亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ronald l_ rivest publications.htm

?? 密碼學相應問題的解決辦法都能夠在這個葉面上的連接找到解決辦法
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
?<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0051)http://theory.lcs.mit.edu/~rivest/publications.html -->
<HTML><HEAD><TITLE>Ronald L. Rivest: Publications</TITLE>
<META http-equiv=Content-Type content="text/html; charset=utf-8">
<META content="MSHTML 6.00.2900.2802" name=GENERATOR></HEAD>
<BODY bgColor=#ffffff>
<H1>Ronald L. Rivest: Publications and Talks</H1>This page under continual 
construction... 
<H2>List of Publications and Talks</H2>
<UL>
  <LI><A href="http://theory.lcs.mit.edu/~rivest/publications.tex">Publications 
  list.</A> A more-or-less complete list of my publications. Selected 
  publications, many available on-line, are listed below. 
  <P></P></LI></UL>
<H2>Cryptography and Security</H2>
<UL>
  <LI><EM>On Estimating the Size and Confidence of a Statistical 
  Audit</EM><BR>by Javed A. Aslam, Raluca A. Popa, and Ronald L. 
  Rivest.<BR>Unpublished draft. Version 4/22/2007. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AslamPopaRivest-OnEstimatingTheSizeAndConfidenceOfAStatisticalAudit.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On Auditing Elections When Precincts Have Different Sizes</EM><BR>by 
  Ronald L. Rivest.<BR>Unpublished draft. Version 3/18/2007. Comments 
  appreciated. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnAuditingElectionsWhenPrecinctsHaveDifferentSizes.pdf">pdf</A> 
<!--    <li><a href="pps/pps.py">(Corresponding Python code)</a>-->
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/pps/oh5votesonly.txt">(Dataset used 
    in experiment)</A> </LI></UL>
  <P></P>
  <LI><EM>The ThreeBallot Voting System.</EM><BR>by Ronald L. 
  Rivest.<BR>Unpublished draft. Version 10/1/06. Comments appreciated. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-TheThreeBallotVotingSystem.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On Estimating the Size of a Statistical Audit</EM><BR>by Ronald L. 
  Rivest.<BR>Unpublished draft. Version 11/14/06.<BR>(Superseded by 
  Aslam/Popa/Rivest paper, above.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnEstimatingTheSizeOfAStatisticalAudit.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Scratch &amp; Vote---Self-contained Paper-based Cryptographic 
  Voting</EM><BR>by Ben Adida and Ronald L. Rivest.<BR><EM>Proceedings WPES 
  '06</EM> (Workshop on Privacy in the Electronic Society 2006). 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaRivest-ScratchAndVote.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaRivest-ScratchAndVote-slides.pdf">pdf 
    for Ben's slides</A> </LI></UL>
  <P></P>
  <LI><EM>Perspectives on Financial Cryptography (Revisited)</EM><BR>by Ronald 
  L. Rivest.<BR>Financial Cryptography '06 Conference Keynote. (Update of talk 
  given for Financial Cryptography '97) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PerspectivesOnFinancialCryptographyRevisited.ppt">PowerPoint 
    slides</A> </LI></UL>
  <P></P>
  <LI><EM>Preliminary Voting -- Prevoting</EM><BR>by Ronald L. Rivest<BR>(Draft, 
  to appear in larger report by CalTech/MIT Voting Technology Project.) August 
  6, 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PreliminaryVotingPrevoting.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Abelian square-free dithering for iterated hash functions</EM><BR>by 
  Ronald L. Rivest<BR>(draft; to appear). August 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDitheringForIteratedHashFunctions.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDitheringForIteratedHashFunctions.ppt">ppt</A> 
    (Presented at ECrypt Hash Function Workshop, June 21, 2005, Cracow). 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-AbelianSquareFreeDithering.c">Freeware 
    C code for generating dither sequence.</A> </LI></UL>
  <P></P>
  <LI><EM>Lightweight Encryption for Email</EM><BR>by Ben Adida, Susan 
  Hohenberger, and Ronald L. Rivest<BR>USENIX Steps to Reducing Unwanted Traffic 
  on the Internet Workshop (SRUTI), July 2005. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaHohenbergerRivest-LightweightEncryptionForEmail.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Lightweight Email Signatures</EM><BR>by Ben Adida, David Chau, Susan 
