亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ronald l_ rivest publications.htm

?? 密碼學(xué)相應(yīng)問題的解決辦法都能夠在這個葉面上的連接找到解決辦法
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
?<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0051)http://theory.lcs.mit.edu/~rivest/publications.html -->
<HTML><HEAD><TITLE>Ronald L. Rivest: Publications</TITLE>
<META http-equiv=Content-Type content="text/html; charset=utf-8">
<META content="MSHTML 6.00.2900.2802" name=GENERATOR></HEAD>
<BODY bgColor=#ffffff>
<H1>Ronald L. Rivest: Publications and Talks</H1>This page under continual 
construction... 
<H2>List of Publications and Talks</H2>
<UL>
  <LI><A href="http://theory.lcs.mit.edu/~rivest/publications.tex">Publications 
  list.</A> A more-or-less complete list of my publications. Selected 
  publications, many available on-line, are listed below. 
  <P></P></LI></UL>
<H2>Cryptography and Security</H2>
<UL>
  <LI><EM>On Estimating the Size and Confidence of a Statistical 
  Audit</EM><BR>by Javed A. Aslam, Raluca A. Popa, and Ronald L. 
  Rivest.<BR>Unpublished draft. Version 4/22/2007. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AslamPopaRivest-OnEstimatingTheSizeAndConfidenceOfAStatisticalAudit.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On Auditing Elections When Precincts Have Different Sizes</EM><BR>by 
  Ronald L. Rivest.<BR>Unpublished draft. Version 3/18/2007. Comments 
  appreciated. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnAuditingElectionsWhenPrecinctsHaveDifferentSizes.pdf">pdf</A> 
<!--    <li><a href="pps/pps.py">(Corresponding Python code)</a>-->
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/pps/oh5votesonly.txt">(Dataset used 
    in experiment)</A> </LI></UL>
  <P></P>
  <LI><EM>The ThreeBallot Voting System.</EM><BR>by Ronald L. 
  Rivest.<BR>Unpublished draft. Version 10/1/06. Comments appreciated. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On Estimating the Size of a Statistical Audit</EM><BR>by Ronald L. 
  Rivest.<BR>Unpublished draft. Version 11/14/06.<BR>(Superseded by 
  Aslam/Popa/Rivest paper, above.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnEstimatingTheSizeOfAStatisticalAudit.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Scratch &amp; Vote---Self-contained Paper-based Cryptographic 
  Voting</EM><BR>by Ben Adida and Ronald L. Rivest.<BR><EM>Proceedings WPES 
  '06</EM> (Workshop on Privacy in the Electronic Society 2006). 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaRivest-ScratchAndVote.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaRivest-ScratchAndVote-slides.pdf">pdf 
    for Ben's slides</A> </LI></UL>
  <P></P>
  <LI><EM>Perspectives on Financial Cryptography (Revisited)</EM><BR>by Ronald 
  L. Rivest.<BR>Financial Cryptography '06 Conference Keynote. (Update of talk 
  given for Financial Cryptography '97) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PerspectivesOnFinancialCryptographyRevisited.ppt">PowerPoint 
    slides</A> </LI></UL>
  <P></P>
  <LI><EM>Preliminary Voting -- Prevoting</EM><BR>by Ronald L. Rivest<BR>(Draft, 
  to appear in larger report by CalTech/MIT Voting Technology Project.) August 
  6, 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PreliminaryVotingPrevoting.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Abelian square-free dithering for iterated hash functions</EM><BR>by 
  Ronald L. Rivest<BR>(draft; to appear). August 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDitheringForIteratedHashFunctions.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDitheringForIteratedHashFunctions.ppt">ppt</A> 
    (Presented at ECrypt Hash Function Workshop, June 21, 2005, Cracow). 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDithering.c">Freeware 
    C code for generating dither sequence.</A> </LI></UL>
  <P></P>
  <LI><EM>Lightweight Encryption for Email</EM><BR>by Ben Adida, Susan 
  Hohenberger, and Ronald L. Rivest<BR>USENIX Steps to Reducing Unwanted Traffic 
  on the Internet Workshop (SRUTI), July 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaHohenbergerRivest-LightweightEncryptionForEmail.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Lightweight Email Signatures</EM><BR>by Ben Adida, David Chau, Susan 
  Hohenberger, and Ronald L. Rivest<BR>(Revised; a preliminary version was 
