting.
Ronald L. Rivest
David Chaum
Bart Preneel
Aviel D. Rubin
Donald G. Saari
Poorvi L. Vora
2009
conf/fse
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Yevgeniy Dodis
Leonid Reyzin
Ronald L. Rivest
Emily Shen
2008
conf/uss
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
David Chaum
Richard Carback
Jeremy Clark
Aleksander Essex
Stefan Popoveniuc
Ronald L. Rivest
Peter Y. A. Ryan
Emily Shen
Alan T. Sherman
2008
conf/uss
On Auditing Elections When Precincts Have Different Sizes.
Javed A. Aslam
Raluca A. Popa
Ronald L. Rivest
2007
conf/uss
On Estimating the Size and Confidence of a Statistical Audit.
Javed A. Aslam
Raluca A. Popa
Ronald L. Rivest
2007
conf/crypto
Amplifying Collision Resistance: A Complexity-Theoretic Treatment.
Ran Canetti
Ronald L. Rivest
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Hoeteck Wee
2006
conf/ccs
Fourth-factor authentication: somebody you know.
John G. Brainard
Ari Juels
Ronald L. Rivest
Michael Szydlo
Moti Yung
2004
conf/fc
Peppercoin Micropayments.
Ronald L. Rivest
2004
conf/tcc
On the Notion of Pseudo-Free Groups.
Ronald L. Rivest
2003
conf/ccs
The blocker tag: selective blocking of RFID tags for consumer privacy.
Ari Juels
Ronald L. Rivest
Michael Szydlo
2003
conf/fc
Does Anyone Really Need MicroPayments?
Nicko van Someren
Andrew M. Odlyzko
Ronald L. Rivest
Tim Jones
Duncan Goldie-Scot
2002
conf/uss
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
Markus Jakobsson
Ari Juels
Ronald L. Rivest
2002
conf/crypto
Tweakable Block Ciphers.
Moses D. Liskov
Ronald L. Rivest
David A. Wagner
2002
conf/fc
Privacy Tradeoffs: Myth or Reality? Panel.
Rebecca N. Wright
L. Jean Camp
Ian Goldberg
Ronald L. Rivest
Graham Wood
2002
conf/ctrsa
Transitive Signature Schemes.
Silvio Micali
Ronald L. Rivest
2002
conf/ctrsa
Micropayments Revisited.
Silvio Micali
Ronald L. Rivest
2001
conf/fc
The Business of Electronic Voting.
Ed Gerck
C. Andrew Neff
Ronald L. Rivest
Aviel D. Rubin
Moti Yung
2001
conf/asiacrypt
How to Leak a Secret.
Ronald L. Rivest
Adi Shamir
Yael Tauman
1999
journals/joc
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer.
Mihir Bellare
Ronald L. Rivest
1999
conf/fse
Improved Analysis of Some Simplified Variants of RC6.
Scott Contini
Ronald L. Rivest
Matthew J. B. Robshaw
Yiqun Lisa Yin
1999
conf/sacrypt
Pseudonym Systems.
Anna Lysyanskaya
Ronald L. Rivest
Amit Sahai
Stefan Wolf
1998
conf/fse
On the Design and Security of RC2.
Lars R. Knudsen
Vincent Rijmen
Ronald L. Rivest
Matthew J. B. Robshaw
1998
conf/crypto
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich
Birgit Pfitzmann
Ronald L. Rivest
1998
conf/fc
Can We Eliminate Certificate Revocations Lists?
Ronald L. Rivest
1997
conf/fse
All-or-Nothing Encryption and the Package Transform.
Ronald L. Rivest
1997
conf/fc
Perspectives on Financial Cryptography.
Ronald L. Rivest
1997
conf/fc
Electronic Lottery Tickets as Micropayments.
Ronald L. Rivest
1994
conf/fse
The RC5 Encryption Algorithm.
Ronald L. Rivest
1991
conf/asiacrypt
On NIST's Proposed Digital Signature Standard.
Ronald L. Rivest
1991
conf/asiacrypt
Cryptography and Machine Learning.
Ronald L. Rivest
1990
conf/crypto
Finding Four Million Large Random Primes.
Ronald L. Rivest
1990
conf/crypto
The MD4 Message Digest Algorithm.
Ronald L. Rivest
1988
journals/joc
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
Burton S. Kaliski Jr.
