dblp.uni-trier.dewww.uni-trier.de

Burton S. Kaliski Jr.

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
67EEAri Juels, Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. ACM Conference on Computer and Communications Security 2007: 584-597
2005
66EEMichael Szydlo, Burton S. Kaliski Jr.: Proofs for Two-Server Password Authentication. CT-RSA 2005: 227-244
65EEBurton S. Kaliski Jr.: O-Notation. Encyclopedia of Cryptography and Security 2005
64EEBurton S. Kaliski Jr.: Asymmetric Cryptosystem. Encyclopedia of Cryptography and Security 2005
63EEBurton S. Kaliski Jr.: Berlekamp Q-matrix. Encyclopedia of Cryptography and Security 2005
62EEBurton S. Kaliski Jr.: Binomial Distribution. Encyclopedia of Cryptography and Security 2005
61EEBurton S. Kaliski Jr.: Blum Integer. Encyclopedia of Cryptography and Security 2005
60EEBurton S. Kaliski Jr.: Claw-Free. Encyclopedia of Cryptography and Security 2005
59EEBurton S. Kaliski Jr.: Decryption Exponent. Encyclopedia of Cryptography and Security 2005
58EEBurton S. Kaliski Jr.: Encryption Exponent. Encyclopedia of Cryptography and Security 2005
57EEBurton S. Kaliski Jr.: Euler's Totient Function. Encyclopedia of Cryptography and Security 2005
56EEBurton S. Kaliski Jr.: Exponential Time. Encyclopedia of Cryptography and Security 2005
55EEBurton S. Kaliski Jr.: Extension Field. Encyclopedia of Cryptography and Security 2005
54EEBurton S. Kaliski Jr.: Factor Base. Encyclopedia of Cryptography and Security 2005
53EEBurton S. Kaliski Jr.: Field Polynomial. Encyclopedia of Cryptography and Security 2005
52EEBurton S. Kaliski Jr.: Field. Encyclopedia of Cryptography and Security 2005
51EEBurton S. Kaliski Jr.: Finite Field. Encyclopedia of Cryptography and Security 2005
50EEBurton S. Kaliski Jr.: Generator. Encyclopedia of Cryptography and Security 2005
49EEBurton S. Kaliski Jr.: Group. Encyclopedia of Cryptography and Security 2005
48EEBurton S. Kaliski Jr.: Hard-Core Bit. Encyclopedia of Cryptography and Security 2005
47EEBurton S. Kaliski Jr.: Homomorphism. Encyclopedia of Cryptography and Security 2005
46EEBurton S. Kaliski Jr.: Irreducible Polynomial. Encyclopedia of Cryptography and Security 2005
45EEBurton S. Kaliski Jr.: Jacobi Symbol. Encyclopedia of Cryptography and Security 2005
44EEBurton S. Kaliski Jr.: Legendre Symbol. Encyclopedia of Cryptography and Security 2005
43EEBurton S. Kaliski Jr.: MIPS-Year. Encyclopedia of Cryptography and Security 2005
42EEBurton S. Kaliski Jr.: Moore's Law. Encyclopedia of Cryptography and Security 2005
41EEBurton S. Kaliski Jr.: Number Field. Encyclopedia of Cryptography and Security 2005
40EEBurton S. Kaliski Jr.: Order. Encyclopedia of Cryptography and Security 2005
39EEBurton S. Kaliski Jr.: Polynomial Time. Encyclopedia of Cryptography and Security 2005
38EEBurton S. Kaliski Jr.: Primitive Element. Encyclopedia of Cryptography and Security 2005
37EEBurton S. Kaliski Jr.: Pseudorandom Function. Encyclopedia of Cryptography and Security 2005
36EEBurton S. Kaliski Jr.: Quadratic Residue. Encyclopedia of Cryptography and Security 2005
35EEBurton S. Kaliski Jr.: Quadratic Residuosity Problem. Encyclopedia of Cryptography and Security 2005
34EEBurton S. Kaliski Jr.: RSA Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
33EERonald L. Rivest, Burton S. Kaliski Jr.: RSA Problem. Encyclopedia of Cryptography and Security 2005
32EEBurton S. Kaliski Jr.: RSA factoring challenge. Encyclopedia of Cryptography and Security 2005
31EEBurton S. Kaliski Jr.: Relatively Prime. Encyclopedia of Cryptography and Security 2005
30EEBurton S. Kaliski Jr.: Ring. Encyclopedia of Cryptography and Security 2005
29EEBurton S. Kaliski Jr.: Sieving. Encyclopedia of Cryptography and Security 2005
28EEBurton S. Kaliski Jr.: Subexponential Time. Encyclopedia of Cryptography and Security 2005
27EEBurton S. Kaliski Jr.: Subgroup. Encyclopedia of Cryptography and Security 2005
26EEBurton S. Kaliski Jr.: Symmetric Cryptosystem. Encyclopedia of Cryptography and Security 2005
2003
25 Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers Springer 2003
2002
24EEJakob Jonsson, Burton S. Kaliski Jr.: On the Security of RSA Encryption in TLS. CRYPTO 2002: 127-142
23EEBurton S. Kaliski Jr.: On Hash Function Firewalls in Signature Schemes. CT-RSA 2002: 1-16
2001
22EEBurton S. Kaliski Jr.: An unknown key-share attack on the MQV key agreement protocol. ACM Trans. Inf. Syst. Secur. 4(3): 275-288 (2001)
2000
21EEWarwick Ford, Burton S. Kaliski Jr.: Server-Assisted Generation of a Strong Secret from a Password. WETICE 2000: 176-180
1999
20EEBurton S. Kaliski Jr., Moses Liskov: Efficient Finite Field Basis Conversion Involving Dual Bases. CHES 1999: 135-143
1998
19EEBurton S. Kaliski Jr.: ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). ASIACRYPT 1998: 50
18EEBurton S. Kaliski Jr.: Emerging Standards for Public-Key Cryptography. Lectures on Data Security 1998: 87-104
17EEBurton S. Kaliski Jr., Yiqun Lisa Yin: Storage-Efficient Finite Field Basis Conversion. Selected Areas in Cryptography 1998: 81-93
1997
16 Burton S. Kaliski Jr.: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings Springer 1997
15 Burton S. Kaliski Jr.: A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem. J. Cryptology 10(1): 71-72 (1997)
1996
14 Burton S. Kaliski Jr.: IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract). Security Protocols Workshop 1996: 117-118
1995
13EEBurton S. Kaliski Jr., Yiqun Lisa Yin: On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. CRYPTO 1995: 171-184
12 Burton S. Kaliski Jr.: The Montgomery Inverse and Its Applications. IEEE Trans. Computers 44(8): 1064-1065 (1995)
1994
11EEBurton S. Kaliski Jr., Matthew J. B. Robshaw: Linear Cryptanalysis Using Multiple Approximations. CRYPTO 1994: 26-39
10 Burton S. Kaliski Jr., Matthew J. B. Robshaw: Linear Cryptanalysis Using Multiple Approximations and FEAL. FSE 1994: 249-264
1993
9 Burton S. Kaliski Jr., Matthew J. B. Robshaw: Fast Block Cipher Proposal. FSE 1993: 33-40
1991
8 Burton S. Kaliski Jr.: One-Way Permutations on Elliptic Curves. J. Cryptology 3(3): 187-199 (1991)
1990
7EEStephen R. Dussé, Burton S. Kaliski Jr.: A Cryptographic Library for the Motorola DSP56000. EUROCRYPT 1990: 230-244
6EEBurton S. Kaliski Jr.: The MD4 Message Digest Algorithm (Abstract). EUROCRYPT 1990: 492
1988
5 Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman: Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES). J. Cryptology 1(1): 3-36 (1988)
1986
4EEBurton S. Kaliski Jr.: A Pseudo-Random Bit Generator Based on Elliptic Logarithms. CRYPTO 1986: 84-103
1985
3EEBurton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman: Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). CRYPTO 1985: 212-226
2EEBurton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman: Is the Data Encryption Standard a Group? (Preliminary Abstract). EUROCRYPT 1985: 81-95
1984
1EEBurton S. Kaliski Jr.: Wyner's Analog Encryption Scheme: Results of a Simulation. CRYPTO 1984: 83-94

Coauthor Index

1Stephen R. Dussé [7]
2Warwick Ford [21]
3Jakob Jonsson [24]
4Ari Juels [67]
5Çetin Kaya Koç [25]
6Moses Liskov [20]
7Christof Paar [25]
8Ronald L. Rivest [2] [3] [5] [33]
9Matthew J. B. Robshaw [9] [10] [11]
10Alan T. Sherman [2] [3] [5]
11Michael Szydlo [66]
12Yiqun Lisa Yin [13] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)