| 2007 |
| 67 | EE | Ari Juels,
Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files.
ACM Conference on Computer and Communications Security 2007: 584-597 |
| 2005 |
| 66 | EE | Michael Szydlo,
Burton S. Kaliski Jr.:
Proofs for Two-Server Password Authentication.
CT-RSA 2005: 227-244 |
| 65 | EE | Burton S. Kaliski Jr.:
O-Notation.
Encyclopedia of Cryptography and Security 2005 |
| 64 | EE | Burton S. Kaliski Jr.:
Asymmetric Cryptosystem.
Encyclopedia of Cryptography and Security 2005 |
| 63 | EE | Burton S. Kaliski Jr.:
Berlekamp Q-matrix.
Encyclopedia of Cryptography and Security 2005 |
| 62 | EE | Burton S. Kaliski Jr.:
Binomial Distribution.
Encyclopedia of Cryptography and Security 2005 |
| 61 | EE | Burton S. Kaliski Jr.:
Blum Integer.
Encyclopedia of Cryptography and Security 2005 |
| 60 | EE | Burton S. Kaliski Jr.:
Claw-Free.
Encyclopedia of Cryptography and Security 2005 |
| 59 | EE | Burton S. Kaliski Jr.:
Decryption Exponent.
Encyclopedia of Cryptography and Security 2005 |
| 58 | EE | Burton S. Kaliski Jr.:
Encryption Exponent.
Encyclopedia of Cryptography and Security 2005 |
| 57 | EE | Burton S. Kaliski Jr.:
Euler's Totient Function.
Encyclopedia of Cryptography and Security 2005 |
| 56 | EE | Burton S. Kaliski Jr.:
Exponential Time.
Encyclopedia of Cryptography and Security 2005 |
| 55 | EE | Burton S. Kaliski Jr.:
Extension Field.
Encyclopedia of Cryptography and Security 2005 |
| 54 | EE | Burton S. Kaliski Jr.:
Factor Base.
Encyclopedia of Cryptography and Security 2005 |
| 53 | EE | Burton S. Kaliski Jr.:
Field Polynomial.
Encyclopedia of Cryptography and Security 2005 |
| 52 | EE | Burton S. Kaliski Jr.:
Field.
Encyclopedia of Cryptography and Security 2005 |
| 51 | EE | Burton S. Kaliski Jr.:
Finite Field.
Encyclopedia of Cryptography and Security 2005 |
| 50 | EE | Burton S. Kaliski Jr.:
Generator.
Encyclopedia of Cryptography and Security 2005 |
| 49 | EE | Burton S. Kaliski Jr.:
Group.
Encyclopedia of Cryptography and Security 2005 |
| 48 | EE | Burton S. Kaliski Jr.:
Hard-Core Bit.
Encyclopedia of Cryptography and Security 2005 |
| 47 | EE | Burton S. Kaliski Jr.:
Homomorphism.
Encyclopedia of Cryptography and Security 2005 |
| 46 | EE | Burton S. Kaliski Jr.:
Irreducible Polynomial.
Encyclopedia of Cryptography and Security 2005 |
| 45 | EE | Burton S. Kaliski Jr.:
Jacobi Symbol.
Encyclopedia of Cryptography and Security 2005 |
| 44 | EE | Burton S. Kaliski Jr.:
Legendre Symbol.
Encyclopedia of Cryptography and Security 2005 |
| 43 | EE | Burton S. Kaliski Jr.:
MIPS-Year.
Encyclopedia of Cryptography and Security 2005 |
| 42 | EE | Burton S. Kaliski Jr.:
Moore's Law.
Encyclopedia of Cryptography and Security 2005 |
| 41 | EE | Burton S. Kaliski Jr.:
Number Field.
Encyclopedia of Cryptography and Security 2005 |
| 40 | EE | Burton S. Kaliski Jr.:
Order.
Encyclopedia of Cryptography and Security 2005 |
| 39 | EE | Burton S. Kaliski Jr.:
Polynomial Time.
Encyclopedia of Cryptography and Security 2005 |
| 38 | EE | Burton S. Kaliski Jr.:
Primitive Element.
Encyclopedia of Cryptography and Security 2005 |
| 37 | EE | Burton S. Kaliski Jr.:
Pseudorandom Function.
Encyclopedia of Cryptography and Security 2005 |
| 36 | EE | Burton S. Kaliski Jr.:
Quadratic Residue.
Encyclopedia of Cryptography and Security 2005 |
| 35 | EE | Burton S. Kaliski Jr.:
Quadratic Residuosity Problem.
Encyclopedia of Cryptography and Security 2005 |
| 34 | EE | Burton S. Kaliski Jr.:
RSA Digital Signature Scheme.
Encyclopedia of Cryptography and Security 2005 |
| 33 | EE | Ronald L. Rivest,
Burton S. Kaliski Jr.:
RSA Problem.
Encyclopedia of Cryptography and Security 2005 |
| 32 | EE | Burton S. Kaliski Jr.:
RSA factoring challenge.
Encyclopedia of Cryptography and Security 2005 |
| 31 | EE | Burton S. Kaliski Jr.:
Relatively Prime.
Encyclopedia of Cryptography and Security 2005 |
| 30 | EE | Burton S. Kaliski Jr.:
Ring.
Encyclopedia of Cryptography and Security 2005 |
| 29 | EE | Burton S. Kaliski Jr.:
Sieving.
Encyclopedia of Cryptography and Security 2005 |
| 28 | EE | Burton S. Kaliski Jr.:
Subexponential Time.
Encyclopedia of Cryptography and Security 2005 |
| 27 | EE | Burton S. Kaliski Jr.:
Subgroup.
Encyclopedia of Cryptography and Security 2005 |
| 26 | EE | Burton S. Kaliski Jr.:
Symmetric Cryptosystem.
Encyclopedia of Cryptography and Security 2005 |
| 2003 |
| 25 | | Burton S. Kaliski Jr.,
Çetin Kaya Koç,
Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers
Springer 2003 |
| 2002 |
| 24 | EE | Jakob Jonsson,
Burton S. Kaliski Jr.:
On the Security of RSA Encryption in TLS.
CRYPTO 2002: 127-142 |
| 23 | EE | Burton S. Kaliski Jr.:
On Hash Function Firewalls in Signature Schemes.
CT-RSA 2002: 1-16 |
| 2001 |
| 22 | EE | Burton S. Kaliski Jr.:
An unknown key-share attack on the MQV key agreement protocol.
ACM Trans. Inf. Syst. Secur. 4(3): 275-288 (2001) |
| 2000 |
| 21 | EE | Warwick Ford,
Burton S. Kaliski Jr.:
Server-Assisted Generation of a Strong Secret from a Password.
WETICE 2000: 176-180 |
| 1999 |
| 20 | EE | Burton S. Kaliski Jr.,
Moses Liskov:
Efficient Finite Field Basis Conversion Involving Dual Bases.
CHES 1999: 135-143 |
| 1998 |
| 19 | EE | Burton S. Kaliski Jr.:
ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract).
ASIACRYPT 1998: 50 |
| 18 | EE | Burton S. Kaliski Jr.:
Emerging Standards for Public-Key Cryptography.
Lectures on Data Security 1998: 87-104 |
| 17 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
Storage-Efficient Finite Field Basis Conversion.
Selected Areas in Cryptography 1998: 81-93 |
| 1997 |
| 16 | | Burton S. Kaliski Jr.:
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings
Springer 1997 |
| 15 | | Burton S. Kaliski Jr.:
A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem.
J. Cryptology 10(1): 71-72 (1997) |
| 1996 |
| 14 | | Burton S. Kaliski Jr.:
IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract).
Security Protocols Workshop 1996: 117-118 |
| 1995 |
| 13 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
CRYPTO 1995: 171-184 |
| 12 | | Burton S. Kaliski Jr.:
The Montgomery Inverse and Its Applications.
IEEE Trans. Computers 44(8): 1064-1065 (1995) |
| 1994 |
| 11 | EE | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations.
CRYPTO 1994: 26-39 |
| 10 | | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Linear Cryptanalysis Using Multiple Approximations and FEAL.
FSE 1994: 249-264 |
| 1993 |
| 9 | | Burton S. Kaliski Jr.,
Matthew J. B. Robshaw:
Fast Block Cipher Proposal.
FSE 1993: 33-40 |
| 1991 |
| 8 | | Burton S. Kaliski Jr.:
One-Way Permutations on Elliptic Curves.
J. Cryptology 3(3): 187-199 (1991) |
| 1990 |
| 7 | EE | Stephen R. Dussé,
Burton S. Kaliski Jr.:
A Cryptographic Library for the Motorola DSP56000.
EUROCRYPT 1990: 230-244 |
| 6 | EE | Burton S. Kaliski Jr.:
The MD4 Message Digest Algorithm (Abstract).
EUROCRYPT 1990: 492 |
| 1988 |
| 5 | | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
J. Cryptology 1(1): 3-36 (1988) |
| 1986 |
| 4 | EE | Burton S. Kaliski Jr.:
A Pseudo-Random Bit Generator Based on Elliptic Logarithms.
CRYPTO 1986: 84-103 |
| 1985 |
| 3 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
CRYPTO 1985: 212-226 |
| 2 | EE | Burton S. Kaliski Jr.,
Ronald L. Rivest,
Alan T. Sherman:
Is the Data Encryption Standard a Group? (Preliminary Abstract).
EUROCRYPT 1985: 81-95 |
| 1984 |
| 1 | EE | Burton S. Kaliski Jr.:
Wyner's Analog Encryption Scheme: Results of a Simulation.
CRYPTO 1984: 83-94 |