Search

Your search keyword '"Rivest, Ronald L."' showing total 685 results

Search Constraints

Start Over You searched for: Author "Rivest, Ronald L." Remove constraint Author: "Rivest, Ronald L."
685 results on '"Rivest, Ronald L."'

Search Results

1. A system capable of verifiably and privately screening global DNA synthesis

2. Bugs in our Pockets: The Risks of Client-Side Scanning

3. Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections

4. A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods

5. Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits

6. $k$-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits

7. Consistent Sampling with Replacement

8. Bayesian Tabulation Audits: Explained and Extended

9. Leading the field: Fortune favors the bold in Thurstonian choice models

10. Public Evidence from Secret Ballots

11. ClipAudit: A Simple Risk-Limiting Post-Election Audit

12. Random adversarial threshold search enables automated DNA screening

13. Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits

14. k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits

15. Optimality of Correlated Sampling Strategies

16. Auditing Australian Senate Ballots

17. An IBE-based Signcryption Scheme for Group Key Management

18. Time-Space Trade-offs in Population Protocols

19. DiffSum - A Simple Post-Election Risk-Limiting Audit

20. Leading the field: Fortune favors the bold in Thurstonian choice models

22. Picture-Hanging Puzzles

26. Marked Mix-Nets

27. BatchVote: Voting Rules Designed for Auditability

29. Tweakable block ciphers

30. On Playing Well in a Sum of Games

31. Algorithms for Integrated Circuit Layout: An Analytic Approach

32. Access-Controlled Resource Discovery for Pervasive Networks

34. Routing the Power and Ground Wires on a VLSI Chip

35. The Mutual Exclusion Problem for Unreliable Processes

36. An Application of Number Theory to the Organization of Raster Graphics Memory

37. Optimal Arrangement of Keys in a Hash Table

39. On Triangulations of a Set of Points in the Plane

40. Time-lock Puzzles and Timed-release Crypto

41. Efficient Methods for Calculating Maximum Entropy Distributions

42. K+1 Heads are Better Than K

45. Improved Bounds on the Costs of Optimal and Balanced Binary Search Trees

46. Noise Tolerant Algorithms for Learning and Searching

47. The MD4 Message Digest Algorithm

48. Metal Poker

49. The Complexity of the Maximum Network Flow Problem

50. A Method for Obtaining Digital Signatures and Public-key Cryptosystems

Catalog

Books, media, physical & digital resources