  presented at the DIMACS Workshop on Theft in E-Commerce, April 2005.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaChauHohenbergerRivest-LightweightSignaturesForEmail.pdf">pdf</A> 
    (early version) 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaChauHohenbergerRivest-LightweightEmailSignatures.pdf">pdf</A> 
    (latest version 2/1/2006) </LI></UL>
  <P></P>
  <LI><EM>Ad-Hoc-Group Signatures from Hijacked Keypairs</EM><BR>by Ben Adida, 
  Susan Hohenberger, and Ronald L. Rivest<BR>(Revised; a preliminary version was 
  presented at the DIMACS Workshop on Theft in E-Commerce, April 2005.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaHohenbergerRivest-AdHocGroupSignaturesFromHijackedKeypairs.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Talk given at NSA, 
  June 3, 2004.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-06-03%20NSA%20talk%20electronic%20voting.ppt">Powerpoint</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Remarks on Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Text of 
  remarks at the Harvard Kennedy School of Governmment Digital Voting Symposium, 
  June 1, 2004.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-06-01%20Harvard%20KSG%20Symposium%20Evoting%20remarks.txt">text 
    </A></LI></UL>
  <P></P>
  <LI><EM>Some Thoughts on Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Talk 
  given May 26, 2004 at DIMACS Workshop on Electronic Voting.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-05-26%20DIMACS%20voting%20talk.ppt">Powerpoint</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Peppercoin Micropayments</EM><BR>by Ronald L. Rivest<BR>February 9, 
  2004. Proceedings Financial Cryptography '04. (ed. Ari Juels)<BR>Lecture Notes 
  in Computer Science, Vol. 3110. (Springer, 2004), 2--8. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.ppt">Powerpoint 
    slides from FC'04</A> </LI></UL>
  <P></P>
  <LI><EM>On Permutation Operations in Cipher Design</EM><BR>by Ruby B. Lee, Z. 
  J. Shi, Y. L. Yin, Ronald L. Rivest, and M. J. B. Robshaw.<BR>January 24, 
  2004. To appear in Proceedings ITCC 2004.<BR>A version has appeared under the 
  title <EM>Permutation Operations in Block Ciphers</EM><BR>in: EMBEDDED 
  CRYPTOGRAPHIC HARDWARE: - 2004 DESIGN AND SECURITY. (Nova, 2004). 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On The Notion of Pseudo-Free Groups</EM><BR>by Ronald L. 
  Rivest.<BR>Proceedings TCC 2004 (Copyright IACR.) (Ed. Moni Naor) 
  Springer-Verlag Lecture Notes in Computer Science No. 2951. Pages 505--521. 
  <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnTheNotionOfPseudo-FreeGroups.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnTheNotionOfPseudo-FreeGroups.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-TCC04-PseudoFreeGroups.ppt">Powerpoint 
    slides from TCC 2004</A> </LI></UL>
  <P></P>
  <LI><EM>RSA Problem</EM><BR>by Ronald L. Rivest and Burt Kaliski.<BR>December 
  10, 2003. (To appear in Encyclopedia of Cryptography and Security 
  (Kluwer).)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>2002 ACM A. M. Turing Award Lectures</EM><BR>by Leonard Adleman, 
  Ronald L. Rivest, and Adi Shamir.<BR>Given June 8, 2003 at FCRC in San Diego, 
  California.<BR>
  <UL>
    <LI><A 
    href="http://www.acm.org/awards/turing_citations/rivest-shamir-adleman.html">ACM 
    posting of videos of lectures</A> </LI></UL>
  <P></P>
  <LI><EM>The Blocker Tag: Selective Blocking of RFID Tags for Consumer 
  Privacy</EM><BR>by Ari Juels, Ronald L. Rivest, and Michael Szydlo.<BR>May 16, 
  2003. (To appear in Proceedings 10th Annual ACM CCS 2003.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/JuelsRivestSzydlo-TheBlockerTag.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Does Anyone Really Need Micropayments?</EM><BR>by Nicko van Someren, 
  Andrew Odlyzko, Ronald L. Rivest, Tim Jones, and Duncan Goldie-Scot.<BR>in 
  <EM>Proceedings Financial Cryptography 2003</EM> (ed. Rebecca 
  Wright)<BR>Lecture Notes in Computer Science, Vol. 2742 (Springer 2003), 
  69--76.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/VanSomerenOdlyzkoRivestJonesGoldieScot-DoesAnyoneReallyNeedMicropayments.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Micropayments Revisited</EM><BR>by Silvio Micali and Ronald L. 
  Rivest.<BR>(Proceedings of the Cryptographer's Track at the RSA Conference 
  2002, Bart Preneel (ed.), Springer Verlag CT-RSA 2002, LNCS 2271, pages 
  149--163.) <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.ppt">RSA 
    '02 powerpoint slides</A> 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-PeppercornMicropaymentsViaBetterLotteryTickets.ppt">FC 
    '02 powerpoint slides ("Peppercorn Micropayments via Better Lottery 
    Tickets", rump session talk)</A> </LI></UL>
  <P></P>
  <LI><EM>The Untrusted Computer Problem and Camera-Based 
  Authentication,</EM><BR>by D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. 
  van Dijk, S. Devadas, and R. L. Rivest.<BR><EM>Lecture Notes in Computer 
  Science 2414, Proceedings of the International Conference on Pervasive 
  Computing (Pervasive2002)</EM>, pages 114-124, August 2002.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ClarkeGassendKotwalBurnsideVanDijkDevadasRivest-TheUntrustedComputerProblemAndCameraBasedAuthentication.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Access-Controlled Resource Discovery for Pervasive 
  Networks,</EM><BR>by S. Raman, D. Clarke, M. Burnside, S. Devadas and R. L. 
  Rivest.<BR><EM>Proceedings of the 18th ACM Symposium on Applied Computing 
  (Security Track)</EM>, March 2003.<BR>(Also appeared in <EM>Concurrency and 
  Computation: Practice and Experience</EM> 2004: 16: pages 1099--1120.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RamanClarkeBurnsideDevadasRivest-AccessControlledResourceDiscoveryForPervasiveNetworks.ps">ps</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RamanClarkeBurnsideDevadasRivest-AccessControlledResourceDiscoveryForPervasiveNetworks.pdf">pdf</A> 
    </LI></UL>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品黄色片免费大全| av男人天堂一区| 欧美一卡二卡在线| 免费精品视频在线| 日韩欧美久久久| 国产一区在线不卡| 国产亚洲欧美在线| 国产传媒日韩欧美成人| 亚洲图片你懂的| 欧美在线你懂的| 美女在线视频一区| 久久精品男人天堂av| 成人激情电影免费在线观看| 国产精品久久精品日日| 欧美综合欧美视频| 久久精品国产第一区二区三区| 久久亚洲精精品中文字幕早川悠里| 国产成人免费高清| 亚洲精品一二三| 欧美一区二区黄色| 丰满少妇在线播放bd日韩电影| 亚洲图片激情小说| 欧美成人艳星乳罩| 成人av片在线观看| 亚洲高清不卡在线| 久久精品免费在线观看| 在线观看欧美日本| 精品一二三四区| 亚洲色大成网站www久久九九| 欧美猛男男办公室激情| 国产精品66部| 亚洲一区二区三区在线播放| 精品va天堂亚洲国产| 91麻豆精品视频| 久久国内精品视频| 亚洲伦理在线免费看| 日韩欧美精品在线视频| 99在线视频精品| 麻豆免费精品视频| 亚洲精品久久7777| 久久网这里都是精品| 91精品办公室少妇高潮对白| 免费看日韩a级影片| 中文字幕佐山爱一区二区免费| 日韩美女主播在线视频一区二区三区| av成人免费在线| 国产曰批免费观看久久久| 亚洲综合久久久久| 国产精品不卡一区| 日韩视频免费观看高清完整版 | 一本大道久久精品懂色aⅴ| 麻豆精品久久久| 亚洲激情在线播放| 中文一区一区三区高中清不卡| 欧美一级免费大片| 欧美性淫爽ww久久久久无| 懂色av中文字幕一区二区三区| 青娱乐精品在线视频| 亚洲综合在线五月| 中文字幕亚洲欧美在线不卡| 欧美精品一区二区不卡 | 国产在线播放一区二区三区| 婷婷中文字幕综合| 亚洲精品亚洲人成人网| 国产精品每日更新在线播放网址 | 日韩欧美国产一区在线观看| 欧美三级午夜理伦三级中视频| 成人一级片在线观看| 国产乱色国产精品免费视频| 日本不卡不码高清免费观看 | 亚洲第一久久影院| 亚洲激情图片一区| 自拍视频在线观看一区二区| 国产精品久久一级| 椎名由奈av一区二区三区| 中文av一区特黄| 国产精品区一区二区三区| 国产农村妇女毛片精品久久麻豆 | 美女mm1313爽爽久久久蜜臀| 性久久久久久久| 亚洲高清不卡在线| 午夜激情一区二区三区| 日韩和欧美的一区| 青青草国产成人av片免费| 日本va欧美va精品发布| 日韩黄色免费电影| 精品一区二区三区免费毛片爱| 美腿丝袜亚洲综合| 日韩不卡一二三区| 美女高潮久久久| 国产美女一区二区| 成人黄色片在线观看| 成人免费高清在线| 99视频在线精品| 99久久精品情趣| 在线免费观看日韩欧美| 国产一本一道久久香蕉| 国产精品久久久爽爽爽麻豆色哟哟| 欧美乱妇20p| 91麻豆视频网站| 欧美日韩高清一区二区不卡| 欧美日韩精品一区二区三区| 欧美一级夜夜爽| 精品成人佐山爱一区二区| www欧美成人18+| 国产精品久久综合| 亚洲第一福利视频在线| 麻豆成人av在线| 国产精品自拍av| 91色九色蝌蚪| 欧美剧在线免费观看网站| 久久一留热品黄| 一个色在线综合| 国产一区亚洲一区| 91麻豆国产福利在线观看| 91麻豆精品91久久久久久清纯| 久久综合久久鬼色中文字| 亚洲欧美日韩综合aⅴ视频| 日本免费在线视频不卡一不卡二| 国产精品99久久久久久宅男| 色成年激情久久综合| 日韩视频在线你懂得| 亚洲三级电影全部在线观看高清| 日韩国产欧美在线视频| 成人av电影在线观看| 欧美久久久一区| 国产精品视频免费看| 三级久久三级久久久| 97aⅴ精品视频一二三区| 欧美变态tickling挠脚心| 亚洲黄色在线视频| 国产精品一区二区久久不卡| 欧美色图一区二区三区| 国产亚洲短视频| 日韩精品久久理论片| 91老司机福利 在线| 久久久久99精品一区| 亚洲成a人片在线观看中文| 成人午夜碰碰视频| 精品少妇一区二区三区 | 国产精品国产三级国产aⅴ无密码| 午夜激情久久久| 91捆绑美女网站| 久久久久久日产精品| 秋霞成人午夜伦在线观看| 色综合天天综合网天天狠天天 | 国产又黄又大久久| 欧美日韩小视频| 中文字幕一区在线| 国产精品亚洲一区二区三区在线| 欧美日韩性生活| 一片黄亚洲嫩模| 99久久久久免费精品国产| 中文一区二区完整视频在线观看| 久久99国产精品尤物| 717成人午夜免费福利电影| 亚洲精品一二三区| aaa亚洲精品| 国产精品麻豆一区二区| 国产.精品.日韩.另类.中文.在线.播放| 日韩欧美自拍偷拍| 日韩电影免费一区| 欧美日韩高清一区二区不卡| 亚洲电影视频在线| 欧美无砖砖区免费| 一区二区三区 在线观看视频| 色哟哟一区二区三区| 一区二区在线观看av| 欧美午夜电影在线播放| 午夜精品爽啪视频| 欧美日韩欧美一区二区| 午夜欧美2019年伦理| 欧美日本一区二区在线观看| 午夜日韩在线观看| 欧美色国产精品| 日本亚洲欧美天堂免费| 日韩一区二区在线免费观看| 五月婷婷综合激情| 4438成人网| 极品瑜伽女神91| 国产清纯白嫩初高生在线观看91 | 欧美大片一区二区| 久久99精品国产91久久来源| 日韩三级高清在线| 国产一区二区主播在线| 亚洲精品一区在线观看| 国产成人夜色高潮福利影视| 中文字幕精品一区二区精品绿巨人 | 91精品国产麻豆| 麻豆国产精品777777在线| 久久久不卡网国产精品一区| 福利视频网站一区二区三区| 中文字幕日韩av资源站| 欧美三级视频在线播放| 美女爽到高潮91| 国产嫩草影院久久久久| 在线精品观看国产| 美腿丝袜亚洲色图| 国产精品久久三| 欧美老女人第四色|