Ron Rivest

Ron Rivest
Rivest in 2012
Born (1947-05-06) May 6, 1947 (age 77)
NationalityAmerican
Alma materYale University (BA)
Stanford University (PhD)
Known forPublic-key
RSA, RC2, RC4, RC5, RC6
MD2, MD4, MD5, MD6, Ring signature
Awards
Scientific career
Fields
InstitutionsMassachusetts Institute of Technology
ThesisAnalysis of associative retrieval algorithms (1974)
Doctoral advisorRobert W. Floyd
Doctoral students
Websitepeople.csail.mit.edu/rivest/

Ronald Linn Rivest (/rɪˈvɛst/;[3][4] born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an Institute Professor at the Massachusetts Institute of Technology (MIT),[5] and a member of MIT's Department of Electrical Engineering and Computer Science and its Computer Science and Artificial Intelligence Laboratory.

Along with Adi Shamir and Len Adleman, Rivest is one of the inventors of the RSA algorithm. He is also the inventor of the symmetric key encryption algorithms RC2, RC4, and RC5, and co-inventor of RC6. (RC stands for "Rivest Cipher".) He also devised the MD2, MD4, MD5 and MD6 cryptographic hash functions.

Education

Rivest earned a bachelor's degree in mathematics from Yale University in 1969, and a Ph.D. degree in computer science from Stanford University in 1974 for research supervised by Robert W. Floyd.[1]

Career

At MIT, Rivest is a member of the Theory of Computation Group, and founder of MIT CSAIL's Cryptography and Information Security Group.

Rivest was a founder of RSA Data Security (now merged with Security Dynamics to form RSA Security), Verisign, and of Peppercoin.

His former doctoral students include Avrim Blum, Benny Chor, Sally Goldman, Burt Kaliski, Anna Lysyanskaya, Ron Pinter, Robert Schapire, Alan Sherman,[1] and Mona Singh.[2]

Research

Rivest is especially known for his research in cryptography. He has also made significant contributions to algorithm design, to the computational complexity of machine learning, and to election security.

Cryptography

The publication of the RSA cryptosystem by Rivest, Adi Shamir, and Leonard Adleman in 1978[C1] revolutionized modern cryptography by providing the first usable and publicly described method for public-key cryptography. The three authors won the 2002 Turing Award, the top award in computer science, for this work. The award cited "their ingenious contribution to making public-key cryptography useful in practice".[6] The same paper that introduced this cryptosystem also introduced Alice and Bob, the fictional heroes of many subsequent cryptographic protocols.[7] In the same year, Rivest, Adleman, and Michael Dertouzos first formulated homomorphic encryption and its applications in secure cloud computing,[C2] an idea that would not come to fruition until over 40 years later when secure homomorphic encryption algorithms were finally developed.[8]

Rivest was one of the inventors of the GMR public signature scheme, published with Shafi Goldwasser and Silvio Micali in 1988,[C3][9] and of ring signatures, an anonymized form of group signatures invented with Shamir and Yael Tauman Kalai in 2001.[C7] He designed the MD4 and MD5 cryptographic hash functions, published in 1990 and 1992 respectively,[C4][C5] and a sequence of symmetric key block ciphers that include RC2, RC4, RC5, and RC6.[C6][C8]

Other contributions of Rivest to cryptography include chaffing and winnowing, the interlock protocol for authenticating anonymous key-exchange, cryptographic time capsules such as LCS35 based on anticipated improvements to computation speed through Moore's law, key whitening and its application through the xor–encrypt–xor key mode in extending the Data Encryption Standard to DES-X, and the Peppercoin system for cryptographic micropayments.

Algorithms

In 1973, Rivest and his coauthors published the first selection algorithm that achieved linear time without using randomization.[A1][10] Their algorithm, the median of medians method, is commonly taught in algorithms courses.[11] Rivest is also one of the two namesakes of the Floyd–Rivest algorithm, a randomized selection algorithm that achieves a near-optimal number of comparisons.[A2][12]

Rivest's 1974 doctoral dissertation concerned the use of hash tables to quickly match partial words in documents; he later published this work as a journal paper.[A3] His research from this time on self-organizing lists[A4] became one of the important precursors to the development of competitive analysis for online algorithms.[13] In the early 1980s, he also published well-cited research on two-dimensional bin packing problems,[A5] and on channel routing in VLSI design.[A6]

He is a co-author of Introduction to Algorithms (also known as CLRS), a standard textbook on algorithms, with Thomas H. Cormen, Charles E. Leiserson and Clifford Stein. First published in 1990, it has extended into four editions, the latest in 2022.[A7]

Learning

In the problem of decision tree learning, Rivest and Laurent Hyafil proved that it is NP-complete to find a decision tree that identifies each of a collection of objects through binary-valued questions (as in the parlor game of twenty questions) and that minimizes the expected number of questions that will be asked.[L1] With Avrim Blum, Rivest also showed that even for very simple neural networks it can be NP-complete to train the network by finding weights that allow it to solve a given classification task correctly.[L3] Despite these negative results, he also found methods for efficiently inferring decision lists,[L2] decision trees,[L4] and finite automata.[L5]

Elections

A significant topic in Rivest's more recent research has been election security, based on the principle of software independence: that the security of elections should be founded on physical records, so that hidden changes to software used in voting systems cannot result in undetectable changes to election outcomes. His research in this area includes improving the robustness of mix networks in this application,[V1] the 2006 invention of the ThreeBallot paper ballot based end-to-end auditable voting system (which he released into public domain in the interest of promoting democracy),[V2][6] and the development of the Scantegrity security system for optical scan voting systems.[V3]

He was a member of the Election Assistance Commission's Technical Guidelines Development Committee.[14]

Honors and awards

Rivest is a member of the National Academy of Engineering, the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptologic Research, and the American Academy of Arts and Sciences. Together with Adi Shamir and Len Adleman, he has been awarded the 2000 IEEE Koji Kobayashi Computers and Communications Award and the Secure Computing Lifetime Achievement Award. He also shared with them the Turing Award. Rivest has received an honorary degree (the "laurea honoris causa") from the Sapienza University of Rome.[15] In 2005, he received the MITX Lifetime Achievement Award. Rivest was named in 2007 the Marconi Fellow, and on May 29, 2008, he also gave the Chesley lecture at Carleton College. He was named an Institute Professor at MIT in June 2015.[16]

Selected publications

Rivest's publications include:

Algorithms

A1.
Blum, Manuel; Floyd, Robert W.; Pratt, Vaughan; Rivest, Ronald L.; Tarjan, Robert E. (1973). "Time bounds for selection" (PDF). Journal of Computer and System Sciences. 7 (4): 448–461. doi:10.1016/S0022-0000(73)80033-9. MR 0329916. Previously announced as "Linear time bounds for median computations", STOC 1972.
A2.
Floyd, Robert W.; Rivest, Ronald L. (March 1975). "Expected time bounds for selection". Communications of the ACM. 18 (3): 165–172. doi:10.1145/360680.360691. S2CID 3064709. See also "Algorithm 489: the algorithm SELECT—for finding the th smallest of elements", p. 173, doi:10.1145/360680.360694.
A3.
Rivest, Ronald L. (1976). "Partial-match retrieval algorithms". SIAM Journal on Computing. 5 (1): 19–50. doi:10.1137/0205003. MR 0395398. Previously announced at the 15th Annual Symposium on Switching and Automata Theory, 1974.
A4.
Rivest, Ronald (1976). "On self-organizing sequential search heuristics". Communications of the ACM. 19 (2): 63–67. doi:10.1145/359997.360000. MR 0408303. S2CID 498886. Previously announced at the 15th Annual Symposium on Switching and Automata Theory, 1974.
A5.
Baker, Brenda S.; Coffman, E. G. Jr.; Rivest, Ronald L. (1980). "Orthogonal packings in two dimensions". SIAM Journal on Computing. 9 (4): 846–855. CiteSeerX 10.1.1.309.8883. doi:10.1137/0209064. MR 0592771.
A6.
Rivest, Ronald L.; Fiduccia, Charles M. (1982). "A "greedy" channel router". In Crabbe, James S.; Radke, Charles E.; Ofek, Hillel (eds.). Proceedings of the 19th Design Automation Conference, DAC '82, Las Vegas, Nevada, USA, June 14–16, 1982. ACM and IEEE. pp. 418–424. doi:10.1145/800263.809239.
A7.
Cormen, Thomas H.; Leiserson, Charles E.; Rivest, Ronald L. (1990). Introduction to Algorithms (1st ed.). MIT Press and McGraw-Hill. ISBN 0-262-03141-8. 2nd edition, with Clifford Stein, 2001. 3rd edition, 2009. 4th edition, 2022.

Cryptography

C1.
C2.
Rivest, R.; Adleman, L.; Dertouzos, M. (1978). "On data banks and privacy homomorphisms". In DeMillo, Richard A. (ed.). Foundations of Secure Computation. Academic Press. pp. 169–177.
C3.
Goldwasser, Shafi; Micali, Silvio; Rivest, Ronald L. (1988). "A digital signature scheme secure against adaptive chosen-message attacks". SIAM Journal on Computing. 17 (2): 281–308. doi:10.1137/0217017. MR 0935341. S2CID 1715998. Previously announced as "A 'paradoxical' solution to the signature problem", FOCS 1984 and CRYPTO 1984.
C4.
Rivest, Ronald L. (October 1990). The MD4 Message Digest Algorithm. Network Working Group. doi:10.17487/RFC1186. RFC 1186.
C5.
Rivest, Ronald L. (April 1992). The MD5 Message-Digest Algorithm. Network Working Group. doi:10.17487/RFC1321. RFC 1321.
C6.
Rivest, Ronald L. (March 1998). A Description of the RC2(r) Encryption Algorithm. Network Working Group. doi:10.17487/RFC2268. RFC 2268.
C7.
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael (2001). "How to Leak a Secret". In Boyd, Colin (ed.). Advances in Cryptology – ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9–13, 2001, Proceedings. Lecture Notes in Computer Science. Vol. 2248. Springer. pp. 552–565. doi:10.1007/3-540-45682-1_32.
C8.
Rivest, Ronald L. (1994). "The RC5 encryption algorithm". In Preneel, Bart (ed.). Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14–16 December 1994, Proceedings. Lecture Notes in Computer Science. Vol. 1008. Springer. pp. 86–96. doi:10.1007/3-540-60590-8_7.

Learning

L1.
Hyafil, Laurent; Rivest, Ronald L. (May 1976). "Constructing optimal binary decision trees is NP-complete". Information Processing Letters. 5 (1): 15–17. doi:10.1016/0020-0190(76)90095-8. MR 0413598.
L2.
Rivest, Ronald L. (1987). "Learning decision lists". Machine Learning. 2 (3): 229–246. doi:10.1007/BF00058680. S2CID 2840541.
L3.
Blum, Avrim; Rivest, Ronald L. (1992). "Training a 3-node neural network is NP-complete". Neural Networks. 5 (1): 117–127. doi:10.1016/S0893-6080(05)80010-3. S2CID 8567973. Previously in NIPS 1988.
L4.
Quinlan, J. Ross; Rivest, Ronald L. (1989). "Inferring decision trees using the minimum description length principle". Information and Computation. 80 (3): 227–248. doi:10.1016/0890-5401(89)90010-2. MR 0984483.
L5.
Rivest, Ronald L.; Schapire, Robert E. (1993). "Inference of finite automata using homing sequences". Information and Computation. 103 (2): 299–347. doi:10.1006/inco.1993.1021. MR 1216458. Previously announced at STOC 1989.

Elections and voting

V1.
Jakobsson, Markus; Juels, Ari; Rivest, Ronald L. (2002). "Making mix nets robust for electronic voting by randomized partial checking". In Boneh, Dan (ed.). Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. Boston, Massachusetts: USENIX Association. pp. 339–353.
V2.
Rivest, Ronald L.; Smith, Warren D. (August 2007). "Three voting protocols: ThreeBallot, VAV, and Twin" (PDF). 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 07). Boston, Massachusetts: USENIX Association.
V3.
Chaum, David; Carback, Richard; Clark, Jeremy; Essex, Aleksander; Popoveniuc, Stefan; Rivest, Ronald L.; Ryan, Peter Y. A.; Shen, Emily; Sherman, Alan T. (2008). "Scantegrity II: end-to-end verifiability for optical scan election systems using invisible ink confirmation codes" (PDF). In Dill, David L.; Kohno, Tadayoshi (eds.). 2008 USENIX/ACCURATE Electronic Voting Workshop, EVT 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings. Boston, Massachusetts: USENIX Association.

Personal life

His son is Chris Rivest, entrepreneur and company co-founder.[17]

References

  1. ^ a b c d e f g h i j k Ron Rivest at the Mathematics Genealogy Project
  2. ^ a b Singh, Mona (1996). Learning algorithms with applications to robot navigation and protein folding (PhD thesis). Massachusetts Institute of Technology. hdl:1721.1/40579. OCLC 680493381. Free access icon
  3. ^ Archived at Ghostarchive and the Wayback Machine: RSA Conference (February 25, 2014). "The Cryptographers' Panel" – via YouTube.
  4. ^ Archived at Ghostarchive and the Wayback Machine: "Faculty Forum Online: Ron Rivest". YouTube.
  5. ^ Dizikes, Peter (June 29, 2015). "Chisholm, Rivest, and Thompson appointed as new Institute Professors: Biologist, computer scientist, and musician awarded MIT's highest faculty honor". MIT News. Massachusetts Institute of Technology.
  6. ^ a b "Ronald (Ron) Linn Rivest". ACM Turing Award laureates. Association for Computing Machinery. Retrieved April 15, 2023.
  7. ^ Hayes, Brian (September–October 2012). "Alice and Bob in cipherspace". Computing science. American Scientist. 100 (5). Sigma Xi: 362. doi:10.1511/2012.98.362. JSTOR 43707638.
  8. ^ Yi, Xun; Paulet, Russell; Bertino, Elisa (2014). Homomorphic Encryption and Applications. Springer Briefs in Computer Science. Springer International Publishing. doi:10.1007/978-3-319-12229-8. ISBN 978-3-319-12228-1. S2CID 11182158. See especially p. 47: "The concept of FHE was introduced by Rivest under the name privacy homomorphisms. The problem of constructing a scheme with these properties remained unsolved until 2009, when Gentry presented his breakthrough result."
  9. ^ Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (1996). "11.6.4 The GMR one-time signature scheme" (PDF). Handbook of Applied Cryptography. CRC Press. pp. 468–471. ISBN 0-8493-8523-7.
  10. ^ Paterson, Mike (1996). "Progress in selection". In Karlsson, Rolf G.; Lingas, Andrzej (eds.). Algorithm Theory – SWAT '96, 5th Scandinavian Workshop on Algorithm Theory, Reykjavík, Iceland, July 3–5, 1996, Proceedings. Lecture Notes in Computer Science. Vol. 1097. Springer. pp. 368–379. doi:10.1007/3-540-61422-2_146.
  11. ^ Gurwitz, Chaya (1992). "On teaching median-finding algorithms". IEEE Transactions on Education. 35 (3): 230–232. Bibcode:1992ITEdu..35..230G. doi:10.1109/13.144650.
  12. ^ Cunto, Walter; Munro, J. Ian (1989). "Average case selection". Journal of the ACM. 36 (2): 270–279. doi:10.1145/62044.62047. MR 1072421. S2CID 10947879.
  13. ^ Sleator, Daniel D.; Tarjan, Robert E. (1985). "Amortized efficiency of list update and paging rules". Communications of the ACM. 28 (2): 202–208. doi:10.1145/2786.2793. MR 0777385. S2CID 2494305.
  14. ^ "TGDC members". National Institute of Standards and Technology. May 6, 2009. Archived from the original on June 8, 2007.
  15. ^ Biography. Archived from the original on 2011-12-06.
  16. ^ "Chisholm, Rivest, and Thompson appointed as new Institute Professors". MIT News | Massachusetts Institute of Technology. June 29, 2015.
  17. ^ Cf. Acknowledgements, p.xxi, in Cormen, Rivest, et al., Introduction to Algorithms, MIT Press

Read other articles:

Kalam Mesir dalam wadah-wadah yang terbuat dari gading dan kayu, koleksi Museum Louvre[1] Kalam (κάλαμος kalamos; jamak Yunani: κάλαμοι kalamoi) adalah sejenis alat tulis yang terbuat dari setangkai gelagah atau sebatang buluh yang dipotong dan diraut. Kalam mirip pena berujung belah telah ditemukan di situs-situs Mesir Kuno yang berasal dari abad ke-4 SM. Kalam digunakan untuk menulis pada papirus, dan merupakan alat tulis yang paling lazim digunakan pada zaman kuno. Ka...

 

قرية ألغاني الإحداثيات 42°05′34″N 78°29′41″W / 42.0928°N 78.4947°W / 42.0928; -78.4947   [1] تقسيم إداري  البلد الولايات المتحدة[2]  التقسيم الأعلى مقاطعة كاتاروغوس  خصائص جغرافية  المساحة 1.845366 كيلومتر مربع1.845663 كيلومتر مربع (1 أبريل 2010)  ارتفاع 433 متر  عدد ال�...

