Burton S. Kaliski Jr.
Orcid: 0000-0002-1233-5380Affiliations:
- Verisign, Reston, Virginia, USA
According to our database1,
Burton S. Kaliski Jr.
authored at least 133 papers
between 1983 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
On csauthors.net:
Bibliography
2022
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice.
IACR Cryptol. ePrint Arch., 2022
2021
Standardizing Confidentiality Protections for Domain Name System Exchanges: Multiple Approaches, New Functionality.
IEEE Commun. Stand. Mag., 2021
2017
IACR Cryptol. ePrint Arch., 2017
2016
2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Use of the RSA-KEM Key Transport Algorithm in the Cryptographic Message Syntax (CMS).
RFC, September, 2010
Proceedings of the 2nd USENIX Workshop on Hot Topics in Cloud Computing, 2010
Proceedings of the Handbook of Cloud Computing., 2010
2008
Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2.
RFC, May, 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2005
Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
RFC, June, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Topics in Cryptology, 2005
2004
2003
Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1.
RFC, February, 2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
ACM Trans. Inf. Syst. Secur., 2001
2000
RFC, November, 2000
RFC, November, 2000
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Lectures on Data Security, 1998
1997
1996
IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract).
Proceedings of the Security Protocols, 1996
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services.
RFC, February, 1993
1992
1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1988
PhD thesis, 1988
J. Cryptol., 1988
1986
Proceedings of the Advances in Cryptology, 1986
1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the Advances in Cryptology, 1984
1983
Proceedings of the IEEE International Conference on Acoustics, 1983