Author Description

Login to generate an author description

Ask a Question About This Mathematician

All published works (56)

Action Title Date Authors
A system capable of verifiably and privately screening global DNA synthesis 2024-03-20 Carsten Baum Jens Berlips W Q Chen Hongrui Cui Ivan Damgård Jiangbin Dong Kevin M. Esvelt Mingyu Gao Dana Gretton Leonard Foner
Bugs in our pockets: the risks of client-side scanning 2024-01-01 Harold Abelson Ross Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Jon Callas⋆ Whitfield Diffie Susan Landau Peter G. Neumann Ronald L. Rivest
Assertion-Based Approaches to Auditing Complex Elections, with Application to Party-List Proportional Elections 2021-01-01 Michelle Blom Jurlind Budurushi Ronald L. Rivest Philip B. Stark Peter J. Stuckey Vanessa Teague Damjan Vukcevic
Bugs in our Pockets: The Risks of Client-Side Scanning 2021-01-01 Hal Abelson Ross Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Jon Callas⋆ Whitfield Diffie Susan Landau Peter G. Neumann Ronald L. Rivest
A multi-control climate policy process for a trusted decision maker 2020-05-22 Henri F. Drake Ronald L. Rivest J. M. Deutch Alan Edelman
k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-election Audits 2020-01-01 Mayuri Sridhar Ronald L. Rivest
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits 2020-01-01 Kellie Ottoboni Matthew Bernhard J. Alex Halderman Ronald L. Rivest Philip B. Stark
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods 2020-01-01 Zhuoqun Huang Ronald L. Rivest Philip B. Stark Vanessa Teague Damjan Vukcevic
SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol 2020-01-01 John Meklenburg Michael A. Specter Michael Wentz Hari Balakrishnan Anantha P. Chandrakasan John R. Cohn G.F. Hatke Louise C. Ivers Ronald L. Rivest Gerald Jay Sussman
+
A "paradoxical" solution to the signature problem 2019-10-09 Shafi Goldwasser Silvio Micali Ronald L. Rivest
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits 2018-12-15 Kellie Ottoboni Matthew Bernhard J. Alex Halderman Ronald L. Rivest Philip B. Stark
Leading the field: Fortune favors the bold in Thurstonian choice models 2018-12-12 Steven N. Evans Ronald L. Rivest Philip B. Stark
$k$-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits 2018-11-21 Mayuri Sridhar Ronald L. Rivest
+
Bayesian Tabulation Audits: Explained and Extended. 2018-01-02 Ronald L. Rivest
Consistent Sampling with Replacement 2018-01-01 Ronald L. Rivest
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits 2018-01-01 Kellie Ottoboni Matthew Bernhard J. Alex Halderman Ronald L. Rivest Philip B. Stark
$k$-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits 2018-01-01 Mayuri Sridhar Ronald L. Rivest
Bayesian Tabulation Audits: Explained and Extended 2018-01-01 Ronald L. Rivest
+
BatchVote: Voting Rules Designed for Auditability 2017-11-01 Ronald L. Rivest Philip B. Stark Zara Perumal
Public Evidence from Secret Ballots 2017-07-26 Matthew Bernhard Josh Benaloh J. Alex Halderman Ronald L. Rivest Peter Y. A. Ryan Philip B. Stark Vanessa Teague Poorvi L. Vora Dan S. Wallach
+
31. Zahlentheoretische Algorithmen 2017-03-08 Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest Clifford Stein
ClipAudit: A Simple Risk-Limiting Post-Election Audit 2017-01-01 Ronald L. Rivest
Time-Space Trade-offs in Population Protocols 2017-01-01 Dan Alistarh James Aspnes David Eisenstat Rati Gelashvili Ronald L. Rivest
Public Evidence from Secret Ballots 2017-01-01 Matthew Bernhard Josh Benaloh J. Alex Halderman Ronald L. Rivest Peter Y. A. Ryan Philip B. Stark Vanessa Teague Poorvi L. Vora Dan S. Wallach
Public Evidence from Secret Ballots 2017-01-01 Matthew Bernhard Josh Benaloh J. Alex Halderman Ronald L. Rivest Peter Y. A. Ryan Philip B. Stark Vanessa Teague Poorvi L. Vora Dan S. Wallach
+
The Optimality of Correlated Sampling 2016-12-04 Mohammad Bavarian Badih Ghazi Elad Haramaty Pritish Kamath Ronald L. Rivest Madhu Sudan
The Optimality of Correlated Sampling. 2016-12-04 Mohammad Bavarian Badih Ghazi Elad Haramaty Pritish Kamath Ronald L. Rivest Madhu Sudan
Auditing Australian Senate Ballots. 2016-10-01 Berj Chilingirian Zara Perumal Ronald L. Rivest Grahame Bowland Andrew Conway Philip B. Stark Michelle Blom Chris Culnane Vanessa Teague
+
An IBE-based Signcryption Scheme for Group Key Management. 2016-03-31 Peter Gutmann Steven M. Bellovin Matt Blaze Ronald L. Rivest Nigel P. Smart
Time-Space Trade-offs in Molecular Computation 2016-02-25 Dan Alistarh James Aspnes David Eisenstat Rati Gelashvili Ronald L. Rivest
Auditing Australian Senate Ballots 2016-01-01 Berj Chilingirian Zara Perumal Ronald L. Rivest Grahame Bowland Andrew R. A. Conway Philip B. Stark Michelle Blom Chris Culnane Vanessa Teague
An IBE-based Signcryption Scheme for Group Key Management 2016-01-01 Peter Gutmann Steven M. Bellovin Matt Blaze Ronald L. Rivest Nigel P. Smart
Optimality of Correlated Sampling Strategies 2016-01-01 Mohammad Bavarian Badih Ghazi Elad Haramaty Pritish Kamath Ronald L. Rivest Madhu Sudan
Time-Space Trade-offs in Population Protocols 2016-01-01 Dan Alistarh James Aspnes David D. Eisenstat Rati Gelashvili Ronald L. Rivest
DiffSum - A Simple Post-Election Risk-Limiting Audit 2015-09-01 Ronald L. Rivest
End-to-end verifiability 2015-04-14 Josh Benaloh Ronald L. Rivest Peter Y. A. Ryan Philip B. Stark Vanessa Teague Poorvi L. Vora
DiffSum - A Simple Post-Election Risk-Limiting Audit 2015-01-01 Ronald L. Rivest
End-to-end verifiability 2015-01-01 Josh Benaloh Ronald L. Rivest Peter Y. A. Ryan Philip B. Stark Vanessa Teague Poorvi L. Vora
Leading the field: Fortune favors the bold in Thurstonian choice models 2014-09-20 Steven N. Evans Ronald L. Rivest Philip B. Stark
Leading the field: Fortune favors the bold in Thurstonian choice models 2014-01-01 Steven N. Evans Ronald L. Rivest Philip B. Stark
Picture-Hanging Puzzles 2013-09-12 Erik D. Demaine Martin L. Demaine Yair N. Minsky Joseph S. B. Mitchell Ronald L. Rivest Mihai Pătraşcu
+
Finding Four Million Large Random Primes 2007-12-03 Ronald L. Rivest
+
A “Paradoxical” Solution to The Signature Problem 2007-08-12 Shafi Goldwasser Silvio Micali Ronald L. Rivest
+
How to Leak a Secret: Theory and Applications of Ring Signatures 2006-01-01 Ronald L. Rivest Adi Shamir Yael Tauman
On the Notion of Pseudo-Free Groups 2004-01-01 Ronald L. Rivest
+
Permutation Polynomials Modulo 2w 2001-04-01 Ronald L. Rivest
+
How to Leak a Secret 2001-01-01 Ronald L. Rivest Adi Shamir Yael Tauman
+
On Choosing between Experimenting and Thinking when Learning 1993-09-01 Ronald L. Rivest Robert H. Sloan
+
Introduction to Algorithms 1991-09-01 V. J. Rayward‐Smith Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest
+
Making Maximum Entropy Computations Easier By Adding Extra Constraints (Extended Abstract) 1988-01-01 Sally A. Goldman Ronald L. Rivest

Commonly Cited References

Action Title Date Authors # of times referenced
Conservative statistical post-election audits 2008-06-01 Philip B. Stark 7
An introduction to the theory of numbers 1960-12-01 G. H. Hardy 3
+
An Introduction to the Theory of Numbers. By G. H. Hardy and E. M. Wright. 2nd edition. Pp. xvi, 407 25s. 1945. (Oxford) 1946-02-01 T. A. A. B. 3
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election 2015-01-01 J. Alex Halderman Vanessa Teague 3
Sequential Tests of Statistical Hypotheses 1945-06-01 A. Wald 2
+
A New Reconstruction of Multivariate Normal Orthant Probabilities 2007-11-02 Peter Craig 2
+
Group representations in probability and statistics 1988-01-01 Persi Diaconis 2
Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA 2020-01-01 Philip B. Stark 2
Evasion Attacks against Machine Learning at Test Time 2013-01-01 Battista Biggio Igino Corona Davide Maiorca Blaine Nelson Nedim Šrndić Pavel Laskov Giorgio Giacinto Fabio Roli 2
A sharper discrepancy measure for post-election audits 2008-09-01 Philip B. Stark 2
+
Group Signatures 1991-01-01 David Chaum Eugène van Heyst 2
PRADA: Protecting Against DNN Model Stealing Attacks 2019-06-01 Mika Juuti Sebastian Szyller Samuel Marchal N. Asokan 2
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain 2017-01-01 Tianyu Gu Brendan Dolan-Gavitt Siddharth Garg 2
Auditing Australian Senate Ballots. 2016-10-01 Berj Chilingirian Zara Perumal Ronald L. Rivest Grahame Bowland Andrew Conway Philip B. Stark Michelle Blom Chris Culnane Vanessa Teague 2
+
Bayesian Tabulation Audits: Explained and Extended. 2018-01-02 Ronald L. Rivest 2
SOBA: Secrecy-preserving Observable Ballot-level Audit 2011-01-01 Josh Benaloh Douglas W. Jones Eric Lazarus Mark Lindeman Philip B. Stark 2
Universal Adversarial Perturbations 2017-07-01 Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi Pascal Frossard 2
+
Group signatures 1991-04-08 David Chaum Eugène van Heyst 2
Limiting Risk by Turning Manifest Phantoms into Evil Zombies 2012-01-01 Jorge H. Banuelos Philip B. Stark 2
On Adaptive Attacks to Adversarial Example Defenses 2020-01-01 Florian Tramèr Nicholas Carlini Wieland Brendel Aleksander Mądry 2
+
The Analysis of Permutations 1975-01-01 R. L. Plackett 2
Poisoning Attacks against Support Vector Machines 2012-01-01 Battista Biggio Blaine Nelson Pavel Laskov 2
Efficient Computation of Exact IRV Margins 2015-01-01 Michelle Blom Peter J. Stuckey Vanessa Teague Ron Tidhar 2
ClipAudit: A Simple Risk-Limiting Post-Election Audit 2017-01-01 Ronald L. Rivest 2
The Modulo 1 Central Limit Theorem and Benford's Law for Products 2006-01-01 Steven J. Miller Mark J. Nigrini 2
Robustness May Be at Odds with Accuracy 2018-01-01 Dimitris Tsipras Shibani Santurkar Logan Engstrom Alexander Turner Aleksander Mądry 2
Technical Report on the CleverHans v2.1.0 Adversarial Examples Library 2016-01-01 Nicolas Papernot Fartash Faghri Nicholas Carlini Ian Goodfellow Reuben Feinman Alexey Kurakin Cihang Xie Yash Sharma T. B. Brown Aurko Roy 2
Next Steps for the Colorado Risk-Limiting Audit (CORLA) Program 2018-03-02 Mark Lindeman Neal McBurnett Kellie Ottoboni Philip B. Stark 2
Sampling: Design and Analysis 2000-05-01 Eric R. Ziegel Sharon L. Lohr 2
DiffSum - A Simple Post-Election Risk-Limiting Audit 2015-09-01 Ronald L. Rivest 2
+
ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES 1933-12-01 W. R THOMPSON 2
+
The diagonal of a double power series 1971-06-01 M. L. J. Hautus David A. Klarner 1
A Maximized Sequential Probability Ratio Test for Drug and Vaccine Safety Surveillance 2011-01-20 Martin Kulldorff Robert L. Davis MARGARETTE S. KOLCZAK Edwin Lewis Tracy A. Lieu Richard Platt 1
On the distribution of pseudoprimes 1981-01-01 Carl Pomerance 1
The pseudoprimes to 25⋅10⁹ 1980-01-01 Carl Pomerance J. L. Selfridge Samuel S. Wagstaff 1
Brunnian braids and some of their generalizations 1999-01-01 Theodore Stanford 1
+
Contributions to Group Theory 1984-01-01 K. I. Appel John G. Ratcliffe Paul E. Schupp 1
+
On the number of certain lattice polygons 1969-01-01 Georg Pólya 1
The probability that a random probable prime is composite 1989-01-01 Su Hee Kim Carl Pomerance 1
+
An Introduction to the Bootstrap 1994-05-15 Bradley Efron Robert Tibshirani 1
+
Reflection classes whose cubes cover the alternating group 1976-07-01 Gadi Moran 1
+
Threshold Ring Signatures and Applications to Ad-hoc Groups 2002-01-01 Emmanuel Bresson Jacques Stern Michael Szydlo 1
A new lower bound for the pseudoprime counting function 1982-03-01 Carl Pomerance 1
+
Combinatorial Group Theory 1990-01-01 Roger C. Lyndon Paul E. Schupp 1
Determining Majority in Networks with Local Interactions and Very Small Local Memory 2014-01-01 George B. Mertzios Sotiris Nikoletseas Christoforos Raptopoulos Paul G. Spirakis 1
Implicit function theorem over free groups 2005-06-10 Olga Kharlampovich Alexei Myasnikov 1
+
A combinatorial formula involving the Fredholm integral equation 1968-07-01 David A. Klarner 1
Equations in free groups 1960-01-01 Roger C. Lyndon 1
+
Approximating discrete probability distributions 1969-07-01 H. H. Ku S. Kullback 1
+
On the time required to detect cycles and connectivity in graphs 1972-03-01 Richard C. Holt Edward M. Reingold 1