2007 |
67 | EE | Ari Juels,
Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files.
ACM Conference on Computer and Communications Security 2007: 584-597 |
2005 |
66 | EE | Michael Szydlo,
Burton S. Kaliski Jr.:
Proofs for Two-Server Password Authentication.
CT-RSA 2005: 227-244 |
65 | EE | Burton S. Kaliski Jr.:
O-Notation.
Encyclopedia of Cryptography and Security 2005 |
64 | EE | Burton S. Kaliski Jr.:
Asymmetric Cryptosystem.
Encyclopedia of Cryptography and Security 2005 |
63 | EE | Burton S. Kaliski Jr.:
Berlekamp Q-matrix.
Encyclopedia of Cryptography and Security 2005 |
62 | EE | Burton S. Kaliski Jr.:
Binomial Distribution.
Encyclopedia of Cryptography and Security 2005 |
61 | EE | Burton S. Kaliski Jr.:
Blum Integer.
Encyclopedia of Cryptography and Security 2005 |
60 | EE | Burton S. Kaliski Jr.:
Claw-Free.
Encyclopedia of Cryptography and Security 2005 |
59 | EE | Burton S. Kaliski Jr.:
Decryption Exponent.
Encyclopedia of Cryptography and Security 2005 |
58 | EE | Burton S. Kaliski Jr.:
Encryption Exponent.
Encyclopedia of Cryptography and Security 2005 |
57 | EE | Burton S. Kaliski Jr.:
Euler's Totient Function.
Encyclopedia of Cryptography and Security 2005 |
56 | EE | Burton S. Kaliski Jr.:
Exponential Time.
Encyclopedia of Cryptography and Security 2005 |
55 | EE | Burton S. Kaliski Jr.:
Extension Field.
Encyclopedia of Cryptography and Security 2005 |
54 | EE | Burton S. Kaliski Jr.:
Factor Base.
Encyclopedia of Cryptography and Security 2005 |
53 | EE | Burton S. Kaliski Jr.:
Field Polynomial.
Encyclopedia of Cryptography and Security 2005 |
52 | EE | Burton S. Kaliski Jr.:
Field.
Encyclopedia of Cryptography and Security 2005 |
51 | EE | Burton S. Kaliski Jr.:
Finite Field.
Encyclopedia of Cryptography and Security 2005 |
50 | EE | Burton S. Kaliski Jr.:
Generator.
Encyclopedia of Cryptography and Security 2005 |
49 | EE | Burton S. Kaliski Jr.:
Group.
Encyclopedia of Cryptography and Security 2005 |
48 | EE | Burton S. Kaliski Jr.:
Hard-Core Bit.
Encyclopedia of Cryptography and Security 2005 |
47 | EE | Burton S. Kaliski Jr.:
Homomorphism.
Encyclopedia of Cryptography and Security 2005 |
46 | EE | Burton S. Kaliski Jr.:
Irreducible Polynomial.
Encyclopedia of Cryptography and Security 2005 |
45 | EE | Burton S. Kaliski Jr.:
Jacobi Symbol.
Encyclopedia of Cryptography and Security 2005 |
44 | EE | Burton S. Kaliski Jr.:
Legendre Symbol.
Encyclopedia of Cryptography and Security 2005 |
43 | EE | Burton S. Kaliski Jr.:
MIPS-Year.
Encyclopedia of Cryptography and Security 2005 |
42 | EE | Burton S. Kaliski Jr.:
Moore's Law.
Encyclopedia of Cryptography and Security 2005 |
41 | EE | Burton S. Kaliski Jr.:
Number Field.
Encyclopedia of Cryptography and Security 2005 |
40 | EE | Burton S. Kaliski Jr.:
Order.
Encyclopedia of Cryptography and Security 2005 |
39 | EE | Burton S. Kaliski Jr.:
Polynomial Time.
Encyclopedia of Cryptography and Security 2005 |
38 | EE | Burton S. Kaliski Jr.:
Primitive Element.
Encyclopedia of Cryptography and Security 2005 |
37 | EE | Burton S. Kaliski Jr.:
Pseudorandom Function.
Encyclopedia of Cryptography and Security 2005 |
36 | EE | Burton S. Kaliski Jr.:
Quadratic Residue.
Encyclopedia of Cryptography and Security 2005 |
35 | EE | Burton S. Kaliski Jr.:
Quadratic Residuosity Problem.
Encyclopedia of Cryptography and Security 2005 |
34 | EE | Burton S. Kaliski Jr.:
RSA Digital Signature Scheme.
