Ronald L. Rivest
#182,834
Most Influential Person Now
Ronald L. Rivest's AcademicInfluence.com Rankings
Ronald L. Rivestcomputer-science Degrees
Computer Science
#11639
World Rank
#12359
Historical Rank
Database
#8710
World Rank
#9138
Historical Rank

Download Badge
Computer Science
Ronald L. Rivest's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Ronald L. Rivest Influential?
(Suggest an Edit or Addition)Ronald L. Rivest's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- ON DATA BANKS AND PRIVACY HOMOMORPHISMS (1978) (2061)
- SDSI - A Simple Distributed Security Infrastructure (1996) (636)
- A "Greedy" Channel Router (1983) (321)
- Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists (1996) (206)
- Global wire routing in two-dimensional arrays (1987) (93)
- Provably Good Channel Routing Algorithms (1981) (75)
- The MD 6 hash function A proposal to NIST for SHA-3 (2008) (63)
- A new approach to unsupervised learning in deterministic environments (1990) (59)
- Is the data encryption standard a group (1986) (39)
- Pseudonym Systems (Extended Abstract) (2000) (38)
- Performance assessment. Family physicians in Montreal meet the mark! (2002) (31)
- Still Guarding Secrets after Years of Attacks , RSA Earns Accolades for its Founders (2003) (25)
- Learning binary relations, total orders, and read-once formulas (1990) (17)
- A Time- and Space- Efficient Garbage Compaction Algorithm (1978) (16)
- A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack*: Extended Abstract (1987) (15)
- Phish and Chips Traditional and New Recipes for Attacking EMV (2006) (13)
- Inference of Finite Automata Using Homing Sequences (Extended Abstract) (1989) (13)
- Lightweight Signatures for Email (2005) (13)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking (2014) (7)
- Time-Space Trade-offs in Molecular Computation (2016) (5)
- Factoring and cryptography. (1988) (5)
- 6.857 Computer & Network Security Final Project: Diierential Fault Analysis (1996) (5)
- Distributed SPKI / SDSI-Based Security for Networks of Devices (2001) (3)
- Number 18 (2019) (3)
- Remote Attestation (2011) (3)
- Practical Provably Correct Voter Privacy Protecting End-to-End Voting Employing Multiparty Computations and Split Value Representations of Votes (2014) (2)
- Making Maximum Entropy Computations Easier By Adding Extra Constraints (Extended Abstract) (1988) (2)
- Permutation operations in block ciphers (2005) (2)
- A Fast Multiport Memory Based on Single-Port Memory Cells (1991) (2)
- Making Maximum Entropy Computations Easier ByAdding Extra Constraints (1997) (2)
- Commentators (2017) (1)
- Cryptography, computers in (2003) (1)
- 209 Multimodality biological imaging alters target definition compared to conventional target definition in glioblastoma multiforme (2005) (0)
- FlipIt: The Game of “Stealthy Takeover” (2012) (0)
- Voting Equipment and Ballots (2013) (0)
- Dynamic with Dictionary Technique for Arabic Text Compression (2016) (0)
- Runtime Analysis (2011) (0)
- An Analyzer for Message Sequence Charts 15 Acknowledgements: We Thank 5 an Msc Analysis Tool 4 Mscs with Timing Constraints (1996) (0)
- Book Review (1913) (0)
- A Coherent VLSI Design Environment (1985) (0)
- Remote access system (1991) (0)
- Global Wiire Routing in Two-Dimensional Arrayst (Extended Abstract) (1983) (0)
- Theory and Practice for Large-Scale Systems (1983) (0)
- A Computational Analysis of Properties and Limitations of Neural Networks: Toward New Parallel Architectures for Learning (1992) (0)
- Computational analysis of properties and limitations of neural networks: toward new parallel architectures for learning. Final report (1992) (0)
- 25 . 1 Conversion of Algorithms to Custom Integrated Circuits (2009) (0)
- A 64 bits Dynamically Key Controlled Symmetric Cipher (KAMFEE-X64) (2020) (0)
- 5. Discussion 4. Fast Multipole Algorithm Figure 2. Initial Code for N-body Calculation 3. Refinement Prototyping Parallel Algorithms (1992) (0)
- Selected Solutions Introduction to Algorithms (2022) (0)
- Improvements in Probabilistic Micropayment Schemes (2004) (0)
- Access-Controlled Resource Discovery (2002) (0)
- Ò Ae Blockin Blockin (2007) (0)
- Keynote Address Security of Voting Systems (2007) (0)
This paper list is powered by the following services: