Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Computer_Scientist
|
gptkbp:academic_advisor |
gptkb:Shafi_Goldwasser
gptkb:Silvio_Micali |
gptkbp:affiliation |
gptkb:Massachusetts_Institute_of_Technology
|
gptkbp:awards |
gptkb:Turing_Award
|
gptkbp:birth_date |
1971-05-31
|
gptkbp:contribution |
gptkb:crypt
gptkb:blockchain_technology gptkb:quantum_cryptography gptkb:random_number_generation data integrity data protection laws risk management authentication methods digital signatures incident management incident response network security secure communication security audits cryptographic standards penetration testing hash functions cryptographic protocols digital certificates digital forensics security awareness training encryption algorithms security frameworks threat modeling cybersecurity education secure multiparty computation vulnerability assessments zero-knowledge proofs secure key exchange secure cloud computing secure voting systems cyber law privacy-preserving protocols secure communications protocols secure software development information security policy |
gptkbp:field |
gptkb:crypt
|
gptkbp:founder |
gptkb:MIT_Media_Lab
|
https://www.w3.org/2000/01/rdf-schema#label |
Rivest, Ronald L.
|
gptkbp:influenced |
gptkb:Whitfield_Diffie
|
gptkbp:influenced_by |
gptkb:Claude_Shannon
|
gptkbp:known_for |
RSA algorithm
|
gptkbp:nationality |
gptkb:American
|
gptkbp:published_work |
gptkb:The_RSA_Public-Key_Cryptosystem
gptkb:Introduction_to_Algorithms Cryptography and Network Security |
gptkbp:research_interest |
algorithm design
information theory computer security |
gptkbp:bfsParent |
gptkb:Charles_E._Leiserson
|
gptkbp:bfsLayer |
5
|