 

Ridge on the cerebral cortex of the brain For the video game, see Gyruss. Gyral redirects here. For the album, see Gyral (album). Not to be confused with Girus. GyrusGyrus and sulcusIdentifiersTA98A14.1.09.004TA25432FMA83874Anatomical terminology[edit on Wikidata] Gray's FIG. 726 – Lateral surface of left cerebral hemisphere, viewed from the side Gray's Fig. 727 – Medial surface of left cerebral hemisphere In neuroanatomy, a gyrus (pl.: gyri) is a ridge on the cerebral cortex. It is g...

American poet (1849–1887) Emma LazarusLazarus, c. 1872Born(1849-07-22)July 22, 1849New York City, New York, U.S.DiedNovember 19, 1887(1887-11-19) (aged 38)New York CityResting placeBeth Olam Cemetery in Brooklyn, New York CityOccupationAuthor, activistLanguageEnglishGenrepoetry, prose, translations, novels, playsSubjectGeorgismNotable worksThe New ColossusRelativesJosephine Lazarus, Benjamin N. CardozoSignature Emma Lazarus (July 22, 1849 – November 19, 1887) was an American au...

 

AntifragileDigital dan sampul versi Vol.1 Midnight OnyxAlbum mini karya Le SserafimDirilis17 Oktober 2022 (2022-10-17)Direkam2022StudioHybe Studio (Yongsan, Seoul)[1]BahasaKoreaLabel Source YG Plus Produser 13 Sir Nolan Alex Bilowitz Kronologi Le Sserafim Fearless(2022) Antifragile(2022) Unforgiven(2023) Singel dalam album Antifragile AntifragileDirilis: 17 Oktober 2022 Antifragile adalah album mini kedua dari grup vokal wanita Korea Selatan Le Sserafim, dirilis oleh Source M...

 

Amerika Lockheed XFV (kadang-kadang disebut sebagai Salmon)[1] adalah pesawat tempur bermesin turboprop prototipe eksperimen tailsitter dibangun oleh Lockheed di awal 1950-an untuk menunjukkan pengoperasian pesawat tempur lepas landas dan mendarat vertikal untuk melindungi konvoi. Referensi ^ Taylor 1999, p. 101. Allen, Francis J. Bolt upright: Convair's and Lockheed's VTOL fighters. Air Enthusiast (Key Publishing), Volume 127, January/February 2007, pp. 13–20. ISSN 0143-5450....

У этого термина существуют и другие значения, см. Яшма (значения). Запрос «Яспис» перенаправляется сюда. На эту тему нужно создать отдельную статью. Яшма (Jasper) Минералы SiO2; Al2O3, Fe3O4 и др. Плотность 2,65 г/см³ Твёрдость 7  Медиафайлы на Викискладе Отшлифованная яшма Почтовая м�...

 

يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (ديسمبر 2018) 23° خط عرض 23 شمال خريطة لجميع الإحداثيات من جوجل خريطة لجميع الإحداثيات من بينغ تصدير جميع الإحداثيات من ك...

 

Borderland between heaven and hell in Islam This article duplicates the scope of other articles, specifically Al-A'raf. Please discuss this issue and help introduce a summary style to the article. (February 2021) Diagram of Plain of Assembly (Ard al-Hashr) on Judgment Day, from an autograph manuscript of Futuhat al-Makkiyya by Ibn Arabi, the Sufi mystic and Muslim philosopher, with the 'Araf Bridge), Jahannam (Hell), and Marj al-Jannat (Meadow of Paradise).[1] In Islam, al-A'raf (Arab...

Glass produced during the Hellenistic period Hellenistic glass Hellenistic glass was glass produced during the Hellenistic period (4th century BC – 5th century AD) in the Mediterranean, Europe, western Asia and northern Africa. Glassmaking at this time was based on the technological traditions of the Classical antiquity and the Late Bronze Age,[1] but was marked by transition from limited production of luxury objects made for the social elite to mass production of affordable glass v...

 

PausBonifasius IIAwal masa kepausan530Akhir masa kepausan532PendahuluFeliks IVPenerusYohanes IIInformasi pribadiNama lahirtidak diketahuiLahirtanggal tidak diketahuitempat tidak diketahuiWafat532tempat tidak diketahuiPaus lainnya yang bernama Bonifasius Paus Bonifasius II (???-532) adalah Paus Gereja Katolik Roma sejak 530 hingga 532. Ia adalah seorang kelahiran Ostrogotik, dan merupakan Paus Jerman yang pertama. Ia mendapatkan kedudukannya sebagai Paus atas pengaruh Raja Gotik Athalaric. Bon...