Ronald L. Rivest
Alan T. Sherman
1985
conf/crypto
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
Burton S. Kaliski Jr.
Ronald L. Rivest
Alan T. Sherman
1985
conf/eurocrypt
Efficient Factoring Based on Partial Information.
Ronald L. Rivest
Adi Shamir
1985
conf/eurocrypt
Is the Data Encryption Standard a Group? (Preliminary Abstract).
Burton S. Kaliski Jr.
Ronald L. Rivest
Alan T. Sherman
1984
conf/crypto
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields.
Benny Chor
Ronald L. Rivest
1984
conf/crypto
A "Paradoxical'"Solution to the Signature Problem (Abstract).
Shafi Goldwasser
Silvio Micali
Ronald L. Rivest
1984
conf/eurocrypt
RSA Chips (Past/Present/Future).
Ronald L. Rivest
1982
conf/crypto
A Short Report on the RSA Chip.
Ronald L. Rivest
1982
conf/crypto
Randomized Encryption Techniques.
Ronald L. Rivest
Alan T. Sherman
Coauthors
Adam Sealfon
(1)
Adi Shamir
(3)
Alan T. Sherman
(8)
Aleksander Essex
(4)
Alina Oprea
(3)
Amit Sahai
(1)
Andrew C. Yao
(1)
Andrew M. Odlyzko
(1)
Anna Lysyanskaya
(1)
Ari Juels
(7)
Aviel D. Rubin
(2)
Bart Preneel
(1)
Benjamin Weinstein-Raun
(1)
Benny Chor
(1)
Birgit Pfitzmann
(1)
Burton S. Kaliski Jr.
(3)
C. Andrew Neff
(1)
Carsten Baum
(1)
Dana Gretton
(1)
Daniel Wichs
(1)
David A. Wagner
(2)
David Chaum
(5)
Donald G. Saari
(1)
Douglas W. Jones
(1)
Duncan Goldie-Scot
(1)
Ed Gerck
(1)
Emil Stefanov
(1)
Emily Shen
(7)
Francesca Sage-Ling
(1)
Graham Wood
(1)
Hoeteck Wee
(1)
Ian Goldberg
(1)
Ivan Bjerre Damgård
(1)
J. Alex Halderman
(1)
Javed A. Aslam
(2)
Jens Berlips
(1)
Jeremy Clark
(4)
John Conway
(1)
John G. Brainard
(1)
Kellie Ottoboni
(1)
Kevin D. Bowers
(1)
Kevin M. Esvelt
(1)
L. Jean Camp
(1)
Lars R. Knudsen
(1)
Lawrence Roy
(1)
Leonard Foner
(1)
Leonid Reyzin
(1)
Luca Trevisan
(1)
Lynn Van Hauwe
(1)
Madhu Sudan
(1)
Markus Jakobsson
(1)
Marten van Dijk
(3)
Martin Kysel
(1)
Matthew Bernhard
(1)
Matthew J. B. Robshaw
(2)
Mayuri Sridhar
(1)
Michael Szydlo
(2)
Mihir Bellare
(1)
Moses D. Liskov
(2)
Moti Yung
(2)
Nicko van Someren
(1)
Nikos Triandopoulos
(1)
Oded Goldreich
(1)
Olivier Pereira
(1)
Paul S. Herrnson
(1)
Peter Y. A. Ryan
(3)
Philip B. Stark
(2)
Poorvi L. Vora
(4)
Raluca A. Popa
(2)
Ran Canetti
(1)
Rebecca N. Wright
(1)
Richard Carback
(4)
Ronald L. Rivest
(57)
Salil P. Vadhan
(1)
Scott Contini
(1)
Shafi Goldwasser
(1)
Silvio Micali
(3)
Stefan Popoveniuc
(4)
Stefan Wolf
(1)
Stephen Wooster
(1)
Sunoo Park
(1)
Theia Vogel
(1)
Thomas R. Magrino
(1)
Tim Jones
(1)
Travis Mayberry
(1)
Vincent Rijmen
(1)
Vinod Vaikuntanathan
(1)
Walther Chen
(1)
Yael Tauman
(1)
Yevgeniy Dodis
(1)
Yiqun Lisa Yin
(1)
Yu Yu
(1)
Zara Perumal
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to