Cryptographers' World
 

Burton S. Kaliski Jr.


Author's Web Page Link

19 papers in database with 764 citations StarStar

Editor of 2 conference proceedings books

H-number: 12

Conference Proceedings

 
1. Burton S. Kaliski Jr.Çetin Kaya KoçChristof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer, 2003. ISBN 3-540-00409-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings. Springer, 1997. ISBN 3-540-63384-7.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Burton S. Kaliski Jr.,  A Chosen Message Attack on Demytko's Elliptic Curve Cryptosystem, Journal of Cryptology, Volume 10(1), pp. 71 - 72, Springer, 1997.

[Cited 12 times ]

2. Burton S. Kaliski Jr.,  One-Way Permutations on Elliptic Curves, Journal of Cryptology, Volume 3(3), pp. 187 - 199, Springer, 1991.

[Cited 24 times ]

3. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES), Journal of Cryptology, Volume 1(1), pp. 3 - 36, Springer, 1988.

[Cited 44 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michael Szydlo,  Burton S. Kaliski Jr.,  Proofs for Two-Server Password Authentication, pp. 227 - 244, CT-RSA 2005.

[Electronic Edition][Cited 2 times ]

2. Jakob Jonsson,  Burton S. Kaliski Jr.,  On the Security of RSA Encryption in TLS, pp. 127 - 142, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

3. Burton S. Kaliski Jr.,  On Hash Function Firewalls in Signature Schemes, pp. 1 - 16, CT-RSA 2002.

[Electronic Edition][Cited 8 times ]

4. Burton S. Kaliski Jr.,  Moses Liskov,  Efficient Finite Field Basis Conversion Involving Dual Bases, pp. 135 - 143, CHES 1999.

[Electronic Edition][Cited 6 times ]

5. Burton S. Kaliski Jr.,  ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract), pp. 50 - 50, ASIACRYPT 1998.

[Electronic Edition][No citation]

6. Burton S. Kaliski Jr.,  Yiqun Lisa Yin,  Storage-Efficient Finite Field Basis Conversion, pp. 81 - 93, SAC 1998.

[Electronic Edition][Cited 19 times ]

7. Burton S. Kaliski Jr.,  Yiqun Lisa Yin,  On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm, pp. 171 - 184, CRYPTO 1995.

[Electronic Edition][Cited 71 times Red Star]

8. Burton S. Kaliski Jr.,  Matthew J. B. Robshaw,  Linear Cryptanalysis Using Multiple Approximations and FEAL, pp. 249 - 264, FSE 1994.

[Electronic Edition][Cited 28 times ]

9. Burton S. Kaliski Jr.,  Matthew J. B. Robshaw,  Linear Cryptanalysis Using Multiple Approximations, pp. 26 - 39, CRYPTO 1994.

[Electronic Edition][Cited 122 times Red StarRed Star]

10. Burton S. Kaliski Jr.,  Matthew J. B. Robshaw,  Fast Block Cipher Proposal, pp. 33 - 40, FSE 1993.

[Electronic Edition][Cited 14 times ]

11. Stephen R. Dussé,  Burton S. Kaliski Jr.,  A Cryptographic Library for the Motorola DSP56000, pp. 230 - 244, EUROCRYPT 1990.

[Electronic Edition][Cited 166 times Red StarRed Star]

12. Burton S. Kaliski Jr.,  The MD4 Message Digest Algorithm (Abstract), pp. 492 - 492, EUROCRYPT 1990.

[Electronic Edition][Cited 121 times Red StarRed Star]

13. Burton S. Kaliski Jr.,  A Pseudo-Random Bit Generator Based on Elliptic Logarithms, pp. 84 - 103, CRYPTO 1986.

[Electronic Edition][Cited 80 times Red Star]

14. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is DES a Pure Cipher? (Results of More Cycling Experiments on DES), pp. 212 - 226, CRYPTO 1985.

[Electronic Edition][Cited 12 times ]

15. Burton S. Kaliski Jr.,  Ronald L. Rivest,  Alan T. Sherman,  Is the Data Encryption Standard a Group? (Preliminary Abstract), pp. 81 - 95, EUROCRYPT 1985.

[Electronic Edition][Cited 21 times ]

16. Burton S. Kaliski Jr.,  Wyner's Analog Encryption Scheme: Results of a Simulation, pp. 83 - 94, CRYPTO 1984.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...