亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ronald l_ rivest publications.htm

?? 密碼學相應問題的解決辦法都能夠在這個葉面上的連接找到解決辦法
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
  <P></P>
  <LI><EM>Tweakable Block Ciphers</EM><BR>by Moses Liskov, Ronald L. Rivest, and 
  David Wagner.<BR><EM>Proceedings CRYPTO 2002</EM> (Springer-Verlag, Lecture 
  Notes in Computer Science No. 2442, Moti Yung(ed.), 2002), pages 31--46. <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/LiskovRivestWagner-TweakableBlockCiphers.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/LiskovRivestWagner-TweakableBlockCiphers.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Making Mix Nets Robust for Electronic Voting by Randomized Partial 
  Checking</EM><BR>by Markus Jakobsson, Ari Juels, and Ronald L. Rivest.<BR>In 
  D. Boneh, ed., USENIX Security '02, pp. 339-353. 2002.<BR>(Also available as 
  IACR eprint 2002/025.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/JakobssonJuelsRivest-MakingMixNetsRobustForElectronicVotingByRandomizedPartialChecking.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Proxy-Based Security Protocols in Networked Mobile Devices</EM><BR>by 
  M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, and R. 
  Rivest.<BR>Proceedings of the 17th ACM Symposium on Applied Computing 
  (Security Track), pages 265-272, March 2002.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BurnsideClarkeMillsMaywahDevadasRivest-ProxyBasedSecurityProtocolsInNetworkedMobileDevices.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BurnsideClarkeMillsMaywahDevadasRivest-ProxyBasedSecurityProtocolsInNetworkedMobileDevices.pdf">pdf</A>. 
    </LI></UL>
  <P></P>
  <LI><EM>A Modular Voting Architecture (``Frogs'')</EM><BR>by Shuki Bruck, 
  David Jefferson, and Ronald L. Rivest.<BR>
  <UL>
    <LI>Paper in <A 
    href="http://theory.lcs.mit.edu/~rivest/BruckJeffersonRivest-AModularVotingArchitecture.doc">word</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BruckJeffersonRivest-AModularVotingArchitecture-doc.pdf">pdf</A> 

    <LI>Slides from presentation at WOTE '01 in <A 
    href="http://theory.lcs.mit.edu/~rivest/BruckJeffersonRivest-AModularVotingArchitecture.ppt">powerpoint</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BruckJeffersonRivest-AModularVotingArchitecture-ppt.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Voting---What is, What Could Be<BR>(July 2001 Report of the 
  CalTech-MIT Voting Technology Project)</EM> 
  <UL>
    <LI><A href="http://www.vote.caltech.edu/reports/2001report.htm">CalTechMIT 
    VTP Web Site for this Report</A> 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/CalTechMITVTP-VotingWhatIsWhatCouldBe.pdf">pdf 
    copy</A> 
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CalTechMITVotingReportPressConferenceRemarks.txt">My 
    remarks at the July 16, 2001 press conference.</A> </LI></UL>
  <P></P>
  <LI><EM>How to Leak A Secret</EM><BR>by Ronald L. Rivest, Adi Shamir, and Yael 
  Tauman.<BR>ASIACRYPT 2001, pages 552--565. Lecture Notes in Computer Science 
  (ed. Colin Boyd), Volume 2248 (Springer). 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamirTauman-HowToLeakASecret.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamirTauman-HowToLeakASecret.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Testimony on Security Issues in Voting Technology</EM><BR>(Testimony 
  given before the U.S. House Committee on Administration, May 24, 2001.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/rivest-may-24-01-testimony.txt">text</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/rivest-may-24-01-testimony.doc">Word</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Electronic Voting</EM><BR>(Slides for talk given for Cambridge Club at 
  Harvard Faculty Club, March 5, 2001.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting-2.ppt">ppt</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting-2-ppt.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Electronic Voting</EM><BR>(Corresponds to my remarks at a panel 
  discussion at Financial Cryptography '01, 2/19--2/22.)<BR>(To appear in the 
  Proceedings of Financial Cryptography '01.)<BR>
  <UL>
    <LI>Paper: <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting.pdf">pdf</A> 

    <LI>Slides for talk: <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting.ppt">ppt</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-ElectronicVoting-ppt.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Issues in Cryptography</EM><BR>Short luncheon talk given March 7, 2001 
  at Computers, Freedom, and Privacy 2001 Conference.<BR>
  <UL>
    <LI>Slides: <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-IssuesInCryptography.ppt">powerpoint</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-IssuesInCryptography.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Certificate Chain Discovery in SPKI/SDSI</EM><BR>by Dwaine Clarke, 
  Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. 
  Rivest.<BR>(To appear in JCS.) Draft of September 13, 2001. <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ClarkeElElFrMoRi-CertificateChainDiscoveryInSPKISDSI.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/ClarkeElElFrMoRi-CertificateChainDiscoveryInSPKISDSI.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Two Signature Schemes</EM><BR>(Slides from talk given at Cambridge 
  University October 17, 2000; one scheme (a transitive signature scheme for 
  undirected graphs) is joint work with Silvio Micali, the other scheme (a 
  prefix aggregation scheme) is joint work with Suresh Chari and Tal Rabin.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CambridgeTalk.pdf">pdf</A> 
    </LI></UL>Here is the paper for the first scheme:<BR><EM>Transitive Signature 
  Schemes</EM><BR>by Silvio Micali and Ronald L. Rivest.<BR>(Proceedings of the 
  Cryptographer's Track at the RSA Conference 2002, Bart Preneel (ed.), Springer 
  Verlag CT-RSA 2002, LNCS 2271, pages 236--243.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-TransitiveSignatureSchemes.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/MicaliRivest-TransitiveSignatureSchemes.pdf">pdf</A> 
    </LI></UL>Here is the current draft of the paper for the second scheme, by 
  Chari, Rabin, and Rivest:<BR><EM>An Efficient Signature Scheme for Route 
  Aggregation</EM><BR>by Suresh Chari, Tal Rabin, and Ronald L. Rivest<BR>(Draft 
  of February 1, 2002.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ChariRabinRivest-AnEfficientSignatureSchemeForRouteAggregation.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/ChariRabinRivest-AnEfficientSignatureSchemeForRouteAggregation.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Are ``Strong'' Primes Needed for RSA?</EM><BR>by Ronald L. Rivest and 
  Robert D. Silverman.<BR>
  <UL>
    <LI>(version 11/22/1999) <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestSilverman-AreStrongPrimesNeededForRSA.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestSilverman-AreStrongPrimesNeededForRSA.pdf">pdf</A> 

    <LI><A href="http://eprint.iacr.org/2001/007/">Paper 2001/007</A> of the 
    IACR Cryptology <A href="http://eprint.iacr.org/index.html">ePrint 
    archive</A> (version 12/1/1998) </LI></UL>
  <P></P>
  <LI><EM>Pseudonym Systems</EM><BR>by Anna Lysyanskaya, Ronald L. Rivest, Amit 
  Sahai, and Stefan Wolf.<BR><EM>Selected Areas in Cryptography '99</EM> 
  (Springer Verlag Lecture Notes in Computer Science No. 1758; edited by H. Heys 
  and C. Adams, 2000), pages 184--199.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/LysyanskayaRivestSahaiWolf-PseudonymSystems.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/LysyanskayaRivestSahaiWolf-PseudonymSystems.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Unconditionally Secure Commitment and Oblivious Transfer Schemes Using 
  Private Channels and a Trusted Initializer</EM> <BR>by Ronald L. 
  Rivest.<BR>Unpublished manuscript, 11/8/99.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-commitment.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/Rivest-commitment.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Permutation Polynomials modulo 2^w</EM><BR>by Ronald L. 
  Rivest.<BR>October 6, 1999. Revised October 25, 1999. <BR>In <EM>Finite Fields 
  and their Applications</EM> Volume 7 (2001), pages 287--292.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PermutationPolynomialsModulo2w.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PermutationPolynomialsModulo2w.pdf">pdf</A> 
    ; <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PermutationPolynomialsModulo2w-copyright.html">(copyright 
    notice)</A> </LI></UL>
  <P></P>
  <LI><EM>The Beer Bottle Cipher</EM><BR>by Ronald L. Rivest.<BR>Posted here 
  June 30, 1999.<BR>Published in <EM>CCE Quarterly Journal</EM> 
  (PricewaterhouseCoopers Cryptographic Center of Excellence), Issue 3 (1999), 
  28--30.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/beer.txt">text</A></EM> 
  </LI></UL>
  <P></P>
  <LI><EM>The LCS35 Time Capsule Crypto-Puzzle (description, java code, and 
  puzzle parameters)</EM><BR>by Ronald L. Rivest<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/lcs35-puzzle-description.txt">description 
    with java code and puzzle parameters</A> or <A 
    href="http://theory.lcs.mit.edu/~rivest/lcs35-puzzle-code.java">java code 
    only</A> or <A 
    href="http://theory.lcs.mit.edu/~rivest/lcs35-puzzle.txt">puzzle parameters 
    only</A> 
    <LI><A href="http://www.lcs.mit.edu/news/crypto.html">LCS page on puzzle</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Improved Analysis of Some Simplified Variants of RC6</EM><BR>by Scott 
  Contini, Ronald L. Rivest, M.J.B. Robshaw, and Yiqun Lisa Yin.<BR>in 
  <EM>Proceedings Fast Software Encryption '99</EM> (Springer Verlag, Lecture 
  Notes in Computer Science No. 1636, Lars Knudsen(ed.), 1999), pages 1--15.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ContiniRivestRobshawYin-ImprovedAnalysisOfSomeSimplifiedVariantsOfRC6.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/ContiniRivestRobshawYin-ImprovedAnalysisOfSomeSimplifiedVariantsOfRC6.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Some Thoughts on Serial Numbers on Intel CPU's</EM><BR>by Ronald L. 
  Rivest.<BR>Unpublished note, drafted January 26, 1999; revised in minor ways 
  on August 23, 1999 and posted here.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/intel.txt">text</A></LI></UL>
  <P></P>
  <LI><EM>SPKI Certificate Theory</EM><BR>by C. Ellison, B. Frantz, B. Lampson, 
  R. Rivest, B. Thomas, and T. Ylonen.<BR>Internet Network Working Group 
  RFC2693, September 1999.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rfc2693.txt">text</A></LI></UL>
  <P></P>
  <LI><EM>Simple Public Key Certificate</EM><BR>by C. Ellison, B. Frantz, B. 
  Lampson, R. Rivest, B. Thomas, and T. Ylonen.<BR>Internet Draft, July 26, 
  1999.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/simple-public-key-certificate.txt">text</A></LI></UL>
  <P></P>
  <LI><EM>SPKI Examples</EM><BR>by C. Ellison, B. Frantz, B. Lampson, R. Rivest, 
  B. Thomas, and T. Ylonen.<BR>Internet Draft, March 10, 1998.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/spki-examples.txt">text</A></LI></UL>
  <P></P>
  <LI><EM>The Case against Regulating Encryption Technology</EM><BR>by Ronald L. 
  Rivest.<BR>Scientific American, October 1998, pages 116--117. 
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/sciam98.txt">text</A></LI></UL>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天天av天天翘天天综合网| √…a在线天堂一区| 欧美日韩一区二区三区在线| 成人午夜视频福利| 成人精品亚洲人成在线| 成人自拍视频在线观看| 成人一区二区视频| 成人v精品蜜桃久久一区| 成人精品在线视频观看| 99久久伊人精品| 99精品国产热久久91蜜凸| 一本色道久久加勒比精品 | 亚洲第一福利一区| 亚洲国产综合视频在线观看| 一区二区三区在线不卡| 午夜久久久久久久久久一区二区| 天天爽夜夜爽夜夜爽精品视频| 免费亚洲电影在线| 国产精品综合av一区二区国产馆| 成人在线视频首页| 欧美三级日韩三级| 精品精品国产高清a毛片牛牛 | 99r国产精品| 欧美日韩久久久一区| 欧美一级二级在线观看| 久久香蕉国产线看观看99| 国产精品久久久久永久免费观看| 综合久久久久综合| 青青草一区二区三区| 国产a久久麻豆| 欧美日韩小视频| 26uuuu精品一区二区| 亚洲品质自拍视频网站| 日本亚洲最大的色成网站www| 久久99精品一区二区三区| 成人高清伦理免费影院在线观看| 欧美日韩久久一区二区| 欧美国产日本视频| 无码av中文一区二区三区桃花岛| 国产乱码精品一区二区三区忘忧草| 色综合天天狠狠| 精品国产欧美一区二区| 亚洲欧美日韩国产手机在线| 麻豆成人av在线| 色婷婷av久久久久久久| 久久久久97国产精华液好用吗| 亚洲国产精品一区二区www在线| 国产成人综合自拍| 91精品国产综合久久福利| 日韩美女视频一区| 国产精品亚洲一区二区三区在线| 色婷婷久久久综合中文字幕| 久久精品水蜜桃av综合天堂| 天天综合网天天综合色| 色婷婷综合久色| 国产精品美女久久久久久久网站| 日本美女一区二区三区| 91黄视频在线| 中文字幕一区二区三中文字幕| 精油按摩中文字幕久久| 777xxx欧美| 亚洲网友自拍偷拍| 在线观看免费成人| 亚洲精品欧美二区三区中文字幕| 成人精品国产免费网站| 精品久久久久香蕉网| 免费日本视频一区| 日韩一二三四区| 蜜臀av一区二区| 日韩视频免费观看高清完整版在线观看 | 精品国产91亚洲一区二区三区婷婷| 中文字幕亚洲区| 丁香婷婷综合色啪| 欧美激情一区在线| 色综合久久99| 亚洲精品乱码久久久久久黑人| 99久久婷婷国产综合精品| 中文字幕一区二区在线播放| 成人sese在线| 亚洲日本成人在线观看| 色综合色狠狠综合色| 亚洲综合在线第一页| 91女人视频在线观看| 亚洲精品高清视频在线观看| 一道本成人在线| 亚洲成国产人片在线观看| 欧美日韩日日骚| 麻豆国产91在线播放| 久久精品一区二区三区不卡牛牛 | 亚洲电影一级片| 91超碰这里只有精品国产| 日韩av在线发布| 久久精品欧美日韩精品| 成人美女视频在线观看| 一区二区三区日韩精品视频| 欧美性猛片xxxx免费看久爱| 日本亚洲免费观看| 国产日产欧产精品推荐色| 成人免费电影视频| 亚洲国产裸拍裸体视频在线观看乱了 | 99久久精品国产一区| 亚洲国产精品一区二区久久恐怖片| 欧美日韩小视频| 国产在线观看免费一区| 亚洲欧洲日韩一区二区三区| 欧美日韩在线电影| 国产激情一区二区三区| 亚洲免费成人av| 精品少妇一区二区三区日产乱码 | 亚洲国产精品一区二区久久| 日韩三级在线免费观看| av亚洲精华国产精华精| 亚洲国产成人tv| 国产亚洲精品bt天堂精选| 在线免费观看视频一区| 国产一区亚洲一区| 亚洲韩国一区二区三区| 国产精品午夜免费| 欧美一区二区三区思思人| 97se亚洲国产综合在线| 极品销魂美女一区二区三区| 亚洲精选在线视频| 国产日韩欧美精品一区| 欧美日韩国产一区| 不卡影院免费观看| 久久国产三级精品| 亚洲成人激情自拍| 亚洲欧美电影一区二区| 久久网站最新地址| 91精品国产麻豆国产自产在线| 97精品视频在线观看自产线路二| 麻豆高清免费国产一区| 亚洲成人综合视频| 亚洲精选视频在线| 国产精品久99| 中文字幕av一区二区三区免费看| 在线综合视频播放| 欧美精品视频www在线观看| av电影天堂一区二区在线| 国产在线视频精品一区| 免费一级片91| 蜜臀久久久久久久| 丝袜美腿亚洲色图| 亚洲www啪成人一区二区麻豆| 亚洲欧美激情插| 国产精品国产馆在线真实露脸 | 欧美国产一区二区| 精品国产乱码久久久久久浪潮 | 欧美国产日韩在线观看| 久久影院午夜论| 精品日产卡一卡二卡麻豆| 欧美丰满一区二区免费视频| 在线亚洲免费视频| 欧美亚洲国产一卡| 欧美在线一二三| 欧美日韩在线播放一区| 欧美卡1卡2卡| 日韩欧美成人午夜| 久久久亚洲精华液精华液精华液| 日韩精品一区二区三区在线播放 | 樱花草国产18久久久久| 亚洲女爱视频在线| 亚洲一区二区高清| 亚洲国产精品久久久久秋霞影院| 一区二区三区在线视频播放| 一区二区三区四区乱视频| 亚洲成人av免费| 青青草成人在线观看| 国精品**一区二区三区在线蜜桃| 国产在线一区二区| 91免费视频网址| 欧美日韩一级片网站| 日韩一区二区免费视频| 久久久久久久精| 亚洲欧美另类小说视频| 日韩国产一二三区| 国产精一区二区三区| 91在线观看美女| 9191成人精品久久| 久久久久久影视| 亚洲欧美日韩中文字幕一区二区三区| 一区二区三区不卡在线观看| 99麻豆久久久国产精品免费优播| 色嗨嗨av一区二区三区| 日韩三级.com| 中文字幕日韩一区| 毛片av一区二区| 成人动漫在线一区| 91精品国产综合久久国产大片| 国产欧美日韩不卡免费| 亚洲国产精品精华液网站| 国产美女在线精品| 欧美日韩一区二区在线观看| 久久九九久精品国产免费直播| 亚洲综合一二三区| 懂色av噜噜一区二区三区av| 欧美日韩一区二区三区四区五区 | 国产又粗又猛又爽又黄91精品| 色婷婷精品久久二区二区蜜臀av | 亚洲综合色噜噜狠狠|