亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ronald l_ rivest publications.htm

?? 密碼學相應問題的解決辦法都能夠在這個葉面上的連接找到解決辦法
?? HTM
?? 第 1 頁 / 共 4 頁
字號:
    href="http://theory.lcs.mit.edu/~rivest/Rivest-Cryptography.pdf">pdf</A> ; 
    <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-Cryptography.txt">(note)</A> 
    </LI></UL>
  <P></P>
  <LI><EM>A Knapsack Type Cryptosystem Based on Arithmetic in Finite 
  Fields</EM><BR>by Benny Chor and Ronald L. Rivest.<BR>IEEE Trans. Information 
  Theory 34,5 (Sep. 1988), 901--909.<BR>(Also in CRYPTO 84.)<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ChorRivest-AKnapsackTypePublicKeyCryptosystemBasedOnArithmeticInFiniteFields.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/ChorRivest-AKnapsackTypePublicKeyCryptosystemBasedOnArithmeticInFiniteFields.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Is the Data Encryption Standard A Group?</EM><BR>by Burton S. Kaliski, 
  Ronald L. Rivest, and Alan T. Sherman.<BR>Journal of Cryptology 1,1 
  (1988),3--36. <BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/KaliskiRivestSherman-IsTheDataEncryptionStandardAGroup.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>A Digital Signature Scheme Secure Against Adaptive Chosen Message 
  Attacks</EM><BR>by Shafi Goldwasser, Silvio Micali, and Ronald L. 
  Rivest.<BR><EM>SIAM J. Computing</EM> 17,2 (April 1988), 281--308.<BR>(Note: 
  This does not include the figures that were published with the paper.) 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.pdf">pdf</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.dvi">dvi</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Efficient Factoring Based on Partial Information</EM><BR>by Ronald L. 
  Rivest and Adi Shamir<BR><EM>Proceedings EUROCRYPT '85</EM>, LNCS 219, ed. F. 
  Pichler (Springer), 31--34. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamir-EfficientFactoringBasedOnPartialInformation.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Mental Poker</EM><BR>by Adi Shamir, Ronald L. Rivest, and Leonard M. 
  Adleman.<BR>in <EM>The Mathematical Gardner</EM> (ed. David A. Klarner), 
  (Prindle, Weber, and Schmidt, 1981), pages 37-43.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/ShamirRivestAdleman-MentalPoker.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Testing Implementations of DES</EM><BR>by Ronald L. 
  Rivest<BR>(Unpublished, 2/85)<BR>
  <UL>
    <LI><A href="http://theory.lcs.mit.edu/~rivest/destest.txt">text</A> 
</LI></UL>
  <P></P>
  <LI><EM>Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key 
  Cryptosystem</EM><BR><EM>Cryptologia</EM> 2,1 (January 1978), 62--65.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-RemarksOnAProposedCryptanalyticAttackOnTheMITPublicKeyCryptosystem.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>A Method for Obtaining Digital Signatures and Public-Key 
  Cryptosystems</EM><BR>by Ronald L. Rivest, Adi Shamir, and Leonard M. 
  Adleman.<BR><EM>Communications of the ACM</EM> 21,2 (Feb. 1978), 120--126.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamirAdleman-AMethodForObtainingDigitalSignaturesAndPublicKeyCryptosystems.pdf">pdf</A> 
    </LI></UL>
  <P></P></LI></UL>
<H2>Algorithms</H2>
<UL>
  <LI><A href="http://theory.lcs.mit.edu/~clr/">Introduction to Algorithms</A> 
  (Second Edition)<BR>by Cormen, Leiserson, Rivest, and Stein (MIT Press and 
  McGraw-Hill, 2001). 
  <P></P>
  <LI><EM>Optimal Arrangements of Keys in a Hash Table</EM><BR>by Ronald L. 
  Rivest.<BR><EM>Journal of the ACM <BF>25</BF>,2</EM> April 1978, 200--209.<BF> 

  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-OptimalArrangementOfKeysInAHashTable.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Partial-Match Retrieval Algorithms</EM><BR>by Ronald L. 
  Rivest.<BR><EM>Siam J. Computing <BF>5</BF>,1</EM> March 1976, 19--50.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-PartialMatchRetrievalAlgorithms.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Time Bounds for Selection</EM> by Manual Blum, Robert W. Floyd, 
  Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan.<BR><EM>Journal of 
  Computer and System Sciences <BF>7</BF>,4</EM> August 1973, 448-460.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BlumFloydPrattRivestTarjan-TimeBoundsForSelection.pdf">pdf</A> 
    </LI></UL>
  <P></P></LI></UL>
<H2>Machine Learning</H2>
<UL>
  <LI><EM>Piecemeal Graph Exploration by a Mobile Robot</EM><BR>by Baruch 
  Awerbuch, Margrit Betke, Ronald L. Rivest, and Mona Singh.<BR><EM>Information 
  and Computation</EM> 152,2 (August 1999), 155--172. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/AwerbuchBetkeRivestSingh-PiecemealGraphExplorationByAMobileRobot.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/AwerbuchBetkeRivestSingh-PiecemealGraphExplorationByAMobileRobot.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Piecemeal Learning of an Unknown Environment</EM><BR>by Margrit Betke, 
  Ronald L. Rivest, and Mona Singh. <EM>Machine Learning</EM> 18:2-3 (February 
  1995), 231--254. 
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BetkeRivestSingh-PiecemealLearningOfAnUnknownEnvironment.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BetkeRivestSingh-PiecemealLearningOfAnUnknownEnvironment.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Being Taught Can be Faster than Asking Questions</EM><BR>by Ronald L. 
  Rivest and Yiqun Lisa Yin<BR>Proceedings 1995 COLT Conference (ACM, 1995), 
  144-151.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestYin-BeingTaught.pdf">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestYin-BeingTaught.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Picking the Best Expert from a Sequence</EM><BR>by Ruth Bergman and 
  Ronald L. Rivest.<BR>Proceedings of the Fifth International Workshop on 
  Artificial Intelligence and Statistics, (Fort Lauerdale FL, January 1995). 
  219--228.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/BergmanRivest-PickingTheBestExpertFromASequence.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/BergmanRivest-PickingTheBestExpertFromASequence.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Learning Binary Relations and Total Orders</EM><BR>by Sally A. 
  Goldman, Ronald L. Rivest, and Robert E. Schapire.<BR><EM>SIAM J. 
  Computing</EM> 22,5 (October 1993), 1006-1034.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/GoldmanRivestSchapire-LearningBinaryRelationsAndTotalOrders.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldmanRivestSchapire-LearningBinaryRelationsAndTotalOrders.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Diversity-Based Inference of Finite Automata</EM><BR>by Ronald L. 
  Rivest and Robert E. Schapire.<BR><EM>Journal of the ACM</EM> 41, 3 (May 
  1994), 555--589.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestSchapire-DiversityBasedInferenceOfFiniteAutomata.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/RivestSchapire-DiversityBasedInferenceOfFiniteAutomata.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Inference of Finite Automata Using Homing Sequences</EM><BR>by Ronald 
  L. Rivest and Robert E. Schapire.<BR><EM>Information and Computation</EM> 
  103,2 (April 1993), 299--347.<BR><!-- Where are the files for this??<ul>    <li><a href="RivestSchapire-InferenceOfFiniteAutomataUsingHomingSequences.ps">postscript</a>        or <a href="RivestSchapire-InferenceOfFiniteAutomataUsingHomingSequences.pdf">pdf</a></ul>-->
  <P></P>
  <LI><EM>Making Maximum Entropy Constraints Easier By Adding Extra Constraints 
  (Extended Abstract)</EM><BR>by Sally Goldman and Ronald L. Rivest.<BR>in 
  <EM>Maximum--Entropy and Bayesian Methods in Science and Engineering (Vol. 
  2)</EM>, (Edited by G.J. Erickson and C.R. Smith) (Kluwer Academic Publishers, 
  1988), 323--340.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/GoldmanRivest-MakingMaximumEntropyComputationsEasierByAddingExtraConstraints.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldmanRivest-MakingMaximumEntropyComputationsEasierByAddingExtraConstraints.pdf">pdf</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GoldmanRivest-MakingMaximumEntropyComputationsEasierByAddingExtraConstraints.dvi">dvi</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Learning Decision Lists</EM><BR>by Ronald L. Rivest.<BR><EM>Machine 
  Learning</EM> 2,3 (1987), 229--246.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-DecisionLists.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-DecisionLists.pdf">pdf</A> 
    </LI></UL>
  <P></P></LI></UL>
<H2>Miscellaneous</H2>
<UL>
  <LI><EM>Recollections of Stanford CS 1969--1973</EM><BR>by Ronald L. 
  Rivest.<BR>Talk given March 21, 2006 at Stanford Computer Science Forum 
  meeting celebrating the 40th anniverssary of the Stanford CS Department.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-RecollectionsOfStanfordCS1969-1973.ppt">ppt 
    slides</A> </LI></UL>
  <P></P>
  <LI><EM>Complete Variable-Length `FixFree' Codes</EM><BR>by David Gillman and 
  Ronald L. Rivest.<BR><EM>Designs, Codes, and Cryptography</EM> 5,2 (March 
  1995), 109--114.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/GillmanRivest-CompleteVariableLengthFixFreeCodes.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/GillmanRivest-CompleteVariableLengthFixFreeCodes.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Game Tree Searching by Min/Max Approximation</EM><BR>by Ronald L. 
  Rivest.<BR><EM>Artificial Intelligence</EM> 34,1 (Dec. 1987), 77-96.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-GameTreeSearchingByMinMaxApproximation.ps">postscript</A> 
    or <A 
    href="http://theory.lcs.mit.edu/~rivest/Rivest-GameTreeSearchingByMinMaxApproximation.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>How to Reuse a "Write-Once" Memory</EM><BR>by Ronald L. Rivest and Adi 
  Shamir.<BR><EM>Information and Control</EM> 55,1-3 (October/November/December 
  1982), 1--19.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/RivestShamir-HowToReuseAWriteOnceMemory.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Minimum Edge-Length Decomposition of Rectilinear Polygons</EM><BR>by 
  A. Lingas, R. Y. Pinter, R. L. Rivest, and A. Shamir.<BR><EM>Proc. 1982 
  Allerton Conference on Communications, Control, and Computing<EM> (Oct. 1982), 
  53-63.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/LingasPinterRivestShamir-MinimumEdgeLengthDecompositionOfRectilinearPolygons.pdf">pdf</A> 
    </LI></UL>
  <P></P>
  <LI><EM>Constructing Optimal Binary Decision Trees is NP-Complete</EM><BR>by 
  Laurent Hyafil and Ronald L. Rivest.<BR><EM>Information Processing 
  Letters</EM> 5,1 (May 1976), 15--17.<BR>
  <UL>
    <LI><A 
    href="http://theory.lcs.mit.edu/~rivest/HyafilRivest-ConstructingOptimalBinaryDecisionTreesIsNPComplete.pdf">pdf</A> 
    </LI></UL></LI></UL>Return to <A 
href="http://theory.lcs.mit.edu/~rivest/homepage.html">Ron Rivest's home 
page.</A> </EM></EM></BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品精品国产高清a毛片牛牛| 91美女精品福利| 亚洲精品中文在线| 日韩美女视频一区二区 | 91在线精品一区二区三区| 日本丶国产丶欧美色综合| 国产成人精品网址| 国产suv精品一区二区6| 国产91在线|亚洲| 懂色av中文一区二区三区| 国产成人av电影| av电影在线观看一区| 99re这里都是精品| 欧美做爰猛烈大尺度电影无法无天| 日本高清无吗v一区| 欧美探花视频资源| 制服丝袜av成人在线看| 精品国产青草久久久久福利| 欧美精品一区二区三区一线天视频 | 秋霞av亚洲一区二区三| 久久99精品国产麻豆婷婷 | 激情五月婷婷综合| 久久91精品久久久久久秒播 | 久久久久国产免费免费| 国产精品欧美综合在线| 亚洲精品国产第一综合99久久| 亚洲国产综合色| 日本欧美一区二区三区乱码| 国产在线国偷精品免费看| 成人免费视频免费观看| 欧美亚洲国产一区在线观看网站| 欧美另类高清zo欧美| 欧美精品一区二区三区蜜桃视频 | 日本成人在线网站| 国产乱码精品一区二区三区五月婷| 成人一道本在线| 欧美视频在线一区| 久久久天堂av| 亚洲国产精品麻豆| 国产91丝袜在线播放0| 在线观看av一区| 欧美xingq一区二区| 亚洲天堂免费看| 国产自产视频一区二区三区| 91视频在线看| 久久综合中文字幕| 亚洲综合激情小说| 高清国产一区二区| 欧美剧情片在线观看| 国产精品久久久99| 国产主播一区二区三区| 99视频在线观看一区三区| 精品国内二区三区| 日韩激情在线观看| 色噜噜久久综合| 亚洲国产精品二十页| 美女在线视频一区| 欧美亚洲国产一区在线观看网站 | 一本一道波多野结衣一区二区| 精品少妇一区二区三区在线视频| 一区二区三区资源| a4yy欧美一区二区三区| 中文字幕久久午夜不卡| 国产毛片精品一区| 欧美电影免费观看高清完整版在线观看| 亚洲天堂av老司机| 成人一区二区三区| 国产精品你懂的在线欣赏| 精品亚洲成a人在线观看| 91精品国产综合久久蜜臀| 亚洲一区日韩精品中文字幕| 99re热视频精品| 中文字幕在线一区二区三区| 国产成人在线色| 久久嫩草精品久久久久| 国产在线精品一区在线观看麻豆| 日韩免费福利电影在线观看| 热久久免费视频| 欧美xingq一区二区| 精品夜夜嗨av一区二区三区| 欧美r级在线观看| 精品亚洲aⅴ乱码一区二区三区| 51精品久久久久久久蜜臀| 日韩激情在线观看| 日韩午夜激情视频| 激情五月婷婷综合网| 国产丝袜在线精品| 成人免费毛片嘿嘿连载视频| 国产精品久久久久久久蜜臀| 色诱视频网站一区| 亚洲一区成人在线| 日韩一区二区高清| 国产精品影音先锋| 亚洲视频在线一区观看| 色域天天综合网| 午夜视黄欧洲亚洲| 久久综合九色综合欧美98| 风间由美性色一区二区三区| 亚洲乱码国产乱码精品精的特点| 色婷婷久久综合| 美女一区二区在线观看| 国产精品色哟哟网站| 日本韩国一区二区| 蜜臀av一区二区在线观看| 久久精品一区二区三区四区| 一本色道亚洲精品aⅴ| 偷窥少妇高潮呻吟av久久免费| 精品国产伦一区二区三区观看方式| 国产1区2区3区精品美女| 一区二区三区精密机械公司| 精品久久久久久久一区二区蜜臀| 9色porny自拍视频一区二区| 日韩精品一区第一页| 日本一区二区免费在线| 欧美三级视频在线| 成人综合在线视频| 日韩精品亚洲一区二区三区免费| 久久奇米777| 欧美日韩国产经典色站一区二区三区| 国产一区久久久| 婷婷综合另类小说色区| 国产精品不卡一区二区三区| 日韩精品一区在线观看| 色狠狠桃花综合| 国产精品一级在线| 美日韩一区二区三区| 一区二区三区四区不卡在线 | 日本道在线观看一区二区| 国产伦精品一区二区三区免费迷| 亚洲乱码中文字幕| 中文字幕av不卡| 久久影院午夜论| 欧美一区二区三区爱爱| 欧美中文字幕一二三区视频| 国产成人精品免费在线| 免费在线成人网| 日韩国产一区二| 亚洲午夜私人影院| 日韩一区在线看| 中文字幕不卡在线| 国产亚洲精品aa午夜观看| 日韩一区二区三区高清免费看看 | 91精品欧美综合在线观看最新| 成人sese在线| 成人一区二区三区中文字幕| 国产精品亚洲一区二区三区妖精 | 久久av中文字幕片| 婷婷夜色潮精品综合在线| 亚洲在线观看免费| 亚洲综合精品自拍| 一二三区精品福利视频| 亚洲精选一二三| 一区二区视频在线| 亚洲免费观看视频| 亚洲综合激情另类小说区| 亚洲一区二区在线免费观看视频| 自拍偷自拍亚洲精品播放| 亚洲欧洲av在线| 一区二区三区在线视频观看| 一区二区三区在线播放| 午夜一区二区三区在线观看| 日韩国产精品久久久久久亚洲| 日本中文字幕一区二区有限公司| 亚洲电影在线播放| 免费观看一级欧美片| 激情伊人五月天久久综合| 国产精品一区二区久久不卡| 本田岬高潮一区二区三区| 成人一级片在线观看| 91在线观看免费视频| 日本精品免费观看高清观看| 欧美挠脚心视频网站| 91精品国产黑色紧身裤美女| 精品国产乱码久久久久久牛牛| 国产亚洲精久久久久久| 亚洲免费观看高清| 男人的天堂久久精品| 国产成人av网站| 91官网在线免费观看| 欧美大片顶级少妇| 国产精品久久久99| 喷水一区二区三区| www.视频一区| 91精品婷婷国产综合久久性色| 国产视频视频一区| 三级精品在线观看| 国产精品一二三四| 欧美性感一区二区三区| 欧美精品一区二| 亚洲一区中文在线| 国产在线麻豆精品观看| 欧美午夜理伦三级在线观看| 欧美xfplay| 亚洲www啪成人一区二区麻豆| 国产在线观看一区二区 | 日本中文字幕一区| 成人免费观看视频| 日韩一级在线观看| 一区二区在线看| 9色porny自拍视频一区二区|