Name
Affiliation
Papers
RICHARD J. LIPTON
Princeton University Department of Computer Science Princeton NJ Princeton NJ
178
Collaborators
Citations 
PageRank 
165
6412
1796.57
Referers 
Referees 
References 
9102
1548
1412
Search Limit
1001000
Title
Citations
PageRank
Year
On the Skolem Problem and the Skolem Conjecture00.342022
Provably Secure Virus Detection: Using The Observer Effect Against Malware.20.402016
Towards Provably-Secure Remote Memory Attestation.00.342015
Simulating Special but Natural Quantum Circuits00.342012
Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs10.352012
Might Turing Have Won a Turing Award?00.342012
Best-order streaming model60.502011
Symmetric functions capture general functions00.342011
Quantum complexity: some recent results, some open problems, some thoughts00.342011
Regret-Minimizing Representative Databases.00.342010
Platform-independent programs30.642010
Realizable paths and the nl vs l problem00.342010
Deterministically testing sparse polynomial identities of unbounded degree180.842009
Algorithms for Modular Counting of Roots of Multivariate Polynomials30.432008
Polynomials that Sign Represent Parity and Descartes' Rule of Signs20.402008
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions452.342008
Symmetric polynomials over Zm and simultaneous communication protocols110.612006
Perfectly secure password protocols in the bounded retrieval model753.512006
On the Fourier Spectrum of Symmetric Boolean Functions with Applications to Learning Symmetric Juntas130.692005
Intrusion-Resilient Authentication in the Limited Communication Model.00.342005
Time-space lower bounds for satisfiability301.012005
Nash Equilibria via Polynomial Equations222.122004
The Degree of Threshold Mod 6 and Diophantine Equations00.342004
Mandatory human participation: a new authentication scheme for building secure systems70.632003
Playing large games using simple strategies18813.232003
Randomized Time-Space Tradeoffs for Directed Graph Connectivity10.372003
A Note on Square Rooting of Time Functions of Turing Machines00.342003
Non-uniform Depth of Polynomial Time and Space Simulations30.382003
Gamma system: continuous evolution of software after deployment665.252002
Spy: A Method to Secure Clients for Network Services50.452002
Fidelity of enzymatic ligation for DNA computing.10.352000
On the complexity of SAT210.931999
DNA²DNA Computations: A Potential "Killer App"?111.181997
DNA2DNA Computation: A Potential Killer Application?00.341997
Making DNA computers error resistant.253.411996
Clock Buffer Placement Algorithm for Wire-Delay-Dominated Timing Model40.601996
DNA computations can have global memory00.341996
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)4913.861996
Communication Complexity of Key Agreement on Small Ranges10.371995
Speeding up computations via molecular biology.2132.921995
Simple strategies for large zero-sum games with applications to complexity theory355.091994
The complexity of the membership problem for 2-generated commutative semigroups of rational matrices80.961994
PSPACE is provable by two provers in one round248.611994
Subquadratic Simulations of Balanced Formulae by Branching Programs20.381994
A New Approach To Information Theory272.141994
Some Consequences of Our Failure to Prove Non-Linear Lower Bounds on Explicit Functions20.371994
Clocked Adversaries for Hashing91.501993
Efficient sampling strategies for relational database operations5617.171993
A Monte-Carlo algorithm for estimating the permanent485.571993
A class of randomized strategies for low-cost comparison of file copies168.021991
  • 1
  • 2