Introduction to algorithms TH Cormen, CE Leiserson, RL Rivest, C Stein MIT press, 2022 | 63969 | 2022 |

A method for obtaining digital signatures and public-key cryptosystems RL Rivest, A Shamir, L Adleman Communications of the ACM 21 (2), 120-126, 1978 | 26147 | 1978 |

The MD5 message-digest algorithm R Rivest | 6309 | 1992 |

A digital signature scheme secure against adaptive chosen-message attacks S Goldwasser, S Micali, RL Rivest SIAM Journal on computing 17 (2), 281-308, 1988 | 3675 | 1988 |

On data banks and privacy homomorphisms RL Rivest, L Adleman, ML Dertouzos Foundations of secure computation 4 (11), 169-180, 1978 | 3007 | 1978 |

Security and privacy aspects of low-cost radio frequency identification systems SA Weis, SE Sarma, RL Rivest, DW Engels Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 2301 | 2004 |

How to leak a secret RL Rivest, A Shamir, Y Tauman Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 2260 | 2001 |

Time bounds for selection M Blum, RW Floyd, VR Pratt, RL Rivest, RE Tarjan J. Comput. Syst. Sci. 7 (4), 448-461, 1973 | 1705 | 1973 |

Cryptographic communications system and method RL Rivest, A Shamir, LM Adleman US Patent 4,405,829, 1983 | 1631 | 1983 |

The RC5 encryption algorithm RL Rivest Fast Software Encryption: Second International Workshop Leuven, Belgium …, 2005 | 1604 | 2005 |

Constructing optimal binary decision trees is NP-complete H Laurent, RL Rivest Information processing letters 5 (1), 15-17, 1976 | 1409 | 1976 |

The blocker tag: Selective blocking of RFID tags for consumer privacy A Juels, RL Rivest, M Szydlo Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 1367 | 2003 |

Learning decision lists RL Rivest Machine learning 2, 229-246, 1987 | 1327 | 1987 |

SPKI certificate theory C Ellison, B Frantz, B Lampson, R Rivest, B Thomas, T Ylonen | 1265 | 1999 |

Secure communications over insecure channels RC Merkle Communications of the ACM 21 (4), 294-299, 1978 | 1084 | 1978 |

PayWord and MicroMint: Two simple micropayment schemes RL Rivest, A Shamir Lecture Notes in Computer Science 1189, 69-88, 1997 | 1079 | 1997 |

Inferring decision trees using the minimum description lenght principle JR Quinlan, RL Rivest Information and computation 80 (3), 227-248, 1989 | 1032 | 1989 |

Training a 3-node neural network is NP-complete A Blum, R Rivest Advances in neural information processing systems 1, 1988 | 1020 | 1988 |

MD4 message digest algorithm RL Rivest | 941 | 1990 |

Orthogonal packings in two dimensions BS Baker, EG Coffman, Jr, RL Rivest SIAM Journal on computing 9 (4), 846-855, 1980 | 925 | 1980 |