Encyclopedia of Cryptography and Security 2005 |
33 | EE | Ronald L. Rivest,
Burton S. Kaliski Jr.:
RSA Problem.
Encyclopedia of Cryptography and Security 2005 |
32 | EE | Burton S. Kaliski Jr.:
RSA factoring challenge.
Encyclopedia of Cryptography and Security 2005 |
31 | EE | Burton S. Kaliski Jr.:
Relatively Prime.
Encyclopedia of Cryptography and Security 2005 |
30 | EE | Burton S. Kaliski Jr.:
Ring.
Encyclopedia of Cryptography and Security 2005 |
29 | EE | Burton S. Kaliski Jr.:
Sieving.
Encyclopedia of Cryptography and Security 2005 |
28 | EE | Burton S. Kaliski Jr.:
Subexponential Time.
Encyclopedia of Cryptography and Security 2005 |
27 | EE | Burton S. Kaliski Jr.:
Subgroup.
Encyclopedia of Cryptography and Security 2005 |
26 | EE | Burton S. Kaliski Jr.:
Symmetric Cryptosystem.
Encyclopedia of Cryptography and Security 2005 |
2003 |
25 | | Burton S. Kaliski Jr.,
Çetin Kaya Koç,
Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers
Springer 2003 |
2002 |
24 | EE | Jakob Jonsson,
Burton S. Kaliski Jr.:
On the Security of RSA Encryption in TLS.
CRYPTO 2002: 127-142 |
23 | EE | Burton S. Kaliski Jr.:
On Hash Function Firewalls in Signature Schemes.
CT-RSA 2002: 1-16 |
2001 |
22 | EE | Burton S. Kaliski Jr.:
An unknown key-share attack on the MQV key agreement protocol.
ACM Trans. Inf. Syst. Secur. 4(3): 275-288 (2001) |
2000 |
21 | EE | Warwick Ford,
Burton S. Kaliski Jr.:
Server-Assisted Generation of a Strong Secret from a Password.
WETICE 2000: 176-180 |
1999 |
20 | EE | Burton S. Kaliski Jr.,
Moses Liskov:
Efficient Finite Field Basis Conversion Involving Dual Bases.
CHES 1999: 135-143 |
1998 |
19 | EE | Burton S. Kaliski Jr.:
ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract).
ASIACRYPT 1998: 50 |
18 | EE | Burton S. Kaliski Jr.:
Emerging Standards for Public-Key Cryptography.
Lectures on Data Security 1998: 87-104 |
17 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
Storage-Efficient Finite Field Basis Conversion.
Selected Areas in Cryptography 1998: 81-93 |
1997 |
16 | | Burton S. Kaliski Jr.:
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings
Springer 1997 |
15 | | Burton S. Kaliski Jr.:
A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem.
J. Cryptology 10(1): 71-72 (1997) |
1996 |
14 | | Burton S. Kaliski Jr.:
IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract).
Security Protocols Workshop 1996: 117-118 |
1995 |
13 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
CRYPTO 1995: 171-184 |
12 | | Burton S. Kaliski Jr.:
The Montgomery Inverse and Its Applications.
IEEE Trans. Computers 44(8): 1064-1065 (1995) |
1994 |
11 | EE | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations.
CRYPTO 1994: 26-39 |
10 | | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations and FEAL.
FSE 1994: 249-264 |
1993 |
9 | | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Fast Block Cipher Proposal.
FSE 1993: 33-40 |
1991 |
8 | | Burton S. Kaliski Jr.:
One-Way Permutations on Elliptic Curves.
J. Cryptology 3(3): 187-199 (1991) |
1990 |
7 | EE | Stephen R. Dussé,
Burton S. Kaliski Jr.:
A Cryptographic Library for the Motorola DSP56000.
EUROCRYPT 1990: 230-244 |
6 | EE | Burton S. Kaliski Jr.:
The MD4 Message Digest Algorithm (Abstract).
EUROCRYPT 1990: 492 |
1988 |
5 | | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
J. Cryptology 1(1): 3-36 (1988) |
1986 |
4 | EE | Burton S. Kaliski Jr.:
A Pseudo-Random Bit Generator Based on Elliptic Logarithms.
CRYPTO 1986: 84-103 |
1985 |
3 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
CRYPTO 1985: 212-226 |
2 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract).
EUROCRYPT 1985: 81-95 |
1984 |
1 | EE | Burton S. Kaliski Jr.:
Wyner's Analog Encryption Scheme: Results of a Simulation.
CRYPTO 1984: 83-94 |