Burt Kaliski
#16,022
Most Influential Person Now
Cryptographer
Burt Kaliski's AcademicInfluence.com Rankings
Burt Kaliskimathematics Degrees
Mathematics
#3451
World Rank
#5090
Historical Rank
#1280
USA Rank
Measure Theory
#2196
World Rank
#2642
Historical Rank
#628
USA Rank
Download Badge
Computer Science Mathematics
Why Is Burt Kaliski Influential?
(Suggest an Edit or Addition)According to Wikipedia, Burton S. "Burt" Kaliski, Jr. is a cryptographer, who is currently the chief technology officer and senior vice president at Verisign. Before joining Verisign in 2011, he was the founding director of the EMC Innovation Network at EMC Corporation since its 2006 acquisition of RSA Security where he was Chief Scientist for RSA Laboratories. His notable work includes the development of such public key cryptography standards as PKCS and IEEE P1363, the extension of linear cryptanalysis to use multiple approximations, and the design of the block cipher Crab.
Burt Kaliski's Published Works
Published Works
- Pors: proofs of retrievability for large files (2007) (2331)
- Advances in Cryptology - CRYPTO '97 (1997) (751)
- Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) (646)
- Analyzing and comparing Montgomery multiplication algorithms (1996) (602)
- PKCS #5: Password-Based Cryptography Specification Version 2.0 (2000) (412)
- Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (2003) (351)
- Linear Cryptanalysis Using Multiple Approximations (1994) (231)
- Server-assisted generation of a strong secret from a password (2000) (210)
- A Cryptographic Library for the Motorola DSP56000 (1991) (196)
- The Montgomery Inverse and Its Applications (1995) (186)
- Moore's Law (2005) (176)
- PKCS #7: Cryptographic Message Syntax Version 1.5 (1998) (164)
- An unknown key-share attack on the MQV key agreement protocol (2001) (148)
- The MD2 Message-Digest Algorithm (1992) (139)
- Encyclopedia of business and finance (2001) (133)
- PKCS #1: RSA Encryption Version 1.5 (1998) (127)
- PKCS #1: RSA Cryptography Specifications Version 2.0 (1998) (114)
- PKCS #1: RSA Cryptography Specifications Version 2.2 (2016) (112)
- A New Two-Server Approach for Authentication with Short Secrets (2003) (105)
- Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services (1993) (102)
- On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm (1995) (97)
- PKCS #10: Certification Request Syntax Specification Version 1.7 (2000) (96)
- A Pseudo-Random Bit Generator Based on Elliptic Logarithms (1986) (91)
- Toward Risk Assessment as a Service in Cloud Environments (2010) (78)
- Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers (2003) (70)
- On the Security of the RC5 Encryption Algorithm (1998) (63)
- PKCS #5: Password-Based Cryptography Specification Version 2.1 (2017) (63)
- On the Security of RSA Encryption in TLS (2002) (62)
- TWIRL and RSA Key Size (2003) (60)
- Euler's Totient Function (2005) (58)
- Polynomial Time (2005) (56)
- A survey of encryption standards (1993) (51)
- Elliptic curves and cryptography: a pseudorandom bit generator and other tools (1988) (47)
- Is the Data Encryption Standard a group? (Results of cycling experiments on DES) (1988) (44)
- Linear Cryptanalysis Using Multiple Approximations and FEAL (1994) (42)
- A Layman's Guide to a Subset of ASN.1, BER, and DER (2002) (41)
- One-way permutations on elliptic curves (2004) (40)
- Is the data encryption standard a group (1986) (39)
- RSA factoring challenge (2005) (38)
- Proofs for Two-Server Password Authentication (2005) (35)
- Storage-Efficient Finite Field Basis Conversion (1998) (27)
- Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (1985) (24)
- ECRYPT Stream Cipher Project (2011) (24)
- RSA Problem (2005) (23)
- PKCS #10: Certification Request Syntax Version 1.5 (1998) (22)
- Information Security Management System (2014) (21)
- The Basic Skills (1982) (19)
- Human Ear Recognition (2011) (19)
- Diffie-Hellman Key Exchange (2011) (17)
- Finite Field (2005) (17)
- PKCS #9: Selected Object Classes and Attribute Types Version 2.0 (2000) (16)
- On Hash Function Firewalls in Signature Schemes (2002) (16)
- Iso/iec 27001 (2011) (16)
- Is the Data Encryption Standard a Group? (Preliminary Abstract) (1985) (14)
- Efficient Finite Field Basis Conversion Involving Dual Bases (1999) (12)
- Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS) (2010) (12)
- Entity Resolution (2011) (12)
- Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2 (2008) (11)
- Extensions and Revisions to PKCS #7 (1997) (11)
- Reducing the X . 509 Attack Surface with DNSSEC ’ s DANE (2012) (11)
- Fast Block Cipher Proposal (1993) (11)
- Key Enabling Technologies for Virtual Private Clouds (2010) (10)
- IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract) (1996) (10)
- Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings (1997) (9)
- Multi-tenant Cloud Computing: From Cruise Liners to Container Ships (2008) (8)
- Feature: Considerations for New Public-Key Algorithms (2000) (8)
- A Quantum "Magic Box" for the Discrete Logarithm Problem (2017) (8)
- Jacobi Symbol (2005) (7)
- Relatively Prime (2005) (6)
- introduction to the mathematics of finance (1982) (6)
- Number Field (2005) (6)
- PKCS #1 Version 2.2: RSA Cryptography Specifications (2016) (5)
- New Opportunities--Implications and Recommendations for Business Education's Role in Non-Traditional and Organizational Settings. (2007) (4)
- An investigation into computer education offered in new hampshire secondary schools as perceived by teachers and compared to the needs of business as perceived by data processing managers (1988) (4)
- Compatible cofactor multiplication for Diffie-Hellman primitives (1998) (4)
- Message Authentication with MD 5 * (1995) (4)
- Public key security systems [Guest Editor's Introduction] (1996) (3)
- Some Examples of the PKCS Standards (2002) (3)
- Conceptual Modeling (2012) (3)
- Cellular Network Security (2011) (3)
- Asymmetric Cryptosystem (2005) (3)
- Emerging Standards for Public-Key Cryptography (1998) (3)
- Cryptographic Message Syntax (1999) (3)
- Views on the Future of Business Education: Responses to Six Critical Questions. (2007) (3)
- A chosen message attack on Demytko’s elliptic curve cryptosystem (1997) (3)
- Remote Attestation (2011) (3)
- The MD4 Message Digest Algorithm (Abstract) (1990) (2)
- Wyner's Analog Encryption Scheme: Results of a Simulation (1985) (2)
- Quadratic Residuosity Problem (2005) (2)
- Quadratic Residue (2021) (2)
- Decentralized Trust Management (2011) (2)
- Asserting and Reasserting the Role of Business Education. National Business Education Association Yearbook, No. 27. (1989) (2)
- RSA Digital Signature Scheme (2005) (2)
- Pricing and Selling (1982) (1)
- ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract) (1998) (1)
- RFID Privacy: Challenges and Progress (2004) (1)
- Symmetric Cryptosystem (2005) (1)
- The Montgomery Powering Ladder (2002) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Information Integrity (2011) (1)
- Extension Field (2005) (1)
- Analysis of Wyner's analog encryption scheme (1984) (1)
- Targeted Fibonacci Exponentiation (2017) (1)
- Subexponential Time (2005) (1)
- Software-Based Attestation (2011) (1)
- Mastering Business Math and Machines a Combined Approach (1986) (0)
- College Accounting/Chapters 1-27 (1994) (0)
- Network Working Group Public-key Cryptography Standards (pkcs) #8: Private-key Information Syntax Specification Version 1.2 Status of This Memo (2003) (0)
- 11 – Corporation Stocks (1982) (0)
- Depreciation, Other Expenses, and Business Profits (1982) (0)
- Greetings from the Technical Programming Committee Chairs (2009) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Exponential Time (2005) (0)
- Encryption Exponent (2005) (0)
- File System Permissions (2011) (0)
- Firewall Policy Analysis (2011) (0)
- Runtime Analysis (2011) (0)
- 14 – Analytical Procedures (1982) (0)
- Further Relevance on Communications: Methods (2012) (0)
- Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (2002) (0)
- Irreducible Polynomial (2005) (0)
- Factor Base (2005) (0)
- Standardizing Confidentiality Protections for Domain Name System Exchanges: Multiple Approaches, New Functionality (2021) (0)
- introduction to the mathematics of operating (1982) (0)
- On the Foundations of Modern Cryptography (1998) (0)
- Revisiting DNS and WHOIS in the cloud era (2012) (0)
- Binomial Distribution (2005) (0)
- Development of an outline for a two-year college elementary accounting textbook (1977) (0)
- College Accounting, 1-27 (1989) (0)
- Credential Verification (2011) (0)
- A new level of signal processing software: Automatic buffer address generation (1983) (0)
- Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice (2022) (0)
- Base, Rate, and Percentage (1982) (0)
- Identity Proof (2011) (0)
- Private Key Cryptosystem (2006) (0)
- introduction to the mathematics of ownership and investment (1982) (0)
- Network Working Group B. Kaliski Request for Comments: 2315 RSA Laboratories, East Category: Informational March 1998 PKCS 7: Cryptographic Message Syntax Version 1.5 Status of this Memo (2007) (0)
- 10 – Consumer Credit (1982) (0)
- The bank card (2013) (0)
- introduction to the mathematics of summary and analysis (1982) (0)
- introduction to the mathematics of trading (1982) (0)
- Decryption Exponent (2005) (0)
- 8 - Simple Interest and Bank Discount (1982) (0)
- Field Polynomial (2005) (0)
- News and advice on data security and cryptography Bulletin (1997) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- N ov 2 01 7 Targeted Fibonacci Exponentiation (2018) (0)
- Pseudorandom Function (2005) (0)
- Berlekamp Q-matrix (2005) (0)
- introduction to fundamentals of arithmetic (1982) (0)
- College accounting, Chapters 1-11 (1996) (0)
- BIOS Basic Input Output System (2011) (0)
- Accumulation of Funds (1982) (0)
- Biometric Cryptosystem (2009) (0)
- Subgroup Cryptosystems (2011) (0)
- Bonds and Other Investments (1982) (0)
- Algebra or Arithmetic (1975) (0)
- Access Lists (2020) (0)
- Primitive Element (2005) (0)
- Reports of the AAAI 2011 Conference Workshops (2012) (0)
- 13 – Summary Techniques (1982) (0)
- Greatest Common Factor (2011) (0)
- Legendre Symbol (2005) (0)
- Guest Editors' Introduction: Public-Key Security Systems (1996) (0)
This paper list is powered by the following services:
Other Resources About Burt Kaliski
What Schools Are Affiliated With Burt Kaliski?
Burt Kaliski is affiliated with the following schools: