BibTeX records: Erkay Savas

download as .bib file

@article{DBLP:journals/tifs/TosunS24,
  author       = {Tolun Tosun and
                  Erkay Savas},
  title        = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack
                  on Incomplete NTT-Based Implementations of Lattice-Based Cryptography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3353--3365},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3359890},
  doi          = {10.1109/TIFS.2024.3359890},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TosunS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TosunMS24,
  author       = {Tolun Tosun and
                  Amir Moradi and
                  Erkay Savas},
  title        = {Exploiting the Central Reduction in Lattice-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/066},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TosunMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JaveedYS23,
  author       = {Arsalan Javeed and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Microarchitectural Side-Channel Threats, Weaknesses and Mitigations:
                  {A} Systematic Mapping Study},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {48945--48976},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3275757},
  doi          = {10.1109/ACCESS.2023.3275757},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JaveedYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OzcanATS23,
  author       = {Ali Sah {\"{O}}zcan and
                  Can Ayduman and
                  Enes Recep T{\"{u}}rkoglu and
                  Erkay Savas},
  title        = {Homomorphic Encryption on {GPU}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {84168--84186},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3265583},
  doi          = {10.1109/ACCESS.2023.3265583},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/OzcanATS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/NowrooziMSMC23,
  author       = {Ehsan Nowroozi and
                  Mohammadreza Mohammadi and
                  Erkay Savas and
                  Yassine Mekdad and
                  Mauro Conti},
  title        = {Employing Deep Ensemble Learning for Improving the Security of Computer
                  Networks Against Adversarial Attacks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {2096--2105},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3267831},
  doi          = {10.1109/TNSM.2023.3267831},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/NowrooziMSMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/DurmazKOUJYS23,
  author       = {Fatih Durmaz and
                  Nureddin Kamadan and
                  Melih Taha {\"{O}}z and
                  Musa Sadik Unal and
                  Arsalan Javeed and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {TimeInspector: {A} Static Analysis Approach for Detecting Timing Attacks},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {296--303},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00037},
  doi          = {10.1109/EUROSPW59978.2023.00037},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/DurmazKOUJYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MertYKOSA23,
  author       = {Ahmet Can Mert and
                  Ferhat Yaman and
                  Emre Karabulut and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas and
                  Aydin Aysu},
  editor       = {Cristina Silvano and
                  Christian Pilato and
                  Marc Reichenbach},
  title        = {A Survey of Software Implementations for the Number Theoretic Transform},
  booktitle    = {Embedded Computer Systems: Architectures, Modeling, and Simulation
                  - 23rd International Conference, {SAMOS} 2023, Samos, Greece, July
                  2-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14385},
  pages        = {328--344},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46077-7\_22},
  doi          = {10.1007/978-3-031-46077-7\_22},
  timestamp    = {Wed, 15 Nov 2023 13:04:38 +0100},
  biburl       = {https://dblp.org/rec/conf/samos/MertYKOSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/AydumanKKMS23,
  author       = {Can Ayduman and
                  Emre Ko{\c{c}}er and
                  Selim Kirbiyik and
                  Ahmet Can Mert and
                  Erkay Savas},
  title        = {Efficient Design-Time Flexible Hardware Architecture for Accelerating
                  Homomorphic Encryption},
  booktitle    = {31st {IFIP/IEEE} International Conference on Very Large Scale Integration,
                  VLSI-SoC 2023, Dubai, United Arab Emirates, October 16-18, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VLSI-SoC57769.2023.10321943},
  doi          = {10.1109/VLSI-SOC57769.2023.10321943},
  timestamp    = {Wed, 06 Dec 2023 13:14:06 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsi/AydumanKKMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-12940,
  author       = {Ehsan Nowroozi and
                  Seyedsadra Seyedshoari and
                  Yassine Mekdad and
                  Erkay Savas and
                  Mauro Conti},
  title        = {Cryptocurrency wallets: assessment and security},
  journal      = {CoRR},
  volume       = {abs/2303.12940},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.12940},
  doi          = {10.48550/ARXIV.2303.12940},
  eprinttype    = {arXiv},
  eprint       = {2303.12940},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-12940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TosunS23,
  author       = {Tolun Tosun and
                  Erkay Savas},
  title        = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack
                  on Incomplete {NTT} based Implementations of Lattice-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1046},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TosunS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdennebiS23,
  author       = {Anes Abdennebi and
                  Erkay Savas},
  title        = {A Lattice-based Publish-Subscribe Communication Protocol using Accelerated
                  Homomorphic Encryption Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1309},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1309},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdennebiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzcanS23,
  author       = {Ali Sah {\"{O}}zcan and
                  Erkay Savas},
  title        = {Two Algorithms for Fast {GPU} Implementation of {NTT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1410},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1410},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzcanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/DeryaMOS22,
  author       = {Kemal Derya and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {CoHA-NTT: {A} Configurable Hardware Accelerator for NTT-based Polynomial
                  Multiplication},
  journal      = {Microprocess. Microsystems},
  volume       = {89},
  pages        = {104451},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.micpro.2022.104451},
  doi          = {10.1016/J.MICPRO.2022.104451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/DeryaMOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MertOS22,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Low-Latency {ASIC} Algorithms of Modular Squaring of Large Integers
                  for {VDF} Evaluation},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {1},
  pages        = {107--120},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2020.3043400},
  doi          = {10.1109/TC.2020.3043400},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/MertOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MertKOSA22,
  author       = {Ahmet Can Mert and
                  Emre Karabulut and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas and
                  Aydin Aysu},
  title        = {An Extensive Study of Flexible Design Methods for the Number Theoretic
                  Transform},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {11},
  pages        = {2829--2843},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2020.3017930},
  doi          = {10.1109/TC.2020.3017930},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/MertKOSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/OzerkEMOS22,
  author       = {{\"{O}}zg{\"{u}}n {\"{O}}zerk and
                  Can Elgezen and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Efficient number theoretic transform implementation on {GPU} for homomorphic
                  encryption},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {2},
  pages        = {2840--2872},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-021-03980-5},
  doi          = {10.1007/S11227-021-03980-5},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/OzerkEMOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/UnalJYS22,
  author       = {Musa Sadik Unal and
                  Arsalan Javeed and
                  Cemal Yilmaz and
                  Erkay Savas},
  editor       = {Alastair R. Beresford and
                  Arpita Patra and
                  Emanuele Bellini},
  title        = {HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks
                  in Virtualized Environments},
  booktitle    = {Cryptology and Network Security - 21st International Conference, {CANS}
                  2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13641},
  pages        = {188--199},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20974-1\_9},
  doi          = {10.1007/978-3-031-20974-1\_9},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/UnalJYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/TurkogluOAMOS22,
  author       = {Enes Recep T{\"{u}}rkoglu and
                  Ali Sah {\"{O}}zcan and
                  Can Ayduman and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {An Accelerated {GPU} Library for Homomorphic Encryption Operations
                  of {BFV} Scheme},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2022,
                  Austin, TX, USA, May 27 - June 1, 2022},
  pages        = {1155--1159},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCAS48785.2022.9937503},
  doi          = {10.1109/ISCAS48785.2022.9937503},
  timestamp    = {Thu, 17 Nov 2022 15:59:17 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/TurkogluOAMOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-12195,
  author       = {Ehsan Nowroozi and
                  Mohammadreza Mohammadi and
                  Erkay Savas and
                  Mauro Conti and
                  Yassine Mekdad},
  title        = {{SPRITZ-1.5C:} Employing Deep Ensemble Learning for Improving the
                  Security of Computer Networks against Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2209.12195},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.12195},
  doi          = {10.48550/ARXIV.2209.12195},
  eprinttype    = {arXiv},
  eprint       = {2209.12195},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-12195.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzcanATS22,
  author       = {Ali Sah {\"{O}}zcan and
                  Can Ayduman and
                  Enes Recep T{\"{u}}rkoglu and
                  Erkay Savas},
  title        = {Homomorphic Encryption on {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1222},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1222},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzcanATS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KjamiljiSL21,
  author       = {Artrim Kjamilji and
                  Erkay Savas and
                  Albert Levi},
  title        = {Efficient Secure Building Blocks With Application to Privacy Preserving
                  Machine Learning Algorithms},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {8324--8353},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3049216},
  doi          = {10.1109/ACCESS.2021.3049216},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KjamiljiSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JaveedYS21,
  author       = {Arsalan Javeed and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Detector+: An approach for detecting, isolating, and preventing timing
                  attacks},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102454},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102454},
  doi          = {10.1016/J.COSE.2021.102454},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JaveedYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TosunS21,
  author       = {Tolun Tosun and
                  Erkay Savas},
  title        = {{FSDS:} {A} practical and fully secure document similarity search
                  over encrypted data with lightweight client},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102830},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102830},
  doi          = {10.1016/J.JISA.2021.102830},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TosunS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/CetinSS21,
  author       = {Gizem S. {\c{C}}etin and
                  Erkay Savas and
                  Berk Sunar},
  title        = {Homomorphic Sorting With Better Scalability},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {32},
  number       = {4},
  pages        = {760--771},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPDS.2020.3030748},
  doi          = {10.1109/TPDS.2020.3030748},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/CetinSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/YamanMOS21,
  author       = {Ferhat Yaman and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {A Hardware Accelerator for Polynomial Multiplication Operation of
                  {CRYSTALS-KYBER} {PQC} Scheme},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1020--1025},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474139},
  doi          = {10.23919/DATE51398.2021.9474139},
  timestamp    = {Wed, 21 Jul 2021 10:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/date/YamanMOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/KjamiljiLSG21,
  author       = {Artrim Kjamilji and
                  Albert Levi and
                  Erkay Savas and
                  Osman Berke G{\"{u}}ney},
  title        = {Secure Matrix Operations for Machine Learning Classifications Over
                  Encrypted Data in Post Quantum Industrial IoT},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2021, Dubai, United Arab Emirates, October 31 - November 2,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISNCC52172.2021.9615794},
  doi          = {10.1109/ISNCC52172.2021.9615794},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/KjamiljiLSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11446,
  author       = {Seyma Selcan Magara and
                  Ceren Yildirim and
                  Ferhat Yaman and
                  Berke Dilekoglu and
                  Furkan Reha Tutas and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Kamer Kaya and
                  {\"{O}}znur Tastan and
                  Erkay Savas},
  title        = {{ML} with {HE:} Privacy Preserving Machine Learning Inferences for
                  Genome Studies},
  journal      = {CoRR},
  volume       = {abs/2110.11446},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11446},
  eprinttype    = {arXiv},
  eprint       = {2110.11446},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzerkEMOS21,
  author       = {{\"{O}}zg{\"{u}}n {\"{O}}zerk and
                  Can Elgezen and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Efficient Number Theoretic Transform Implementation on {GPU} for Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/124},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OzerkEMOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YamanMOS21,
  author       = {Ferhat Yaman and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {A Hardware Accelerator for Polynomial Multiplication Operation of
                  {CRYSTALS-KYBER} {PQC} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/485},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YamanMOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaveedYS21,
  author       = {Arsalan Javeed and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Detector+: An Approach for Detecting, Isolating, and Preventing Timing
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/652},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JaveedYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeryaMOS21,
  author       = {Kemal Derya and
                  Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {CoHA-NTT: {A} Configurable Hardware Accelerator for NTT-based Polynomial
                  Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1527},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1527},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DeryaMOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KhayatiSA20,
  author       = {Leyli Javid Khayati and
                  Erkay Savas and
                  Halit Alptekin},
  title        = {Intrusion Detection Over Encrypted Network Data},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {604--619},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz111},
  doi          = {10.1093/COMJNL/BXZ111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KhayatiSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AkyildizGYS20,
  author       = {Taha Atahan Akyildiz and
                  Can Berk Guzgeren and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {MeltdownDetector: {A} runtime approach for detecting meltdown attacks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {112},
  pages        = {136--147},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.05.017},
  doi          = {10.1016/J.FUTURE.2020.05.017},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AkyildizGYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MertOS20,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {{FPGA} implementation of a run-time configurable NTT-based polynomial
                  multiplication hardware},
  journal      = {Microprocess. Microsystems},
  volume       = {78},
  pages        = {103219},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2020.103219},
  doi          = {10.1016/J.MICPRO.2020.103219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/MertOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/MertOS20,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Design and Implementation of Encryption/Decryption Architectures for
                  {BFV} Homomorphic Encryption Scheme},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {353--362},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVLSI.2019.2943127},
  doi          = {10.1109/TVLSI.2019.2943127},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/MertOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MertKOSBA20,
  author       = {Ahmet Can Mert and
                  Emre Karabulut and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas and
                  Michela Becchi and
                  Aydin Aysu},
  title        = {A Flexible and Scalable {NTT} Hardware : Applications from Homomorphically
                  Encrypted Deep Learning to Post-Quantum Cryptography},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {346--351},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116470},
  doi          = {10.23919/DATE48585.2020.9116470},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/MertKOSBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MertOS20,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Low-Latency {ASIC} Algorithms of Modular Squaring of Large Integers
                  for {VDF} Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/480},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MertOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KulahDYS19,
  author       = {Yusuf Kulah and
                  Berkay Dincer and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {SpyDetector: An approach for detecting side-channel attacks at runtime},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {4},
  pages        = {393--422},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0411-7},
  doi          = {10.1007/S10207-018-0411-7},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/KulahDYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GurPRRSS19,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Hadi Sajjadpour and
                  Erkay Savas},
  title        = {Practical Applications of Improved Gaussian Sampling for Trapdoor
                  Lattices},
  journal      = {{IEEE} Trans. Computers},
  volume       = {68},
  number       = {4},
  pages        = {570--584},
  year         = {2019},
  url          = {https://doi.org/10.1109/TC.2018.2874479},
  doi          = {10.1109/TC.2018.2874479},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/GurPRRSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/MertOS19,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Design and Implementation of a Fast and Scalable NTT-Based Polynomial
                  Multiplier Architecture},
  booktitle    = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea,
                  Greece, August 28-30, 2019},
  pages        = {253--260},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSD.2019.00045},
  doi          = {10.1109/DSD.2019.00045},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/MertOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icact/AlptekinYSL19,
  author       = {Halit Alptekin and
                  Can Yildizli and
                  Erkay Savas and
                  Albert Levi},
  title        = {{TRAPDROID:} Bare-Metal Android Malware Behavior Analysis Framework},
  booktitle    = {21st International Conference on Advanced Communication Technology,
                  {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019},
  pages        = {664--671},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/ICACT.2019.8702030},
  doi          = {10.23919/ICACT.2019.8702030},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icact/AlptekinYSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MertOS19,
  author       = {Ahmet Can Mert and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas},
  title        = {Design and Implementation of a Fast and Scalable NTT-Based Polynomial
                  Multiplier Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MertOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkyildizGYS19,
  author       = {Taha Atahan Akyildiz and
                  Can Berk Guzgeren and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {MeltdownDetector: {A} Runtime Approach for Detecting Meltdown Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/613},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AkyildizGYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/TopcuogluKS18,
  author       = {Cem Topcuoglu and
                  Kamer Kaya and
                  Erkay Savas},
  title        = {A generic Private Information Retrieval scheme with parallel multi-exponentiations
                  on multicore processors},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {30},
  number       = {21},
  year         = {2018},
  url          = {https://doi.org/10.1002/cpe.4685},
  doi          = {10.1002/CPE.4685},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/TopcuogluKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/elektrik/AticiYS18,
  author       = {Ali Can Atici and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Cache-timing attacks without a profiling phase},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {26},
  number       = {4},
  pages        = {1953--1966},
  year         = {2018},
  url          = {https://doi.org/10.3906/elk-1711-359},
  doi          = {10.3906/ELK-1711-359},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/elektrik/AticiYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Rodriguez-Henriquez18,
  author       = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Erkay Savas},
  title        = {Special issue in honor of Peter Lawrence Montgomery},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {185--187},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0168-3},
  doi          = {10.1007/S13389-017-0168-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Rodriguez-Henriquez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SavasK18,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Montgomery inversion},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {201--210},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0161-x},
  doi          = {10.1007/S13389-017-0161-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/SavasK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/AyMORS18,
  author       = {Atil U. Ay and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Erkay Savas},
  title        = {Constant-time hardware computation of elliptic curve scalar multiplication
                  around the 128 bit security level},
  journal      = {Microprocess. Microsystems},
  volume       = {62},
  pages        = {79--90},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.micpro.2018.05.005},
  doi          = {10.1016/J.MICPRO.2018.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/AyMORS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiDPRSSS18,
  author       = {Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Hadi Sajjadpour and
                  Erkay Savas and
                  Berk Sunar},
  title        = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE}
                  Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1169--1184},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779427},
  doi          = {10.1109/TIFS.2017.2779427},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiDPRSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GurPRRS18,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  editor       = {Michael Brenner and
                  Kurt Rohloff},
  title        = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice
                  Trapdoors},
  booktitle    = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October
                  19, 2018},
  pages        = {61--71},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267973.3267975},
  doi          = {10.1145/3267973.3267975},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GurPRRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CousinsCGKPRRS18,
  author       = {David Bruce Cousins and
                  Giovanni Di Crescenzo and
                  Kamil Doruk G{\"{u}}r and
                  Kevin King and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  title        = {Implementing Conjunction Obfuscation Under Entropic Ring {LWE}},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {354--371},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00007},
  doi          = {10.1109/SP.2018.00007},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CousinsCGKPRRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AltopBLS17,
  author       = {Duygu Karaoglan Altop and
                  Muhammed Ali Bing{\"{o}}l and
                  Albert Levi and
                  Erkay Savas},
  title        = {{DKEM:} Secure and efficient Distributed Key Establishment Protocol
                  for Wireless Mesh Networks},
  journal      = {Ad Hoc Networks},
  volume       = {54},
  pages        = {53--68},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.adhoc.2016.10.001},
  doi          = {10.1016/J.ADHOC.2016.10.001},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AltopBLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TillemSK17,
  author       = {Gamze Tillem and
                  Erkay Savas and
                  Kamer Kaya},
  title        = {A New Method for Computational Private Information Retrieval},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {8},
  pages        = {1238--1250},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxx025},
  doi          = {10.1093/COMJNL/BXX025},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/TillemSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/OzturkDSS17,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Yarkin Dor{\"{o}}z and
                  Erkay Savas and
                  Berk Sunar},
  title        = {A Custom Accelerator for Homomorphic Encryption Applications},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {1},
  pages        = {3--16},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2574340},
  doi          = {10.1109/TC.2016.2574340},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/OzturkDSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GurPRRS17,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  title        = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice
                  Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GurPRRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/orencikSA17,
  author       = {Cengiz {\"{O}}rencik and
                  Erkay Savas and
                  Mahmoud Alewiwi},
  title        = {A Unified Framework for Secure Search Over Encrypted Cloud Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/orencikSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiDPRSSS17,
  author       = {Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Hadi Sajjadpour and
                  Erkay Savas and
                  Berk Sunar},
  title        = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE}
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiDPRSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CousinsCGKPRRS17,
  author       = {David Bruce Cousins and
                  Giovanni Di Crescenzo and
                  Kamil Doruk G{\"{u}}r and
                  Kevin King and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Erkay Savas},
  title        = {Implementing Conjunction Obfuscation under Entropic Ring {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CousinsCGKPRRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GurPRRSS17,
  author       = {Kamil Doruk G{\"{u}}r and
                  Yuriy Polyakov and
                  Kurt Rohloff and
                  Gerard W. Ryan and
                  Hadi Sajjadpour and
                  Erkay Savas},
  title        = {Practical Applications of Improved Gaussian Sampling for Trapdoor
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1254},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GurPRRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ChiappettaSY16,
  author       = {Marco Chiappetta and
                  Erkay Savas and
                  Cemal Yilmaz},
  title        = {Real time detection of cache-based side-channel attacks using hardware
                  performance counters},
  journal      = {Appl. Soft Comput.},
  volume       = {49},
  pages        = {1162--1174},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.asoc.2016.09.014},
  doi          = {10.1016/J.ASOC.2016.09.014},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/ChiappettaSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AlewiwiOS16,
  author       = {Mahmoud Alewiwi and
                  Cengiz {\"{O}}rencik and
                  Erkay Savas},
  title        = {Efficient top-k similarity document search utilizing distributed file
                  systems and cosine similarity},
  journal      = {Clust. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {109--126},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10586-015-0506-0},
  doi          = {10.1007/S10586-015-0506-0},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AlewiwiOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/OrencikSSK16,
  author       = {Cengiz {\"{O}}rencik and
                  Ayse Selcuk and
                  Erkay Savas and
                  Murat Kantarcioglu},
  title        = {Multi-Keyword search over encrypted data with scoring and search pattern
                  obfuscation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {3},
  pages        = {251--269},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0294-9},
  doi          = {10.1007/S10207-015-0294-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/OrencikSSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KhayatiOSU16,
  author       = {Leyli Javid Khayati and
                  Cengiz {\"{O}}rencik and
                  Erkay Savas and
                  Berkant Ustaoglu},
  title        = {A practical privacy-preserving targeted advertising scheme for {IPTV}
                  users},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {4},
  pages        = {335--360},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0296-7},
  doi          = {10.1007/S10207-015-0296-7},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KhayatiOSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/KermaniSU16,
  author       = {Mehran Mozaffari Kermani and
                  Erkay Savas and
                  Shambhu J. Upadhyaya},
  title        = {Guest Editorial: Introduction to the Special Issue on Emerging Security
                  Trends for Deeply-Embedded Computing Systems},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {318--320},
  year         = {2016},
  url          = {https://doi.org/10.1109/TETC.2015.2482778},
  doi          = {10.1109/TETC.2015.2482778},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/KermaniSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/UnalS16,
  author       = {Ecem {\"{U}}nal and
                  Erkay Savas},
  title        = {On Acceleration and Scalability of Number Theoretic Private Information
                  Retrieval},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {6},
  pages        = {1727--1741},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2456021},
  doi          = {10.1109/TPDS.2015.2456021},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/UnalS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TillemCSK16,
  author       = {Gamze Tillem and
                  {\"{O}}mer Mert Candan and
                  Erkay Savas and
                  Kamer Kaya},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Hiding Access Patterns in Range Queries Using Private Information
                  Retrieval and {ORAM}},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_17},
  doi          = {10.1007/978-3-662-53357-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TillemCSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/AyORS16,
  author       = {Atil U. Ay and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Erkay Savas},
  editor       = {Peter M. Athanas and
                  Ren{\'{e}} Cumplido and
                  Claudia Feregrino and
                  Ron Sass},
  title        = {Design and implementation of a constant-time {FPGA} accelerator for
                  fast elliptic curve cryptography},
  booktitle    = {International Conference on ReConFigurable Computing and FPGAs, ReConFig
                  2016, Cancun, Mexico, November 30 - Dec. 2, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ReConFig.2016.7857163},
  doi          = {10.1109/RECONFIG.2016.7857163},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/AyORS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AticiYS16,
  author       = {Ali Can Atici and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Remote Cache-Timing Attack without Learning Phase},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/002},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AticiYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YumbulS15,
  author       = {Kazim Yumbul and
                  Erkay Savas},
  title        = {Enhancing an Embedded Processor Core for Efficient and Isolated Execution
                  of Cryptographic Algorithms},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2368--2387},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu040},
  doi          = {10.1093/COMJNL/BXU040},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YumbulS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SavasY15,
  author       = {Erkay Savas and
                  Cemal Yilmaz},
  title        = {A Generic Method for the Analysis of a Class of Cache Attacks: {A}
                  Case Study for {AES}},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2716--2737},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv027},
  doi          = {10.1093/COMJNL/BXV027},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/SavasY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/KarabatKES15,
  author       = {Cagatay Karabat and
                  Mehmet S. Kiraz and
                  Hakan Erdogan and
                  Erkay Savas},
  title        = {{THRIVE:} threshold homomorphic encryption based secure and privacy
                  preserving biometric verification system},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2015},
  pages        = {71},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13634-015-0255-5},
  doi          = {10.1186/S13634-015-0255-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/KarabatKES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DorozOSS15,
  author       = {Yarkin Dor{\"{o}}z and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas and
                  Berk Sunar},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Accelerating {LTV} Based Homomorphic Encryption in Reconfigurable
                  Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_10},
  doi          = {10.1007/978-3-662-48324-4\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DorozOSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/CetinDSS15,
  author       = {Gizem S. {\c{C}}etin and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Erkay Savas},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Depth Optimized Efficient Homomorphic Sorting},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_4},
  doi          = {10.1007/978-3-319-22174-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/CetinDSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OrencikAS15,
  author       = {Cengiz {\"{O}}rencik and
                  Mahmoud Alewiwi and
                  Erkay Savas},
  title        = {Secure Sketch Search for Document Similarity},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1102--1107},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.489},
  doi          = {10.1109/TRUSTCOM.2015.489},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OrencikAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2014,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16277-5},
  doi          = {10.1007/978-3-319-16277-5},
  isbn         = {978-3-319-16276-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinDSS15,
  author       = {Gizem S. {\c{C}}etin and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Erkay Savas},
  title        = {Low Depth Circuits for Efficient Homomorphic Sorting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinDSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzturkDSS15,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Erkay Savas},
  title        = {Accelerating Somewhat Homomorphic Evaluation using FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzturkDSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiappettaSY15,
  author       = {Marco Chiappetta and
                  Erkay Savas and
                  Cemal Yilmaz},
  title        = {Real time detection of cache-based side-channel attacks using Hardware
                  Performance Counters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1034},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiappettaSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/OrencikS14,
  author       = {Cengiz {\"{O}}rencik and
                  Erkay Savas},
  title        = {An efficient privacy-preserving multi-keyword search over encrypted
                  cloud data with ranking},
  journal      = {Distributed Parallel Databases},
  volume       = {32},
  number       = {1},
  pages        = {119--160},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10619-013-7123-9},
  doi          = {10.1007/S10619-013-7123-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/OrencikS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YumbulSKG14,
  author       = {Kazim Yumbul and
                  Erkay Savas and
                  {\"{O}}v{\"{u}}n{\c{c}} Kocabas and
                  Johann Gro{\ss}sch{\"{a}}dl},
  title        = {Design and implementation of a versatile cryptographic unit for {RISC}
                  processors},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {1},
  pages        = {36--52},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.555},
  doi          = {10.1002/SEC.555},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YumbulSKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/YumbulES14,
  author       = {Kazim Yumbul and
                  Serdar S{\"{u}}er Erdem and
                  Erkay Savas},
  title        = {On Selection of Modulus of Quadratic Codes for the Protection of Cryptographic
                  Operations against Fault Attacks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {5},
  pages        = {1182--1196},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2012.236},
  doi          = {10.1109/TC.2012.236},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/YumbulES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/UnalS14,
  author       = {Ecem {\"{U}}nal and
                  Erkay Savas},
  editor       = {Ron Poet and
                  Muttukrishnan Rajarajan},
  title        = {Bandwidth-Optimized Parallel Private Information Retrieval},
  booktitle    = {Proceedings of the 7th International Conference on Security of Information
                  and Networks, Glasgow, Scotland, UK, September 9-11, 2014},
  pages        = {197},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2659651.2659702},
  doi          = {10.1145/2659651.2659702},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/UnalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KarabatKES14,
  author       = {Cagatay Karabat and
                  Mehmet Sabir Kiraz and
                  Hakan Erdogan and
                  Erkay Savas},
  title        = {{THRIVE:} Threshold Homomorphic encryption based secure and privacy
                  preserving bIometric VErification system},
  journal      = {CoRR},
  volume       = {abs/1409.8212},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.8212},
  eprinttype    = {arXiv},
  eprint       = {1409.8212},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KarabatKES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/OrencikKS13,
  author       = {Cengiz {\"{O}}rencik and
                  Murat Kantarcioglu and
                  Erkay Savas},
  title        = {A Practical and Secure Multi-keyword Search Method over Encrypted
                  Cloud Data},
  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {390--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CLOUD.2013.18},
  doi          = {10.1109/CLOUD.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/OrencikKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/MerrillBBBCKOS13,
  author       = {Shawn Merrill and
                  Nilgun Basalp and
                  Joachim Biskup and
                  Erik Buchmann and
                  Chris Clifton and
                  Bart Kuijpers and
                  Walied Othman and
                  Erkay Savas},
  title        = {Privacy through Uncertainty in Location-Based Services},
  booktitle    = {2013 {IEEE} 14th International Conference on Mobile Data Management,
                  Milan, Italy, June 3-6, 2013 - Volume 2},
  pages        = {67--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MDM.2013.71},
  doi          = {10.1109/MDM.2013.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/MerrillBBBCKOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Savas13,
  author       = {Erkay Savas},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {Attacks on implementations of cryptographic algorithms: side-channel
                  and fault attacks},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2523593},
  doi          = {10.1145/2523514.2523593},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Savas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AticiYS13,
  author       = {Ali Can Atici and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {An Approach for Isolating the Sources of Information Leakage Exploited
                  in Cache-Based Side-Channel Attacks},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {74--83},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.15},
  doi          = {10.1109/SERE-C.2013.15},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AticiYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/DorozS12,
  author       = {Yarkin Dor{\"{o}}z and
                  Erkay Savas},
  editor       = {Oliver C. S. Choy and
                  Ray C. C. Cheung and
                  Peter M. Athanas and
                  Kentaro Sano},
  title        = {Constructing Cluster of Simple {FPGA} Boards for Cryptologic Computations},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications -
                  8th International Symposium, {ARC} 2012, Hong Kong, China, March 19-23,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7199},
  pages        = {320--328},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28365-9\_27},
  doi          = {10.1007/978-3-642-28365-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/DorozS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/OrencikS12,
  author       = {Cengiz {\"{O}}rencik and
                  Erkay Savas},
  editor       = {Divesh Srivastava and
                  Ismail Ari},
  title        = {Efficient and secure ranked multi-keyword search on encrypted cloud
                  data},
  booktitle    = {Proceedings of the 2012 Joint {EDBT/ICDT} Workshops, Berlin, Germany,
                  March 30, 2012},
  pages        = {186--195},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2320765.2320820},
  doi          = {10.1145/2320765.2320820},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/OrencikS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/DurahimYSL12,
  author       = {Ahmet Onur Durahim and
                  Ismail Fatih Yildirim and
                  Erkay Savas and
                  Albert Levi},
  editor       = {Erol Gelenbe and
                  Ricardo Lent},
  title        = {Performance Evaluation of Different {CRL} Distribution Schemes Embedded
                  in {WMN} Authentication},
  booktitle    = {Computer and Information Sciences {III} - 27th International Symposium
                  on Computer and Information Sciences, Paris, France, October 3-4,
                  2012},
  pages        = {333--342},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-1-4471-4594-3\_34},
  doi          = {10.1007/978-1-4471-4594-3\_34},
  timestamp    = {Sat, 16 Sep 2017 12:11:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/DurahimYSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/BaktirS12,
  author       = {Sel{\c{c}}uk Baktir and
                  Erkay Savas},
  editor       = {Erol Gelenbe and
                  Ricardo Lent},
  title        = {Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose
                  Microprocessors},
  booktitle    = {Computer and Information Sciences {III} - 27th International Symposium
                  on Computer and Information Sciences, Paris, France, October 3-4,
                  2012},
  pages        = {467--476},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-1-4471-4594-3\_48},
  doi          = {10.1007/978-1-4471-4594-3\_48},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/BaktirS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/SavasY12,
  author       = {Erkay Savas and
                  Cemal Yilmaz},
  editor       = {Albert Levi and
                  Mohamad Badra and
                  Matteo Cesana and
                  Mona Ghassemian and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
                  Nafa{\^{a}} Jabeur and
                  Marek Klonowski and
                  Antonio Ma{\~{n}}a and
                  Susana Sargento and
                  Sherali Zeadally},
  title        = {Cache Attacks: An Information and Complexity Theoretic Approach},
  booktitle    = {5th International Conference on New Technologies, Mobility and Security,
                  Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NTMS.2012.6208720},
  doi          = {10.1109/NTMS.2012.6208720},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/SavasY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12,
  author       = {Leyli Javid Khayati and
                  Erkay Savas and
                  Berkant Ustaoglu and
                  Cengiz {\"{O}}rencik},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the
                  Cloud},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {74--83},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhayatiSUO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaktirS12,
  author       = {Sel{\c{c}}uk Baktir and
                  Erkay Savas},
  title        = {Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose
                  Microprocessors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaktirS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/DurahimS11,
  author       = {Ahmet Onur Durahim and
                  Erkay Savas},
  title        = {A\({}^{\mbox{2}}\)-MAKE: An efficient anonymous and accountable mutual
                  authentication and key agreement protocol for WMNs},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {7},
  pages        = {1202--1220},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2011.01.008},
  doi          = {10.1016/J.ADHOC.2011.01.008},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/DurahimS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ErgunLS11,
  author       = {Murat Ergun and
                  Albert Levi and
                  Erkay Savas},
  title        = {Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise
                  Key Predistribution Approach},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {4},
  pages        = {602--616},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxq043},
  doi          = {10.1093/COMJNL/BXQ043},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ErgunLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/YildizliPSSL11,
  author       = {Can Yildizli and
                  Thomas Brochmann Pedersen and
                  Y{\"{u}}cel Saygin and
                  Erkay Savas and
                  Albert Levi},
  title        = {Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing
                  and Its Application to (Vertically) Partitioned Spatio-Temporal Data},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {7},
  number       = {1},
  pages        = {46--66},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdwm.2011010103},
  doi          = {10.4018/JDWM.2011010103},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/YildizliPSSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/YumbulES11,
  author       = {Kazim Yumbul and
                  Serdar S{\"{u}}er Erdem and
                  Erkay Savas},
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {On Protecting Cryptographic Applications Against Fault Attacks Using
                  Residue Codes},
  booktitle    = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  pages        = {69--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FDTC.2011.14},
  doi          = {10.1109/FDTC.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/YumbulES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlpcanLS11,
  author       = {Tansu Alpcan and
                  Albert Levi and
                  Erkay Savas},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Digital Trust Games: An Experimental Study},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {182--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_15},
  doi          = {10.1007/978-3-642-25280-8\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlpcanLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/KaplanPSS10,
  author       = {Emre Kaplan and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Y{\"{u}}cel Saygin},
  title        = {Discovering private trajectories using background information},
  journal      = {Data Knowl. Eng.},
  volume       = {69},
  number       = {7},
  pages        = {723--736},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.datak.2010.02.008},
  doi          = {10.1016/J.DATAK.2010.02.008},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/KaplanPSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlpcanOLS10,
  author       = {Tansu Alpcan and
                  Cengiz {\"{O}}rencik and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {A game theoretic model for digital identity and trust in online communities},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {341--344},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755735},
  doi          = {10.1145/1755688.1755735},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlpcanOLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/KaraoglanLS10,
  author       = {Duygu Karaoglan and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Mario Gerla and
                  Matteo Cesana and
                  Jalel Ben{-}Othman},
  title        = {A distributed key establishment scheme for wireless mesh networks
                  using identity-based cryptography},
  booktitle    = {Q2SWinet'10, Proceedings of the Sixth {ACM} Symposium on QoS and Security
                  for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1868630.1868633},
  doi          = {10.1145/1868630.1868633},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/KaraoglanLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AkinAUS10,
  author       = {Abdulkadir Akin and
                  Aydin Aysu and
                  Onur Can Ulusel and
                  Erkay Savas},
  editor       = {Oleg B. Makarevich and
                  Atilla El{\c{c}}i and
                  Mehmet A. Orgun and
                  Sorin A. Huss and
                  Ludmila K. Babenko and
                  Alexander G. Chefranov and
                  Vijay Varadharajan},
  title        = {Efficient hardware implementations of high throughput {SHA-3} candidates
                  keccak, luffa and blue midnight wish for single- and multi-message
                  hashing},
  booktitle    = {Proceedings of the 3rd International Conference on Security of Information
                  and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
                  7-11, 2010},
  pages        = {168--177},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854099.1854135},
  doi          = {10.1145/1854099.1854135},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AkinAUS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/YumbulES10,
  author       = {Kazim Yumbul and
                  Serdar S{\"{u}}er Erdem and
                  Erkay Savas},
  editor       = {Oleg B. Makarevich and
                  Atilla El{\c{c}}i and
                  Mehmet A. Orgun and
                  Sorin A. Huss and
                  Ludmila K. Babenko and
                  Alexander G. Chefranov and
                  Vijay Varadharajan},
  title        = {Design and implementation of robust embedded processor for cryptographic
                  applications},
  booktitle    = {Proceedings of the 3rd International Conference on Security of Information
                  and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
                  7-11, 2010},
  pages        = {178--185},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854099.1854137},
  doi          = {10.1145/1854099.1854137},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/YumbulES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KayaSLE09,
  author       = {Selim Volkan Kaya and
                  Erkay Savas and
                  Albert Levi and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin},
  title        = {Public key cryptography based privacy preserving multi-context {RFID}
                  infrastructure},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {1},
  pages        = {136--152},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2007.12.004},
  doi          = {10.1016/J.ADHOC.2007.12.004},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/KayaSLE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/OzturkSS09,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Berk Sunar and
                  Erkay Savas},
  title        = {A versatile Montgomery multiplier architecture with characteristic
                  three support},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {1},
  pages        = {71--85},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2008.05.009},
  doi          = {10.1016/J.COMPELECENG.2008.05.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/OzturkSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/PedersenS09,
  author       = {Thomas Brochmann Pedersen and
                  Erkay Savas},
  title        = {Impossibility of unconditionally secure scalar products},
  journal      = {Data Knowl. Eng.},
  volume       = {68},
  number       = {10},
  pages        = {1059--1070},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.datak.2009.04.006},
  doi          = {10.1016/J.DATAK.2009.04.006},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/PedersenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/DurahimSSPK09,
  author       = {Ahmet Onur Durahim and
                  Erkay Savas and
                  Berk Sunar and
                  Thomas Brochmann Pedersen and
                  {\"{O}}v{\"{u}}n{\c{c}} Kocabas},
  title        = {Transparent code authentication at the processor level},
  journal      = {{IET} Comput. Digit. Tech.},
  volume       = {3},
  number       = {4},
  pages        = {354--372},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-cdt.2007.0122},
  doi          = {10.1049/IET-CDT.2007.0122},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cdt/DurahimSSPK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/ErgunLS09,
  author       = {Murat Ergun and
                  Albert Levi and
                  Erkay Savas},
  title        = {A resilient key predistribution scheme for multiphase wireless sensor
                  networks},
  booktitle    = {The 24th International Symposium on Computer and Information Sciences,
                  {ISCIS} 2009, 14-16 September 2009, North Cyprus},
  pages        = {375--380},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCIS.2009.5291809},
  doi          = {10.1109/ISCIS.2009.5291809},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/ErgunLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/DurahimSY09,
  author       = {Ahmet Onur Durahim and
                  Erkay Savas and
                  Kazim Yumbul},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Implementing a Protected Zone in a Reconfigurable Processor for Isolated
                  Execution of Cryptographic Algorithms},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {207--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.46},
  doi          = {10.1109/RECONFIG.2009.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/DurahimSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/GrossschadlSY09,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Erkay Savas and
                  Kazim Yumbul},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision
                  Multiplier Datapath},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {261--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.83},
  doi          = {10.1109/RECONFIG.2009.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/GrossschadlSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/YumbulS09,
  author       = {Kazim Yumbul and
                  Erkay Savas},
  editor       = {Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Mehmet A. Orgun and
                  Alexander G. Chefranov and
                  Josef Pieprzyk and
                  Yuri Anatolievich Bryukhomitsky and
                  Siddika Berna {\"{O}}rs},
  title        = {Efficient, secure, and isolated execution of cryptographic algorithms
                  on a cryptographic unit},
  booktitle    = {Proceedings of the 2nd International Conference on Security of Information
                  and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
                  2009},
  pages        = {143--151},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1626195.1626233},
  doi          = {10.1145/1626195.1626233},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/YumbulS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SavasK09,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Efficient Unified Arithmetic for Hardware Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {105--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_6},
  doi          = {10.1007/978-0-387-71817-0\_6},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SunarGS08,
  author       = {Berk Sunar and
                  Gunnar Gaubatz and
                  Erkay Savas},
  title        = {Sequential Circuit Design for Embedded Cryptographic Applications
                  Resilient to Adversarial Faults},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {1},
  pages        = {126--138},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2007.70784},
  doi          = {10.1109/TC.2007.70784},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SunarGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/DoganayPSSL08,
  author       = {Mahir Can Doganay and
                  Thomas Brochmann Pedersen and
                  Y{\"{u}}cel Saygin and
                  Erkay Savas and
                  Albert Levi},
  editor       = {Farshad Fotouhi and
                  Li Xiong and
                  Traian Marius Truta},
  title        = {Distributed privacy preserving k-means clustering with additive secret
                  sharing},
  booktitle    = {Proceedings of the 2008 International Workshop on Privacy and Anonymity
                  in Information Society, {PAIS} 2008, Nantes, France, March 29, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {3--11},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1379287.1379291},
  doi          = {10.1145/1379287.1379291},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/DoganayPSSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/YilmazLS08,
  author       = {{\"{O}}mer Zekvan Yilmaz and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation
                  Deployment Schemes},
  booktitle    = {e-Business and Telecommunications - International Conference, {ICETE}
                  2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {48},
  pages        = {180--198},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-05197-5\_13},
  doi          = {10.1007/978-3-642-05197-5\_13},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/YilmazLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icons/KomurcuS08,
  author       = {Giray K{\"{o}}m{\"{u}}rc{\"{u}} and
                  Erkay Savas},
  title        = {An Efficient Hardware Implementation of the Tate Pairing in Characteristic
                  Three},
  booktitle    = {The Third International Conference on Systems, {ICONS} 2008, April
                  13-18, 2008, Cancun, Mexico},
  pages        = {23--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICONS.2008.27},
  doi          = {10.1109/ICONS.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icons/KomurcuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/KaplanPSS08,
  author       = {Emre Kaplan and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Y{\"{u}}cel Saygin},
  editor       = {Ignac Lovrek and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Privacy Risks in Trajectory Data Publishing: Reconstructing Private
                  Trajectories from Continuous Properties},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 12th
                  International Conference, {KES} 2008, Zagreb, Croatia, September 3-5,
                  2008, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5178},
  pages        = {642--649},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85565-1\_79},
  doi          = {10.1007/978-3-540-85565-1\_79},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/KaplanPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/OksuzogluS08,
  author       = {Ersin {\"{O}}ks{\"{u}}zoglu and
                  Erkay Savas},
  title        = {Parametric, Secure and Compact Implementation of {RSA} on {FPGA}},
  booktitle    = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
                  and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages        = {391--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ReConFig.2008.13},
  doi          = {10.1109/RECONFIG.2008.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/OksuzogluS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/KocabasSG08,
  author       = {{\"{O}}v{\"{u}}n{\c{c}} Kocabas and
                  Erkay Savas and
                  Johann Gro{\ss}sch{\"{a}}dl},
  title        = {Enhancing an Embedded Processor Core with a Cryptographic Unit for
                  Speed and Security},
  booktitle    = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
                  and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages        = {409--414},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ReConFig.2008.59},
  doi          = {10.1109/RECONFIG.2008.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/KocabasSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OrencikPSK08,
  author       = {Cengiz {\"{O}}rencik and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Mehmet Keskin{\"{o}}z},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Improved Fuzzy Vault Scheme for Fingerprint Verification},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--43},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/OrencikPSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YilmazLS08,
  author       = {Omer Zekvan Yilmaz and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {136--144},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YilmazLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KaratopS08,
  author       = {Ayse G{\"{u}}l Karatop and
                  Erkay Savas},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {An identity-based key infrastructure suitable for messaging and its
                  application to e-mail},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460890},
  doi          = {10.1145/1460877.1460890},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KaratopS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssdbm/TurgayPSSL08,
  author       = {E. Onur Turgay and
                  Thomas Brochmann Pedersen and
                  Y{\"{u}}cel Saygin and
                  Erkay Savas and
                  Albert Levi},
  editor       = {Bertram Lud{\"{a}}scher and
                  Nikos Mamoulis},
  title        = {Disclosure Risks of Distance Preserving Data Transformations},
  booktitle    = {Scientific and Statistical Database Management, 20th International
                  Conference, {SSDBM} 2008, Hong Kong, China, July 9-11, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5069},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69497-7\_8},
  doi          = {10.1007/978-3-540-69497-7\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssdbm/TurgayPSSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/springer/BonchiSVAGKS08,
  author       = {Francesco Bonchi and
                  Y{\"{u}}cel Saygin and
                  Vassilios S. Verykios and
                  Maurizio Atzori and
                  Aris Gkoulalas{-}Divanis and
                  Selim Volkan Kaya and
                  Erkay Savas},
  editor       = {Fosca Giannotti and
                  Dino Pedreschi},
  title        = {Privacy in Spatiotemporal Data Mining},
  booktitle    = {Mobility, Data Mining and Privacy - Geographic Knowledge Discovery},
  pages        = {297--333},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-75177-9\_12},
  doi          = {10.1007/978-3-540-75177-9\_12},
  timestamp    = {Mon, 03 Jan 2022 21:52:36 +0100},
  biburl       = {https://dblp.org/rec/series/springer/BonchiSVAGKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/InanKSSHL07,
  author       = {Ali Inan and
                  Selim Volkan Kaya and
                  Y{\"{u}}cel Saygin and
                  Erkay Savas and
                  Ay{\c{c}}a Azgin Hintoglu and
                  Albert Levi},
  title        = {Privacy preserving clustering on horizontally partitioned data},
  journal      = {Data Knowl. Eng.},
  volume       = {63},
  number       = {3},
  pages        = {646--666},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.datak.2007.03.015},
  doi          = {10.1016/J.DATAK.2007.03.015},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/InanKSSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/UnluALSE07,
  author       = {Abd{\"{u}}lhakim {\"{U}}nl{\"{u}} and
                  {\"{O}}nsel Armagan and
                  Albert Levi and
                  Erkay Savas and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin},
  editor       = {Ian F. Akyildiz and
                  Raghupathy Sivakumar and
                  Eylem Ekici and
                  Jaudelice Cavalcante de Oliveira and
                  Janise McNair},
  title        = {Key Predistribution Schemes for Sensor Networks for Continuous Deployment
                  Scenario},
  booktitle    = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet, 6th International {IFIP-TC6} Networking
                  Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4479},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72606-7\_21},
  doi          = {10.1007/978-3-540-72606-7\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/UnluALSE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KayaSLE07,
  author       = {Selim Volkan Kaya and
                  Erkay Savas and
                  Albert Levi and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin},
  editor       = {Ian F. Akyildiz and
                  Raghupathy Sivakumar and
                  Eylem Ekici and
                  Jaudelice Cavalcante de Oliveira and
                  Janise McNair},
  title        = {Privacy-Aware Multi-Context {RFID} Infrastructure Using Public Key
                  Cryptography},
  booktitle    = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet, 6th International {IFIP-TC6} Networking
                  Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4479},
  pages        = {263--274},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72606-7\_23},
  doi          = {10.1007/978-3-540-72606-7\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KayaSLE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/KayaPSS07,
  author       = {Selim Volkan Kaya and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Y{\"{u}}cel Saygin},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {Efficient Privacy Preserving Distributed Clustering Based on Secret
                  Sharing},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {280--291},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_29},
  doi          = {10.1007/978-3-540-77018-3\_29},
  timestamp    = {Fri, 09 Apr 2021 17:11:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/KayaPSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/InanSSHL06,
  author       = {Ali Inan and
                  Y{\"{u}}cel Saygin and
                  Erkay Savas and
                  Ay{\c{c}}a Azgin Hintoglu and
                  Albert Levi},
  editor       = {Roger S. Barga and
                  Xiaofang Zhou},
  title        = {Privacy Preserving Clustering on Horizontally Partitioned Data},
  booktitle    = {Proceedings of the 22nd International Conference on Data Engineering
                  Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}},
  pages        = {95},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDEW.2006.115},
  doi          = {10.1109/ICDEW.2006.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/InanSSHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscn/OnizSL06,
  author       = {Cagil Can Oniz and
                  Erkay Savas and
                  Albert Levi},
  title        = {An optimistic fair e-commerce protocol for large e-goods},
  booktitle    = {Proceedings of the International Symposium on Computer Networks, {ISCN}
                  2006, June 16-18, 2006, Istanbul, Turkey},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCN.2006.1662536},
  doi          = {10.1109/ISCN.2006.1662536},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscn/OnizSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscis/2006,
  editor       = {Albert Levi and
                  Erkay Savas and
                  H{\"{u}}sn{\"{u}} Yenig{\"{u}}n and
                  Selim Balcisoy and
                  Y{\"{u}}cel Saygin},
  title        = {Computer and Information Sciences - {ISCIS} 2006, 21th International
                  Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4263},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11902140},
  doi          = {10.1007/11902140},
  isbn         = {3-540-47242-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Savas05,
  author       = {Erkay Savas},
  title        = {A Carry-Free Architecture for Montgomery Inversion},
  journal      = {{IEEE} Trans. Computers},
  volume       = {54},
  number       = {12},
  pages        = {1508--1519},
  year         = {2005},
  url          = {https://doi.org/10.1109/TC.2005.188},
  doi          = {10.1109/TC.2005.188},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Savas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossschadlAST05,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Roberto Maria Avanzi and
                  Erkay Savas and
                  Stefan Tillich},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_6},
  doi          = {10.1007/11545262\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/OnizTSEL05,
  author       = {Cagil Can Oniz and
                  Sinan Emre Tas{\c{c}}i and
                  Erkay Savas and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin and
                  Albert Levi},
  title        = {SeFER: secure, flexible and efficient routing protocol for distributed
                  sensor networks},
  booktitle    = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul,
                  Turkey, January 31 - February 2, 2005, Proceedings},
  pages        = {246--255},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/EWSN.2005.1462017},
  doi          = {10.1109/EWSN.2005.1462017},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/OnizTSEL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/SavasS05,
  author       = {Erkay Savas and
                  Berk Sunar},
  editor       = {Pascal Lorenz and
                  Petre Dini},
  title        = {A Practical and Secure Communication Protocol in the Bounded Storage
                  Model},
  booktitle    = {Networking - {ICN} 2005, 4th International Conference on Networking,
                  ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3421},
  pages        = {707--717},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31957-3\_80},
  doi          = {10.1007/978-3-540-31957-3\_80},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/SavasS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/OnizSL05,
  author       = {Cagil Can Oniz and
                  Erkay Savas and
                  Albert Levi},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {A Fair Multimedia Exchange Protocol},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {342--351},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_37},
  doi          = {10.1007/11569596\_37},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/OnizSL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/others/05/BayogluLS05,
  author       = {Burak Bayoglu and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Tuna Tugcu and
                  Erol Gelenbe and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {Performance Evaluation of End-to-End Security in Wireless Applications
                  using {WTLS} Handshake Protocol},
  booktitle    = {New Trends in Computer Networks},
  series       = {Advances in Computer Science and Engineering : Reports and Monographs},
  volume       = {1},
  publisher    = {Imperial College Press},
  year         = {2005},
  url          = {https://doi.org/10.1142/9781860947308\_0021},
  doi          = {10.1142/9781860947308\_0021},
  timestamp    = {Mon, 22 Jun 2020 14:58:58 +0200},
  biburl       = {https://dblp.org/rec/books/others/05/BayogluLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OzturkSS04,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Berk Sunar and
                  Erkay Savas},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_7},
  doi          = {10.1007/978-3-540-28632-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OzturkSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossschadlS04,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Erkay Savas},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Instruction Set Extensions for Fast Arithmetic in Finite Fields {GF(}
                  p) and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_10},
  doi          = {10.1007/978-3-540-28632-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossschadlS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SunarSK03,
  author       = {Berk Sunar and
                  Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Constructing Composite Field Representations for Efficient Conversion},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {11},
  pages        = {1391--1398},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1244937},
  doi          = {10.1109/TC.2003.1244937},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SunarSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LeviS03,
  author       = {Albert Levi and
                  Erkay Savas},
  title        = {Performance Evaluation of Public-Key Cryptosystem Operations in {WTLS}
                  Protocol},
  booktitle    = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages        = {1245--1250},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCC.2003.1214285},
  doi          = {10.1109/ISCC.2003.1214285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/LeviS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GutubTSK02,
  author       = {Adnan Abdul{-}Aziz Gutub and
                  Alexandre F. Tenca and
                  Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p)
                  and {GF(2)}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {484--499},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_35},
  doi          = {10.1007/3-540-36400-5\_35},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GutubTSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/SavasK02,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Architectures for unified field inversion with applications in elliptic
                  curve cryptography},
  booktitle    = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics,
                  Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September
                  15-18, 2002},
  pages        = {1155--1158},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICECS.2002.1046457},
  doi          = {10.1109/ICECS.2002.1046457},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/SavasK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasSK01,
  author       = {Erkay Savas and
                  Thomas A. Schmidt and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Generating Elliptic Curves of Prime Order},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_13},
  doi          = {10.1007/3-540-44709-1\_13},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SavasSK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SavasK00,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {The Montgomery Modular Inverse-Revisited},
  journal      = {{IEEE} Trans. Computers},
  volume       = {49},
  number       = {7},
  pages        = {763--766},
  year         = {2000},
  url          = {https://doi.org/10.1109/12.863048},
  doi          = {10.1109/12.863048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SavasK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasTK00,
  author       = {Erkay Savas and
                  Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p})
                  and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_22},
  doi          = {10.1007/3-540-44499-8\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SavasTK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics