Burton S. Kaliski Jr.

Orcid: 0000-0002-1233-5380

Affiliations:
  • Verisign, Reston, Virginia, USA


According to our database1, Burton S. Kaliski Jr. authored at least 133 papers between 1983 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice.
IACR Cryptol. ePrint Arch., 2022

2021
Standardizing Confidentiality Protections for Domain Name System Exchanges: Multiple Approaches, New Functionality.
IEEE Commun. Stand. Mag., 2021

2017
PKCS #5: Password-Based Cryptography Specification Version 2.1.
RFC, January, 2017

A Quantum "Magic Box" for the Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2017

2016
PKCS #1: RSA Cryptography Specifications Version 2.2.
RFC, November, 2016

2012
Reports of the AAAI 2011 Conference Workshops.
AI Mag., 2012

Revisiting DNS and WHOIS in the cloud era.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
RSA Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Primitive Element.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Polynomial Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Order.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

<i>O</i>-Notation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Number Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Moore's Law.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

MIPS-Year.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Legendre Symbol.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Jacobi Symbol.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Irreducible Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Homomorphism.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hard-Core Bit.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Group.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Finite Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Factor Base.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Extension Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Exponential Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Euler's Totient Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Encryption Exponent.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Decryption Exponent.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Claw-Free.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Blum Integer.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Binomial Distribution.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Symmetric Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Subgroup.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Subexponential Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Sieving.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

RSA Factoring Challenge.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

RSA Digital Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Relatively Prime.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Quadratic Residuosity Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Quadratic Residue.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Pseudorandom Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Berlekamp <i>Q</i>-matrix.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Asymmetric Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS).
RFC, September, 2010

Toward Risk Assessment as a Service in Cloud Environments.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Cloud Computing, 2010

Key Enabling Technologies for Virtual Private Clouds.
Proceedings of the Handbook of Cloud Computing., 2010

2008
Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2.
RFC, May, 2008

2007
Pors: proofs of retrievability for large files.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2005
Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
RFC, June, 2005

RSA Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Polynomial Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Order.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Symmetric Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Subgroup.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Subexponential Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Sieving.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

RSA factoring challenge.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

RSA Digital Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Relatively Prime.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Quadratic Residuosity Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Quadratic Residue.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Pseudorandom Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Primitive Element.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

<i>O</i>-Notation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Number Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Moore's Law.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

MIPS-Year.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Legendre Symbol.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Jacobi Symbol.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Irreducible Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Homomorphism.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Hard-Core Bit.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Group.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Generator.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Finite Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Field Polynomial.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Factor Base.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Extension Field.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Exponential Time.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Euler's Totient Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Encryption Exponent.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Decryption Exponent.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Claw-Free.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Blum Integer.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Binomial Distribution.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Berlekamp <i>Q</i>-matrix.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Asymmetric Cryptosystem.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Proofs for Two-Server Password Authentication.
Proceedings of the Topics in Cryptology, 2005

2004
RFID Privacy: Challenges and Progress.
Proceedings of the ISSE 2004, 2004

2003
Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1.
RFC, February, 2003

A New Two-Server Approach for Authentication with Short Secrets.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2002
On Hash Function Firewalls in Signature Schemes.
Proceedings of the Topics in Cryptology, 2002

On the Security of RSA Encryption in TLS.
Proceedings of the Advances in Cryptology, 2002

2001
An unknown key-share attack on the MQV key agreement protocol.
ACM Trans. Inf. Syst. Secur., 2001

2000
PKCS #10: Certification Request Syntax Specification Version 1.7.
RFC, November, 2000

PKCS #9: Selected Object Classes and Attribute Types Version 2.0.
RFC, November, 2000

PKCS #5: Password-Based Cryptography Specification Version 2.0.
RFC, September, 2000

Server-Assisted Generation of a Strong Secret from a Password.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

1999
Efficient Finite Field Basis Conversion Involving Dual Bases.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
PKCS #1: RSA Cryptography Specifications Version 2.0.
RFC, October, 1998

PKCS #7: Cryptographic Message Syntax Version 1.5.
RFC, March, 1998

PKCS #10: Certification Request Syntax Version 1.5.
RFC, March, 1998

PKCS #1: RSA Encryption Version 1.5.
RFC, March, 1998

Storage-Efficient Finite Field Basis Conversion.
Proceedings of the Selected Areas in Cryptography '98, 1998

ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract).
Proceedings of the Advances in Cryptology, 1998

Emerging Standards for Public-Key Cryptography.
Proceedings of the Lectures on Data Security, 1998

1997
A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem.
J. Cryptol., 1997

1996
Analyzing and comparing Montgomery multiplication algorithms.
IEEE Micro, 1996

Guest Editors' Introduction: Public-Key Security Systems.
IEEE Micro, 1996

IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract).
Proceedings of the Security Protocols, 1996

1995
The Montgomery Inverse and Its Applications.
IEEE Trans. Computers, 1995

On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1995

1994
Linear Cryptanalysis Using Multiple Approximations and FEAL.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Linear Cryptanalysis Using Multiple Approximations.
Proceedings of the Advances in Cryptology, 1994

1993
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services.
RFC, February, 1993

A survey of encryption standards.
IEEE Micro, 1993

Fast Block Cipher Proposal.
Proceedings of the Fast Software Encryption, 1993

1992
The MD2 Message-Digest Algorithm.
RFC, April, 1992

1991
One-Way Permutations on Elliptic Curves.
J. Cryptol., 1991

1990
The MD4 Message Digest Algorithm (Abstract).
Proceedings of the Advances in Cryptology, 1990

A Cryptographic Library for the Motorola DSP56000.
Proceedings of the Advances in Cryptology, 1990

1988
Elliptic curves and cryptography: a pseudorandom bit generator and other tools.
PhD thesis, 1988

Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
J. Cryptol., 1988

1986
A Pseudo-Random Bit Generator Based on Elliptic Logarithms.
Proceedings of the Advances in Cryptology, 1986

1985
Is the Data Encryption Standard a Group? (Preliminary Abstract).
Proceedings of the Advances in Cryptology, 1985

Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
Proceedings of the Advances in Cryptology, 1985

1984
Wyner's Analog Encryption Scheme: Results of a Simulation.
Proceedings of the Advances in Cryptology, 1984

1983
A new level of signal processing software: Automatic buffer address generation.
Proceedings of the IEEE International Conference on Acoustics, 1983


  Loading...