  Hohenberger, and Ronald L. Rivest<BR>(Revised; a preliminary version was 
  presented at the DIMACS Workshop on Theft in E-Commerce, April 2005.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaChauHohenbergerRivest-LightweightSignaturesForEmail.pdf">pdf</A> 
    (early version) 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaChauHohenbergerRivest-LightweightEmailSignatures.pdf">pdf</A> 
    (latest version 2/1/2006) </LI></UL>
  <P></P>
  <LI><EM>Ad-Hoc-Group Signatures from Hijacked Keypairs</EM><BR>by Ben Adida, 
  Susan Hohenberger, and Ronald L. Rivest<BR>(Revised; a preliminary version was 
  presented at the DIMACS Workshop on Theft in E-Commerce, April 2005.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AdidaHohenbergerRivest-AdHocGroupSignaturesFromHijackedKeypairs.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Talk given at NSA, 
  June 3, 2004.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-06-03%20NSA%20talk%20electronic%20voting.ppt">Powerpoint</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Remarks on Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Text of 
  remarks at the Harvard Kennedy School of Governmment Digital Voting Symposium, 
  June 1, 2004.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-06-01%20Harvard%20KSG%20Symposium%20Evoting%20remarks.txt">text 
    </A></LI></UL>
  <P></P>
  <LI><EM>Some Thoughts on Electronic Voting</EM><BR>by Ronald L. Rivest<BR>Talk 
  given May 26, 2004 at DIMACS Workshop on Electronic Voting.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/2004-05-26%20DIMACS%20voting%20talk.ppt">Powerpoint</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Peppercoin Micropayments</EM><BR>by Ronald L. Rivest<BR>February 9, 
  2004. Proceedings Financial Cryptography '04. (ed. Ari Juels)<BR>Lecture Notes 
  in Computer Science, Vol. 3110. (Springer, 2004), 2--8. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PeppercoinMicropayments.ppt">Powerpoint 
    slides from FC'04</A> </LI></UL>
  <P></P>
  <LI><EM>On Permutation Operations in Cipher Design</EM><BR>by Ruby B. Lee, Z. 
  J. Shi, Y. L. Yin, Ronald L. Rivest, and M. J. B. Robshaw.<BR>January 24, 
  2004. To appear in Proceedings ITCC 2004.<BR>A version has appeared under the 
  title <EM>Permutation Operations in Block Ciphers</EM><BR>in: EMBEDDED 
  CRYPTOGRAPHIC HARDWARE: - 2004 DESIGN AND SECURITY. (Nova, 2004). 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On The Notion of Pseudo-Free Groups</EM><BR>by Ronald L. 
  Rivest.<BR>Proceedings TCC 2004 (Copyright IACR.) (Ed. Moni Naor) 
  Springer-Verlag Lecture Notes in Computer Science No. 2951. Pages 505--521. 
  <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnTheNotionOfPseudo-FreeGroups.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OnTheNotionOfPseudo-FreeGroups.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-TCC04-PseudoFreeGroups.ppt">Powerpoint 
    slides from TCC 2004</A> </LI></UL>
  <P></P>
  <LI><EM>RSA Problem</EM><BR>by Ronald L. Rivest and Burt Kaliski.<BR>December 
  10, 2003. (To appear in Encyclopedia of Cryptography and Security 
  (Kluwer).)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>2002 ACM A. M. Turing Award Lectures</EM><BR>by Leonard Adleman, 
  Ronald L. Rivest, and Adi Shamir.<BR>Given June 8, 2003 at FCRC in San Diego, 
  California.<BR>
  <UL>
    <LI><A 
    href="http://www.acm.org/awards/turing_citations/rivest-shamir-adleman.html">ACM 
    posting of videos of lectures</A> </LI></UL>
  <P></P>
  <LI><EM>The Blocker Tag: Selective Blocking of RFID Tags for Consumer 
  Privacy</EM><BR>by Ari Juels, Ronald L. Rivest, and Michael Szydlo.<BR>May 16, 
  2003. (To appear in Proceedings 10th Annual ACM CCS 2003.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/JuelsRivestSzydlo-TheBlockerTag.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Does Anyone Really Need Micropayments?</EM><BR>by Nicko van Someren, 
  Andrew Odlyzko, Ronald L. Rivest, Tim Jones, and Duncan Goldie-Scot.<BR>in 
  <EM>Proceedings Financial Cryptography 2003</EM> (ed. Rebecca 
  Wright)<BR>Lecture Notes in Computer Science, Vol. 2742 (Springer 2003), 
  69--76.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/VanSomerenOdlyzkoRivestJonesGoldieScot-DoesAnyoneReallyNeedMicropayments.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Micropayments Revisited</EM><BR>by Silvio Micali and Ronald L. 
  Rivest.<BR>(Proceedings of the Cryptographer's Track at the RSA Conference 
  2002, Bart Preneel (ed.), Springer Verlag CT-RSA 2002, LNCS 2271, pages 
  149--163.) <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-MicropaymentsRevisited.ppt">RSA 
    '02 powerpoint slides</A> 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-PeppercornMicropaymentsViaBetterLotteryTickets.ppt">FC 
    '02 powerpoint slides ("Peppercorn Micropayments via Better Lottery 
    Tickets", rump session talk)</A> </LI></UL>
  <P></P>
  <LI><EM>The Untrusted Computer Problem and Camera-Based 
  Authentication,</EM><BR>by D. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. 
  van Dijk, S. Devadas, and R. L. Rivest.<BR><EM>Lecture Notes in Computer 
  Science 2414, Proceedings of the International Conference on Pervasive 
  Computing (Pervasive2002)</EM>, pages 114-124, August 2002.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ClarkeGassendKotwalBurnsideVanDijkDevadasRivest-TheUntrustedComputerProblemAndCameraBasedAuthentication.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Access-Controlled Resource Discovery for Pervasive 
  Networks,</EM><BR>by S. Raman, D. Clarke, M. Burnside, S. Devadas and R. L. 
  Rivest.<BR><EM>Proceedings of the 18th ACM Symposium on Applied Computing 
  (Security Track)</EM>, March 2003.<BR>(Also appeared in <EM>Concurrency and 
  Computation: Practice and Experience</EM> 2004: 16: pages 1099--1120.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RamanClarkeBurnsideDevadasRivest-AccessControlledResourceDiscoveryForPervasiveNetworks.ps">ps</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RamanClarkeBurnsideDevadasRivest-AccessControlledResourceDiscoveryForPervasiveNetworks.pdf">pdf</A> 
    </LI></UL>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人性生交大合| 国产精品久久午夜夜伦鲁鲁| www精品美女久久久tv| 亚洲视频电影在线| 久久不见久久见中文字幕免费| 成人禁用看黄a在线| 日韩欧美一区二区久久婷婷| 夜夜嗨av一区二区三区四季av| 国产成人av影院| 欧美成人一区二区| 日韩精品一级二级| 欧美性猛片aaaaaaa做受| 国产色产综合产在线视频| 日韩va亚洲va欧美va久久| 在线国产电影不卡| 亚洲欧洲精品一区二区精品久久久| 国产一区二区调教| 337p粉嫩大胆噜噜噜噜噜91av| 午夜久久福利影院| 欧美精品一卡二卡| 亚洲成人激情社区| 欧日韩精品视频| 亚洲精品伦理在线| 色婷婷亚洲综合| 亚洲精品欧美激情| 欧美一a一片一级一片| 亚洲一区二区三区在线看| 色欧美片视频在线观看在线视频| 国产精品灌醉下药二区| 99re成人精品视频| 亚洲婷婷国产精品电影人久久| 99精品久久免费看蜜臀剧情介绍| 国产精品三级电影| 国产成人精品亚洲午夜麻豆| 国产日产欧产精品推荐色 | 久久久精品综合| 国产一区在线观看视频| 精品国产乱码久久久久久图片| 紧缚捆绑精品一区二区| 久久综合久久综合久久| 国产精品一级黄| 日本一区二区三区dvd视频在线| 国产成人午夜视频| 亚洲色图一区二区三区| 欧美在线free| 伦理电影国产精品| 国产日韩av一区| 99久久久免费精品国产一区二区 | 精品动漫一区二区三区在线观看 | 婷婷久久综合九色综合绿巨人| 欧美妇女性影城| 精品亚洲免费视频| 国产精品视频免费| 91国偷自产一区二区开放时间| 亚洲v日本v欧美v久久精品| 欧美一区二区三区公司| 国产在线不卡视频| 亚洲精品久久久久久国产精华液| 欧美日韩高清影院| 国产一区二区三区免费看| 亚洲欧美日韩人成在线播放| 91精品国模一区二区三区| 国产精品一区一区三区| 亚洲综合一区在线| 2023国产精品视频| 欧洲一区二区三区在线| 精品一区二区在线视频| 亚洲精品日韩综合观看成人91| 欧美一级电影网站| 91久久香蕉国产日韩欧美9色| 免费成人av在线| **欧美大码日韩| 欧美成人精品福利| 欧美性猛交xxxx乱大交退制版 | 国产日韩欧美a| 欧洲精品一区二区| 国产盗摄一区二区| 青青青爽久久午夜综合久久午夜 | 色香蕉久久蜜桃| 国内精品嫩模私拍在线| 亚洲成年人网站在线观看| 国产欧美1区2区3区| 制服.丝袜.亚洲.中文.综合| av不卡在线播放| 国产精品69久久久久水密桃 | 亚洲精品欧美激情| 国产片一区二区| 日韩欧美一区二区久久婷婷| 91国产成人在线| 成人福利视频网站| 久久99久久99精品免视看婷婷| 亚洲久本草在线中文字幕| 久久久久成人黄色影片| 欧美一区二区三级| 欧美三级视频在线| 色婷婷综合久久久久中文 | 播五月开心婷婷综合| 精品在线观看免费| 免费看黄色91| 天堂在线一区二区| 亚洲成人av电影| 亚洲乱码中文字幕综合| 国产精品视频免费看| 国产清纯美女被跳蛋高潮一区二区久久w| 欧美久久久久免费| 欧美日韩成人一区二区| 欧美色精品天天在线观看视频| 99久久精品情趣| 99久久777色| 成人短视频下载| 99re热视频这里只精品| 99精品欧美一区| 色999日韩国产欧美一区二区| 91丝袜呻吟高潮美腿白嫩在线观看| 国产成人免费网站| 成人高清在线视频| 91美女片黄在线观看91美女| 91色.com| 欧美日韩久久久久久| 91精品国产色综合久久不卡电影 | 99久久国产综合色|国产精品| 成人免费黄色在线| 99久久婷婷国产精品综合| 91在线一区二区三区| 91国偷自产一区二区三区观看| 欧美性xxxxx极品少妇| 欧美日韩你懂得| 日韩一区二区电影| 亚洲日本成人在线观看| 亚洲人快播电影网| 亚洲一区二区三区三| 日日夜夜免费精品视频| 久88久久88久久久| 成人涩涩免费视频| 色哟哟一区二区在线观看| 欧美日韩国产一区二区三区地区| 777xxx欧美| 国产欧美日产一区| 亚洲综合激情网| 蜜桃精品在线观看| 成人h动漫精品| 欧美日韩一区久久| 久久久www成人免费毛片麻豆 | 久久久久久免费| 亚洲欧洲精品天堂一级| 亚洲午夜三级在线| 国产精品一区二区果冻传媒| 色婷婷综合在线| xf在线a精品一区二区视频网站| 国产精品网站在线| 奇米影视一区二区三区小说| 成人午夜在线免费| 欧美日韩色一区| 国产精品欧美久久久久一区二区| 亚洲一区二区三区免费视频| 国产真实乱子伦精品视频| 91丝袜高跟美女视频| 日韩精品一区二区三区视频播放 | 成人免费va视频| 欧美日韩国产大片| 国产精品久久久久久久久动漫| 同产精品九九九| 99免费精品在线| 精品国产免费久久| 性欧美大战久久久久久久久| 国产精品99久久久久久久女警 | 亚洲欧洲日产国产综合网| 日本午夜一本久久久综合| 99久久精品免费看| 久久久久久久综合| 日韩av午夜在线观看| 一本到一区二区三区| 欧美精品一区二区三区高清aⅴ| 亚洲va在线va天堂| 99re这里都是精品| 欧美国产视频在线| 精品一区二区三区视频| 欧美三级韩国三级日本三斤| 国产精品久久久久影视| 国产一区视频在线看| 日韩一区二区在线观看| 亚洲成人激情自拍| 91福利在线播放| 有坂深雪av一区二区精品| 波多野结衣的一区二区三区| 久久精品一区蜜桃臀影院| 麻豆精品久久精品色综合| 欧美人xxxx| 午夜精品久久久久久| 欧美午夜不卡在线观看免费| 国产精品久久毛片| voyeur盗摄精品| 国产精品国产a| 91丝袜美腿高跟国产极品老师| 国产精品沙发午睡系列990531| 国产美女精品一区二区三区| 精品国产制服丝袜高跟| 激情小说欧美图片| 国产午夜亚洲精品理论片色戒 | 18欧美乱大交hd1984|