亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ronald l_ rivest publications.htm

?? 密碼學相應問題的解決辦法都能夠在這個葉面上的連接找到解決辦法
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
  <P></P>
  <LI><EM>Self-Delegation with Controlled Propagation -- or -- What If You Lose 
  Your Laptop</EM><BR>by Oded Goldreich and Birgit Pfitzmann and Ronald L. 
  Rivest<BR><EM>Proceedings CRYPTO '98</EM> (Springer-Verlag, Lecture Notes in 
  Computer Science No. 1462, Hugo Krawczyk(ed), 1998), pages 153--168. (Also 
  Cryptology ePrint Archive 1997/012.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/GoldreichPfitzmannRivest-SelfDelegationWithControlledPropagation.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldreichPfitzmannRivest-SelfDelegationWithControlledPropagation.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>The Security of the RC6 Block Cipher</EM><BR>by Scott Contini, Ronald 
  L. Rivest, M.J.B. Robshaw, and Yiqun Lisa Yin.<BR>Posted at <A 
  href="http://www.rsa.com/rsalabs/rc6">RSA's RC6 page.</A> (August 20, 1998) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ContiniRivestRobshawYin-TheSecurityOfTheRC6BlockCipher.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/ContiniRivestRobshawYin-TheSecurityOfTheRC6BlockCipher.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>The RC6 Block Cipher</EM><BR>by Ronald L. Rivest, M.J.B. Robshaw, R. 
  Sidney, and Y.L. Yin<BR>Posted at <A 
  href="http://www.rsa.com/rsalabs/rc6">RSA's RC6 page.</A> (Version 1.1; August 
  20, 1998). 
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rc6.ps">postscript</A> or <A 
    href="http://theory.lcs.mit.edu/~rivest/rc6.pdf">pdf</A><BR>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rc6aes.ppt">Powerpoint slides 
    from AES1 conference (8/21/1998).</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rc6-notes.txt">Further notes 
    on RC6</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rc6-final-4.ppt">Powerpoint 
    slides from AES3 conference (4/14/2000).</A> </LI></UL>
  <P></P>
  <LI><EM>Can We Eliminate Certificate Revocation Lists?</EM><BR>by Ronald L. 
  Rivest<BR>(Proceedings of Financial Cryptography '98; Springer Lecture Notes 
  in Computer Science No. 1465 (Rafael Hirschfeld, ed.), February 1998), pages 
  178--183.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CanWeEliminateCertificateRevocationLists.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CanWeEliminateCertificateRevocationLists.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>On the Design and Security of RC2</EM><BR>By Lars R. Knudsen, Vincent 
  Rijmen, Ronald L. Rivest, and M.J.B. Robshaw.<BR>(Proceedings Fifth Fast 
  Software Encryption Workshop FSE '98, (Springer Lecture Notes in Computer 
  Science, No. 1372, March 1998, Serge Vaudenay (ed.)), pages 206--221.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/rc2-fse.ps">postscript</A> or 
    <A href="http://theory.lcs.mit.edu/~rivest/rc2-fse.pdf">pdf</A> </LI></UL>
  <P></P>
  <LI><EM>Chaffing and Winnowing: Confidentiality without Encryption</EM><BR>by 
  Ronald L. Rivest.<BR><EM>CryptoBytes</EM> (RSA Laboratories), volume 4, number 
  1 (summer 1998), 12--17.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/chaffing.txt">Version of 
    March 18, 1998</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/chaff.ppt">``Chaffing and 
    Winnowing'' and Comments on Crypto Policy (Powerpoint slides)</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/chaffing-980701.txt">Version 
    of July 1, 1998</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/chaffing-remarks.txt">Some 
    further remarks on winnowing and chaffing. (November 14, 2000.</A> </LI></UL>
  <P></P>
  <LI><EM>Cryptography as Duct Tape</EM><BR>by Ronald L. Rivest<BR>(a short note 
  written to the Senate Commerce and Judiciary Committees in opposition to 
  mandatory key recovery proposals).<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/ducttape.txt">Version of June 
    12, 1997</A> </LI></UL>
  <P></P>
  <LI><EM>The Risks of Key Recovery, Key Escrow, and Trusted Third Party 
  Encryption</EM><BR>By Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh 
  Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald 
  L. Rivest, Jeffery I. Schiller, and Bruce Schneier.<BR>May, 1997.<BR>
  <UL>
    <LI><A href="http://www.crypto.com/key_study/">Report Home Page at 
    CDT</A><BR></LI></UL>
  <P></P>
  <LI><EM>Electronic Lottery Tickets as Micropayments</EM>,<BR>by Ronald L. 
  Rivest.<BR>Proceedings of Financial Cryptography '97 Conference, Springer 
  Lecture Notes in Computer Science #1318 (1997), 307--314.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/lottery.ps">postscript</A> or 
    <A href="http://theory.lcs.mit.edu/~rivest/lottery.pdf">pdf</A> </LI></UL>
  <P></P>
  <LI><EM>Perspectives on Financial Cryptography</EM><BR>by Ronald L. 
  Rivest.<BR>Proceedings of Financial Cryptography '97 Conference, Springer 
  Lecture Notes in Computer Science #1318 (1997), 145--149.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/fc97-paper.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/fc97-paper.pdf">pdf</A> 
    <LI><A href="http://theory.lcs.mit.edu/~rivest/fc97-slides.ppt">PowerPoint 
    slides</A> </LI></UL>
  <P></P>
  <LI>SDSI---A Simple Distributed Security Infrastructure<BR>(By Ronald L. 
  Rivest and Butler Lampson).<BR>(See also the <A 
  href="http://theory.lcs.mit.edu/~cis/sdsi.html">SDSI Page</A>)<BR>
  <UL>
    <LI>[Version 1.0]<BR>
    <UL>
      <LI><A href="http://theory.lcs.mit.edu/~rivest/sdsi10.html">html</A> or <A 
      href="http://theory.lcs.mit.edu/~rivest/sdsi10.ps">postscript</A> 
      <LI>Powerpoint slides: <A 
      href="http://theory.lcs.mit.edu/~rivest/sdsi10-usenix.ppt">USENIX '96</A>, 
      <A href="http://theory.lcs.mit.edu/~rivest/sdsi10-rsalab96.ppt">RSA-Labs 
      '96</A>, <A 
      href="http://theory.lcs.mit.edu/~rivest/sdsi10-crypto96b.ppt">CRYPTO 
      '96</A> </LI></UL>
    <LI>[Version 1.1]<BR>
    <UL>
      <LI><A 
      href="http://theory.lcs.mit.edu/~rivest/sdsi11.html">html</A><BR></LI></UL>
    <LI>[Version 2.0]<BR>
    <UL>
      <LI><A 
      href="http://theory.lcs.mit.edu/~rivest/sdsi20-maryland.ppt">PowerPoint 
      slides for Maryland Theoretical Computer Science Day 4/11/97</A> 
    <BR></LI></UL></LI></UL>
  <P></P>
  <LI><EM>All-Or-Nothing Encryption and The Package Transform</EM><BR>by Ronald 
  L. Rivest.<BR>Proceedings of the 1997 Fast Software Encryption Conference. 
  Springer Lecture Notes in Computer Science #1267 (1997), 210--218.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/fusion.ps">postscript</A> or 
    <A href="http://theory.lcs.mit.edu/~rivest/fusion.pdf">pdf</A> </LI></UL>
  <P></P>
  <LI><EM>Minimal Key Lengths for Symmetric Ciphers to Provide Adequate 
  Commercial Security</EM><BR>by Matt Blaze, Whitfield Diffie, Ronald L. Rivest, 
  Bruce Schneier, Tsutomu Shimomura, Eric Thompson, and Michael Wiener.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/bsa-final-report.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/bsa-final-report.pdf">pdf</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/bsa-final-report.txt">text</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Translucent Cryptography---An Alternative to Key Escrow, and its 
  Implementation via Fractional Oblivious Transfer</EM><BR>by Mihir Bellare and 
  Ronald L. Rivest.<BR>MIT/LCS Technical Report 683 (18 Feb 1996):<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BellareRivest-translucent.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BellareRivest-translucent.pdf">pdf</A> 
    </LI></UL>Journal of Cryptology</A> (vol. 12, no. 2, Spring 1999, pages 
  117--140):<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BellareRivest-translucent2.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BellareRivest-translucent2.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Multi-grade cryptography</EM><BR>by Ronald L. Rivest<BR>Unpublished 
  manuscript.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-multigrade.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/Rivest-multigrade.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Time-lock puzzles and timed-release Crypto</EM><BR>by Ronald L. 
  Rivest, Adi Shamir, and David A. Wagner.<BR>(This has appeared as LCS 
  technical memo MIT/LCS/TR-684 (February 1996).)<BR>
  <UL>
    <LI>Version of 3/10/96: <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamirWagner-timelock.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamirWagner-timelock.pdf">pdf</A><BR></LI></UL>
  <P></P>
  <LI><EM>Geometric Cryptography</EM><BR>by Mike Burmester, Ronald L. Rivest, 
  and Adi Shamir.<BR>Unpublished.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BurmesterRivestShamir-geometric.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BurmesterRivestShamir-geometric.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>PayWord and MicroMint--Two Simple Micropayment Schemes</EM><BR>by 
  Ronald L. Rivest and Adi Shamir.<BR>CryptoBytes, volume 2, number 1 (RSA 
  Laboratories, Spring 1996), 7--11.<BR>Also in <EM>Proceedings of 1996 
  International Workshop on Security Protocols</EM>, (ed. Mark Lomas), 
  (Springer, 1997), Lecture Notes in Computer Science No. 1189, pages 
69--87.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.pdf">pdf</A> 

    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ppt">PowerPoint 
    slides for RSA '96 conference.</A> </LI></UL>
  <P></P>
  <LI><EM>The RC5 Encryption Algorithm</EM><BR>by Ronald L. 
  Rivest.<BR>Proceedings of the 1994 Leuven Workshop on Fast Software Encryption 
  (Springer 1995), pages 86-96.<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/Rivest-rc5.ps">postscript</A> 
    or <A href="http://theory.lcs.mit.edu/~rivest/Rivest-rc5.pdf">pdf</A> 
    <LI>3/20/97: <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.txt">correction 
    note</A>, revised <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.ps">postscript</A> or 
    <A href="http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.pdf">pdf</A> 
  </LI></UL>(Also see <A 
  href="http://theory.lcs.mit.edu/~rivest/Rivest-TheRC5EncryptionAlgorithm">The 
  RC5 Encryption Algorithm (pdf)</A> in <EM>Dr. Dobbs Journal</EM> number 226 
  (January 1995), pages 146-148.)<BR>
  <P></P>
  <LI><EM>The MD5 Message Digest Algorithm</EM><BR>by Ronald L. 
  Rivest.<BR>Internet RFC 1321 (April 1992).<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/Rivest-MD5.txt">text</A> 
  </LI></UL>
  <P></P>
  <LI><EM>The MD4 Message Digest Algorithm</EM><BR>by Ronald L. 
  Rivest.<BR>Internet RFC 1320 (April 1992).<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/Rivest-MD4.txt">text</A> 
  </LI></UL>
  <P></P>
  <LI><EM>Cryptography and Machine Learning</EM><BR>by Ronald L. 
  Rivest.<BR>Proceedings ASIACRYPT '91 (Springer 1993), 427--439.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CryptographyAndMachineLearning.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-CryptographyAndMachineLearning.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Finding Four Million Large Random Primes</EM><BR>by Ronald L. 
  Rivest.<BR>Proc. CRYPTO 90 (Springer 1991), 625--626.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-FindingFourMillionLargeRandomPrimes.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-FindingFourMillionLargeRandomPrimes.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Cryptography</EM><BR>by Ronald L. Rivest.<BR>Chapter 13 of 
  <EM>Handbook of Theoretical Computer Science</EM>, (ed. J. Van Leeuwen) vol. 1 
  (Elsevier, 1990), 717--755.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-Cryptography.ps">postscript</A> 
    or <A 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美日本在线| 国产一区二区三区免费播放| 麻豆免费精品视频| 99久久国产综合色|国产精品| 国产日韩欧美电影| 亚洲成人综合网站| 不卡免费追剧大全电视剧网站| 欧美日韩精品一二三区| 国产欧美日韩在线看| 日韩高清一区在线| 欧美综合一区二区三区| 中文字幕第一页久久| 青青草国产成人99久久| 91污片在线观看| 国产亚洲成年网址在线观看| 日本成人中文字幕在线视频 | 欧美哺乳videos| 亚洲伊人色欲综合网| aaa国产一区| 中文字幕欧美激情一区| 国产综合色在线| 日韩精品一区二区三区中文不卡| 亚洲一区二区三区四区在线 | 亚洲欧美日韩国产手机在线 | 色素色在线综合| 18涩涩午夜精品.www| 高清视频一区二区| 久久久久久免费毛片精品| 麻豆精品国产传媒mv男同| 在线成人免费视频| 日韩av电影天堂| 538prom精品视频线放| 亚洲成人三级小说| 欧美三级视频在线播放| 亚洲综合色丁香婷婷六月图片| 99久久er热在这里只有精品15| 国产精品三级av| 99在线精品免费| 亚洲精选在线视频| 在线免费av一区| 婷婷久久综合九色国产成人| 欧美日韩精品免费| 美国毛片一区二区| 久久久亚洲精品石原莉奈| 国产精品亚洲成人| 国产精品福利一区| 一本色道久久综合狠狠躁的推荐| 亚洲欧美偷拍卡通变态| 欧美视频在线一区| 日本中文在线一区| 久久综合色播五月| 不卡的av电影| 亚洲一二三四在线| 日韩欧美亚洲国产另类| 国产一区 二区| 国产精品福利影院| 欧美夫妻性生活| 国产风韵犹存在线视精品| 国产精品不卡在线| 欧美日韩视频不卡| 韩国毛片一区二区三区| 国产精品白丝在线| 在线综合+亚洲+欧美中文字幕| 国产一区二区三区免费看| 亚洲日本在线a| 91精品国产色综合久久久蜜香臀| 国产麻豆精品95视频| 一区二区三区欧美亚洲| 精品剧情v国产在线观看在线| 99精品久久99久久久久| 日韩国产高清在线| 亚洲视频狠狠干| 欧美xingq一区二区| 日本高清成人免费播放| 韩国一区二区三区| 亚洲国产精品久久久久婷婷884| 精品国产一二三| 欧洲精品视频在线观看| 国产成人一级电影| 午夜激情一区二区| 中文字幕日韩一区| 26uuu精品一区二区三区四区在线| 99re热视频这里只精品| 精品一区二区三区在线观看 | 国产精品色在线| 欧美精品精品一区| aaa欧美色吧激情视频| 精品在线一区二区三区| 性久久久久久久久| 亚洲少妇30p| 久久久电影一区二区三区| 欧美二区在线观看| 日本道精品一区二区三区| 风间由美一区二区三区在线观看| 日韩国产精品久久久| 亚洲综合色在线| 国产精品久久久久桃色tv| 精品久久久久久亚洲综合网 | 午夜视频一区二区| 中文字幕亚洲电影| 国产精品欧美一级免费| 国产三级一区二区三区| 欧美第一区第二区| 日韩欧美一级精品久久| 欧美日韩精品系列| 欧美日韩色综合| 在线观看国产日韩| 在线一区二区视频| 色婷婷久久久久swag精品| 99久久综合精品| 91在线一区二区| 色诱视频网站一区| 色又黄又爽网站www久久| 成人丝袜高跟foot| 成人黄色在线看| 国产高清视频一区| 丁香激情综合五月| 成人黄色免费短视频| 粉嫩av亚洲一区二区图片| 成人永久aaa| av中文字幕在线不卡| av网站免费线看精品| 91浏览器打开| 精品视频在线免费| 欧美肥妇毛茸茸| 精品国产髙清在线看国产毛片| 精品蜜桃在线看| 久久精品男人天堂av| 中文字幕精品—区二区四季| 国产精品久久久久国产精品日日| 国产精品成人一区二区艾草| 亚洲精品欧美在线| 五月天视频一区| 国内精品第一页| 成人做爰69片免费看网站| 91香蕉国产在线观看软件| 在线观看日韩一区| 欧美一级久久久久久久大片| 精品久久久久99| 中文字幕av一区二区三区免费看 | 久久激情五月激情| 国产精品香蕉一区二区三区| av亚洲精华国产精华精| 欧美色窝79yyyycom| 精品日韩欧美一区二区| 中文字幕在线播放不卡一区| 天天av天天翘天天综合网| 免费xxxx性欧美18vr| hitomi一区二区三区精品| 欧美乱熟臀69xxxxxx| 国产欧美精品在线观看| 亚洲bdsm女犯bdsm网站| 国产一区二三区| 在线观看视频一区二区欧美日韩| 欧美成人aa大片| 亚洲乱码一区二区三区在线观看| 日本中文一区二区三区| 99久久伊人网影院| 日韩亚洲欧美一区二区三区| 国产精品美女一区二区三区 | 亚洲午夜久久久| 国产一二精品视频| 欧美最猛黑人xxxxx猛交| 久久久久国产一区二区三区四区| 亚洲激情图片qvod| 国产成人免费在线| 欧美一区二区三区日韩视频| 中文字幕中文字幕中文字幕亚洲无线| 五月天中文字幕一区二区| 99麻豆久久久国产精品免费| 精品嫩草影院久久| 亚洲超碰精品一区二区| caoporen国产精品视频| 亚洲精品一线二线三线| 日韩综合一区二区| 色999日韩国产欧美一区二区| 久草热8精品视频在线观看| 亚洲综合在线免费观看| 国产在线视频精品一区| 777奇米成人网| 亚洲精品乱码久久久久久| 成人一级片网址| 成人免费黄色大片| 久久久久久久综合日本| 日韩高清一区在线| 欧美日韩aaa| 一区二区日韩av| 91在线观看成人| 国产精品女人毛片| 丁香网亚洲国际| 国产亚洲综合av| 精品一区二区在线视频| 日韩欧美国产精品一区| 天堂久久久久va久久久久| 欧美在线观看视频在线| 一区二区三区在线视频观看| 色诱视频网站一区| 一区二区三区中文字幕电影 | 蜜臀久久99精品久久久画质超高清| 91久久久免费一区二区|