 

Seclusion from unwanted attention Private information redirects here. For personally identifying information, see Personal information. For information transmitted privately, see Secrecy. For the 1952 film, see Private Information. For other uses, see Privacy (disambiguation). Banksy's One Nation Under CCTV graffiti, adjacent to an actual CCTV camera Privacy (UK: /ˈprɪvəsiː/, US: /ˈpraɪ-/)[1][2] is the ability of an individual or group to seclude themselves or informatio...

Edgar Douglas Adrian Premio Nobel per la medicina 1932 Edgar Douglas Adrian, I barone Adrian (Londra, 30 novembre 1889[1] – Londra, 8 agosto 1977), è stato un medico e fisiologo britannico, vincitore del Premio Nobel per la medicina nel 1932. Indice 1 Biografia 1.1 Inizio degli studi 1.2 Esperienza clinica 1.3 Carriera accademica e prime ricerche 1.4 Studi sul sistema nervoso centrale 1.5 Ultimi anni 2 La strada verso il Nobel 3 Meriti 4 Scritti principali 5 Onorificenze 6 Note...

 

State of Mexico This article is about a state in Mexico. For other uses, see Guanajuato (disambiguation). State in MexicoGuanajuato Uanahuatö (Otomí)StateFree and Sovereign State of Guanajuato Estado Libre y Soberano de Guanajuato (Spanish) Hyodi Uanahuatö (Otomí) FlagCoat of armsState of Guanajuato within MexicoCoordinates: 21°1′N 101°16′W / 21.017°N 101.267°W / 21.017; -101.267CountryMexicoCapitalGuanajuatoLargest CityLeónLargest metroGreater LeónM...

 

Method of mass spectrometry Laser ionization time-of-flight mass spectrometer where ions are accelerated and separated by mass in a field-free drift region before detection Bendix MA-2 Time-of-Flight Mass Spectrometer, 1960s Time-of-flight mass spectrometry (TOFMS) is a method of mass spectrometry in which an ion's mass-to-charge ratio is determined by a time of flight measurement. Ions are accelerated by an electric field of known strength.[1] This acceleration results in an ion havi...

Slovenian communist politician and revolutionary Boris KidričPrime Minister of SloveniaIn office5 May 1945 – June 1946PresidentJosip VidmarPreceded byPosition EstablishedSucceeded byMiha Marinko Personal detailsBorn10 April 1912Vienna, Austria-HungaryDied11 April 1953(1953-04-11) (aged 41)Belgrade, PR Serbia, YugoslaviaPolitical partyLeague of Communists Boris Kidrič burial in 1953. Boris Kidrič (10 April 1912 – 11 April 1953) was a Slovene and Yugoslav politician and rev...

 

Australian politician W.J.F. McDonald. Sir William John Farquhar Black Jack McDonald (3 October 1911 – 13 September 1995) was an Australian politician. He was born at Binnum in South Australia to grazier John Nicholson McDonald and Sarah McInnes, and attended the local state school and then Scotch College in Adelaide. He was a grazier in South Australia from 1930, moving to a sheep station near Neuarpurr in Victoria in 1935. On 15 August 1935 he married Evelyn Margaret Koch, with whom h...

 

For other uses of Liwa, see Liwa (disambiguation). Oasis in Abu Dhabi, United Arab EmiratesLiwa Oasis وَاحَـة لِـيْـوَاOasisA falaj in Qasr Al Sarab, Liwa Oasis.Liwa OasisLocation of Mezairaa, UAE. Considered the largest town in Liwa OasisCoordinates: 23°07′56″N 53°47′48″E / 23.13231°N 53.79662°E / 23.13231; 53.79662 (Mezairaa)Country United Arab EmiratesEmirate Abu DhabiMunicipal regionAl GharbiaGovernment • Ty...

Sweden-related events during the year of 1819 Years in Sweden: 1816 1817 1818 1819 1820 1821 1822 Centuries: 18th century · 19th century · 20th century Decades: 1780s 1790s 1800s 1810s 1820s 1830s 1840s Years: 1816 1817 1818 1819 1820 1821 1822 Events from the year 1819 in Sweden Incumbents Monarch – Charles XIV John Events 7 October - Södertälje Canal - The charitable s...

 

Former settlement in North Carolina, United States This article is about the former populated place. For the historic district, see Brunswick Town Historic District. Boardwalk overlooking the Cape Fear River Brunswick Town was a prominent town in colonial North Carolina. It was the first successful European settlement in the Cape Fear region, a major colonial port in the 18th century, and home to two provincial governors. Brunswick Town existed for 50 years until it was burnt in a 1776 raid b...