Burton S. Kaliski Jr.
Burton Stephen Kaliski Jr. – Burt Kaliski
Person information
- affiliation: Verisign, Reston, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2017
- [i16]Burton S. Kaliski Jr.:
A Quantum "Magic Box" for the Discrete Logarithm Problem. IACR Cryptology ePrint Archive 2017: 745 (2017) - [i15]Kathleen M. Moriarty, Burt Kaliski, Andreas Rusch:
PKCS #5: Password-Based Cryptography Specification Version 2.1. RFC 8018: 1-40 (2017) - 2016
- [i14]Kathleen M. Moriarty, Burt Kaliski, Jakob Jonsson, Andreas Rusch:
PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017: 1-78 (2016) - 2012
- [j9]Noa Agmon, Vikas Agrawal, David W. Aha, Yiannis Aloimonos, Donagh Buckley, Prashant Doshi, Christopher W. Geib, Floriana Grasso, Nancy Green, Benjamin Johnston, Burt Kaliski, Christopher Kiekintveld, Edith Law, Henry Lieberman, Ole J. Mengshoel, Ted Metzler, Joseph Modayil, Douglas W. Oard, Nilufer Onder, Barry O'Sullivan, Katerina Pastra, Doina Precup, Sowmya Ramachandran, Chris Reed, Sanem Sariel Talay, Ted Selker, Lokendra Shastri, Stephen F. Smith, Satinder P. Singh, Siddharth Srivastava, Gita Sukthankar, David C. Uthus, Mary-Anne Williams:
Reports of the AAAI 2011 Conference Workshops. AI Magazine 33(1) (2012) - [c25]
- 2011
- [r79]Burt Kaliski:
Asymmetric Cryptosystem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 49-50 - [r78]
- [r77]
- [r76]
- [r75]
- [r74]
- [r73]
- [r72]Burt Kaliski:
Euler's Totient Function. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 430 - [r71]
- [r70]
- [r69]
- [r68]
- [r67]
- [r66]
- [r65]
- [r64]
- [r63]
- [r62]
- [r61]
- [r60]
- [r59]
- [r58]
- [r57]
- [r56]
- [r55]
- [r54]
- [r53]
- [r52]
- [r51]
- [r50]Burt Kaliski:
Quadratic Residuosity Problem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1003 - [r49]
- [r48]
- [r47]Burt Kaliski:
RSA Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1061-1064 - [r46]Burt Kaliski:
RSA Factoring Challenge. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1064-1065 - [r45]Ronald L. Rivest, Burt Kaliski:
RSA Problem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1065-1069 - [r44]
- [r43]
- [r42]
- [r41]Burt Kaliski:
Symmetric Cryptosystem. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1271 - 2010
- [c24]Burton S. Kaliski Jr., Wayne Pauley:
Toward Risk Assessment as a Service in Cloud Environments. HotCloud 2010 - [p1]Jeffrey M. Nick, David Cohen, Burton S. Kaliski Jr.:
Key Enabling Technologies for Virtual Private Clouds. Handbook of Cloud Computing 2010: 47-63 - [i13]Randall J. Atkinson, Burt Kaliski, John G. Brainard, Sean Turner:
Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS). RFC 5990: 1-27 (2010)
2000 – 2009
- 2008
- [i12]Burt Kaliski:
Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2. RFC 5208: 1-8 (2008) - 2007
- [c23]Ari Juels, Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files. ACM Conference on Computer and Communications Security 2007: 584-597 - 2005
- [c22]Michael Szydlo, Burton S. Kaliski Jr.:
Proofs for Two-Server Password Authentication. CT-RSA 2005: 227-244 - [r40]
- [r39]
- [r38]
- [r37]
- [r36]
- [r35]
- [r34]
- [r33]
- [r32]
- [r31]
- [r30]
- [r29]
- [r28]
- [r27]
- [r26]
- [r25]
- [r24]
- [r23]
- [r22]
- [r21]
- [r20]
- [r19]
- [r18]
- [r17]
- [r16]
- [r15]
- [r14]
- [r13]
- [r12]Burton S. Kaliski Jr.:
Quadratic Residuosity Problem. Encyclopedia of Cryptography and Security 2005 - [r11]
- [r10]
- [r9]
- [r8]
- [r7]
- [r6]
- [r5]
- [r4]
- [r3]
- [r2]
- [r1]Ronald L. Rivest, Burton S. Kaliski Jr.:
RSA Problem. Encyclopedia of Cryptography and Security 2005 - [i11]Jim Schaad, Burt Kaliski, Russ Housley:
Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 4055: 1-25 (2005) - 2004
- [c21]
- 2003
- [c20]John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo:
A New Two-Server Approach for Authentication with Short Secrets. USENIX Security Symposium 2003 - [e2]Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science 2523, Springer 2003, ISBN 3-540-00409-2 [contents] - [i10]Jakob Jonsson, Burt Kaliski:
Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447: 1-72 (2003) - 2002
- [c19]Jakob Jonsson, Burton S. Kaliski Jr.:
On the Security of RSA Encryption in TLS. CRYPTO 2002: 127-142 - [c18]
- 2001
- [j8]Burton S. Kaliski Jr.:
An unknown key-share attack on the MQV key agreement protocol. ACM Trans. Inf. Syst. Secur. 4(3): 275-288 (2001) - 2000
- [c17]Warwick Ford, Burton S. Kaliski Jr.:
Server-Assisted Generation of a Strong Secret from a Password. WETICE 2000: 176-180 - [i9]
- [i8]Magnus Nyström, Burt Kaliski:
PKCS #9: Selected Object Classes and Attribute Types Version 2.0. RFC 2985: 1-42 (2000) - [i7]Magnus Nyström, Burt Kaliski:
PKCS #10: Certification Request Syntax Specification Version 1.7. RFC 2986: 1-14 (2000)
1990 – 1999
- 1999
- [c16]Burton S. Kaliski Jr., Moses Liskov:
Efficient Finite Field Basis Conversion Involving Dual Bases. CHES 1999: 135-143 - 1998
- [c15]Burton S. Kaliski Jr.:
Emerging Standards for Public-Key Cryptography. Lectures on Data Security 1998: 87-104 - [c14]Burton S. Kaliski Jr.:
ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). ASIACRYPT 1998: 50 - [c13]Burton S. Kaliski Jr., Yiqun Lisa Yin:
Storage-Efficient Finite Field Basis Conversion. Selected Areas in Cryptography 1998: 81-93 - [i6]
- [i5]
- [i4]
- [i3]Burt Kaliski, Jessica Staddon:
PKCS #1: RSA Cryptography Specifications Version 2.0. RFC 2437: 1-39 (1998) - 1997
- [j7]Burton S. Kaliski Jr.:
A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem. J. Cryptology 10(1): 71-72 (1997) - [e1]Burton S. Kaliski Jr.:
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. Lecture Notes in Computer Science 1294, Springer 1997, ISBN 3-540-63384-7 [contents] - 1996
- [j6]Mahdi Abdelguerfi, Burton S. Kaliski Jr., Wayne Patterson:
Guest Editors' Introduction: Public-Key Security Systems. IEEE Micro 16(3): 10-13 (1996) - [j5]Çetin Kaya Koç, Tolga Acar, Burton S. Kaliski Jr.:
Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3): 26-33 (1996) - [c12]Burton S. Kaliski Jr.:
IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract). Security Protocols Workshop 1996: 117-118 - 1995
- [j4]Burton S. Kaliski Jr.:
The Montgomery Inverse and Its Applications. IEEE Trans. Computers 44(8): 1064-1065 (1995) - [c11]Burton S. Kaliski Jr., Yiqun Lisa Yin:
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. CRYPTO 1995: 171-184 - 1994
- [c10]Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations. CRYPTO 1994: 26-39 - [c9]Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations and FEAL. FSE 1994: 249-264 - 1993
- [j3]
- [c8]
- [i2]Burton S. Kaliski Jr.:
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services. RFC 1424: 1-9 (1993) - 1992
- [i1]
- 1991
- [j2]
- 1990
- [c7]Stephen R. Dussé, Burton S. Kaliski Jr.:
A Cryptographic Library for the Motorola DSP56000. EUROCRYPT 1990: 230-244 - [c6]
1980 – 1989
- 1988
- [b1]Burton Stephen Kaliski Jr.:
Elliptic curves and cryptography: a pseudorandom bit generator and other tools. Massachusetts Institute of Technology, Cambridge, MA, USA 1988 - [j1]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). J. Cryptology 1(1): 3-36 (1988) - 1986
- [c5]Burton S. Kaliski Jr.:
A Pseudo-Random Bit Generator Based on Elliptic Logarithms. CRYPTO 1986: 84-103 - 1985
- [c4]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). CRYPTO 1985: 212-226 - [c3]Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract). EUROCRYPT 1985: 81-95 - 1984
- [c2]Burton S. Kaliski Jr.:
Wyner's Analog Encryption Scheme: Results of a Simulation. CRYPTO 1984: 83-94 - 1983
- [c1]Joseph R. Fisher, Martin E. Kaliski, Burton S. Kaliski Jr.:
A new level of signal processing software: Automatic buffer address generation. ICASSP 1983: 1180-1183
Coauthor Index
last updated on 2019-01-11 22:28 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint