Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,922,216 papers from all fields of science
Search
Sign In
Create Free Account
Burt Kaliski
Known as:
Kaliski (disambiguation)
, Kaliski generator
Burton S. "Burt" Kaliski, Jr. is a cryptographer, who is currently the chief technology officer (CTO) and senior vice president at Verisign. Before…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Block cipher
Crab (cipher)
Cycle detection
Encyclopedia of Cryptography and Security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
On the Security of RSA-PSS in the Wild
Saqib A. Kakvi
ACM SIGSOFT Symposium on Software Reusability
2019
Corpus ID: 207951637
The RSA Probabilistic Signature Scheme (RSA-PSS) due to Bellare and Rogaway (EUROCRYPT 1996) is a widely deployed signature…
Expand
2018
2018
PEC - An Alternate and More Efficient Public Key Cryptosystem
R. Krishnan
2018
Corpus ID: 4800093
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be…
Expand
2016
2016
Small World of Inter-Firm Network and Firm's Acquisition Behaviour
S. Biswas
2016
Corpus ID: 54683073
This study finds that the inter-firm network in India on account of director interlocks is a small world and the network has…
Expand
2015
2015
Finite difference schemes for k ⋅ p models: A comparative study
Jun Z. Huang
,
Kuang-Chung Wang
,
W. Frensley
,
Gerhard Klimeck
International Workshop on Computational…
2015
Corpus ID: 17088460
Multi-band k · p models discretized with finite difference method (FDM) have been widely used to study electronic properties of…
Expand
2013
2013
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention"
Aziz Mohaisen
,
Omar Alrawi
,
M. Larson
,
D. McPherson
Web Information System and Application Conference
2013
Corpus ID: 9877057
In recent years, researchers have relied heavily on labels provided by antivirus companies in establishing ground truth for…
Expand
2012
2012
Increasing Unit Effectiveness in a Dynamic Environment by Implementing a Leadership Mathematical Model
Y. Naplyokov
2012
Corpus ID: 107754091
Abstract : The Ukrainian Army is in a transition period that requires flexible, adaptive leadership with a contemporary vision…
Expand
2012
2012
Fourier transform-based k·p method: An approach to meshless modeling of low-dimensional heterostructures
T. Mei
,
Q. J. Zhao
,
D. H. Zhang
Photonics Global Conference
2012
Corpus ID: 23017288
Among methods modeling electronic structures of low dimensional heterostructures, such as first principles, tight binding, k·p…
Expand
2012
2012
Private Over-Threshold Aggregation Protocols
Myungsun Kim
,
Aziz Mohaisen
,
J. Cheon
,
Yongdae Kim
International Conference on Information Security…
2012
Corpus ID: 2092771
In this paper, we revisit the private k+ data aggregation problem, and formally define the problem's security requirements as…
Expand
2004
2004
High-speed stream cipher
Hong-Sain Ooi
18th International Conference on Advanced…
2004
Corpus ID: 14254717
We propose a new stream cipher suitable for high-speed network applications, called HSSC (high-speed stream cipher). HSSC uses…
Expand
2003
2003
LIST OF TABLES AND APPENDICES
D. Griffiths.
Disinflation in Transition Economies
2003
Corpus ID: 192644474
It’s likely that, as an icon of pop music, Elvis Costello still looks like the cover of This Year’s Model (1978) and, were he run…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE