Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Erkay Savas
@article{DBLP:journals/tifs/TosunS24, author = {Tolun Tosun and Erkay Savas}, title = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3353--3365}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3359890}, doi = {10.1109/TIFS.2024.3359890}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TosunS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TosunMS24, author = {Tolun Tosun and Amir Moradi and Erkay Savas}, title = {Exploiting the Central Reduction in Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2024}, url = {https://eprint.iacr.org/2024/066}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TosunMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JaveedYS23, author = {Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, title = {Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: {A} Systematic Mapping Study}, journal = {{IEEE} Access}, volume = {11}, pages = {48945--48976}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3275757}, doi = {10.1109/ACCESS.2023.3275757}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JaveedYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OzcanATS23, author = {Ali Sah {\"{O}}zcan and Can Ayduman and Enes Recep T{\"{u}}rkoglu and Erkay Savas}, title = {Homomorphic Encryption on {GPU}}, journal = {{IEEE} Access}, volume = {11}, pages = {84168--84186}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3265583}, doi = {10.1109/ACCESS.2023.3265583}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/OzcanATS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/NowrooziMSMC23, author = {Ehsan Nowroozi and Mohammadreza Mohammadi and Erkay Savas and Yassine Mekdad and Mauro Conti}, title = {Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {2}, pages = {2096--2105}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3267831}, doi = {10.1109/TNSM.2023.3267831}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/NowrooziMSMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/DurmazKOUJYS23, author = {Fatih Durmaz and Nureddin Kamadan and Melih Taha {\"{O}}z and Musa Sadik Unal and Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, title = {TimeInspector: {A} Static Analysis Approach for Detecting Timing Attacks}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {296--303}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00037}, doi = {10.1109/EUROSPW59978.2023.00037}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/DurmazKOUJYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MertYKOSA23, author = {Ahmet Can Mert and Ferhat Yaman and Emre Karabulut and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas and Aydin Aysu}, editor = {Cristina Silvano and Christian Pilato and Marc Reichenbach}, title = {A Survey of Software Implementations for the Number Theoretic Transform}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, {SAMOS} 2023, Samos, Greece, July 2-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14385}, pages = {328--344}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46077-7\_22}, doi = {10.1007/978-3-031-46077-7\_22}, timestamp = {Wed, 15 Nov 2023 13:04:38 +0100}, biburl = {https://dblp.org/rec/conf/samos/MertYKOSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi/AydumanKKMS23, author = {Can Ayduman and Emre Ko{\c{c}}er and Selim Kirbiyik and Ahmet Can Mert and Erkay Savas}, title = {Efficient Design-Time Flexible Hardware Architecture for Accelerating Homomorphic Encryption}, booktitle = {31st {IFIP/IEEE} International Conference on Very Large Scale Integration, VLSI-SoC 2023, Dubai, United Arab Emirates, October 16-18, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VLSI-SoC57769.2023.10321943}, doi = {10.1109/VLSI-SOC57769.2023.10321943}, timestamp = {Wed, 06 Dec 2023 13:14:06 +0100}, biburl = {https://dblp.org/rec/conf/vlsi/AydumanKKMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-12940, author = {Ehsan Nowroozi and Seyedsadra Seyedshoari and Yassine Mekdad and Erkay Savas and Mauro Conti}, title = {Cryptocurrency wallets: assessment and security}, journal = {CoRR}, volume = {abs/2303.12940}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.12940}, doi = {10.48550/ARXIV.2303.12940}, eprinttype = {arXiv}, eprint = {2303.12940}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-12940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TosunS23, author = {Tolun Tosun and Erkay Savas}, title = {Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete {NTT} based Implementations of Lattice-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2023}, url = {https://eprint.iacr.org/2023/1046}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TosunS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdennebiS23, author = {Anes Abdennebi and Erkay Savas}, title = {A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1309}, year = {2023}, url = {https://eprint.iacr.org/2023/1309}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdennebiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzcanS23, author = {Ali Sah {\"{O}}zcan and Erkay Savas}, title = {Two Algorithms for Fast {GPU} Implementation of {NTT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1410}, year = {2023}, url = {https://eprint.iacr.org/2023/1410}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzcanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/DeryaMOS22, author = {Kemal Derya and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {CoHA-NTT: {A} Configurable Hardware Accelerator for NTT-based Polynomial Multiplication}, journal = {Microprocess. Microsystems}, volume = {89}, pages = {104451}, year = {2022}, url = {https://doi.org/10.1016/j.micpro.2022.104451}, doi = {10.1016/J.MICPRO.2022.104451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/DeryaMOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MertOS22, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Low-Latency {ASIC} Algorithms of Modular Squaring of Large Integers for {VDF} Evaluation}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {1}, pages = {107--120}, year = {2022}, url = {https://doi.org/10.1109/TC.2020.3043400}, doi = {10.1109/TC.2020.3043400}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/MertOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MertKOSA22, author = {Ahmet Can Mert and Emre Karabulut and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas and Aydin Aysu}, title = {An Extensive Study of Flexible Design Methods for the Number Theoretic Transform}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {11}, pages = {2829--2843}, year = {2022}, url = {https://doi.org/10.1109/TC.2020.3017930}, doi = {10.1109/TC.2020.3017930}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/MertKOSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/OzerkEMOS22, author = {{\"{O}}zg{\"{u}}n {\"{O}}zerk and Can Elgezen and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Efficient number theoretic transform implementation on {GPU} for homomorphic encryption}, journal = {J. Supercomput.}, volume = {78}, number = {2}, pages = {2840--2872}, year = {2022}, url = {https://doi.org/10.1007/s11227-021-03980-5}, doi = {10.1007/S11227-021-03980-5}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/OzerkEMOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/UnalJYS22, author = {Musa Sadik Unal and Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, editor = {Alastair R. Beresford and Arpita Patra and Emanuele Bellini}, title = {HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments}, booktitle = {Cryptology and Network Security - 21st International Conference, {CANS} 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13641}, pages = {188--199}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20974-1\_9}, doi = {10.1007/978-3-031-20974-1\_9}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/UnalJYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/TurkogluOAMOS22, author = {Enes Recep T{\"{u}}rkoglu and Ali Sah {\"{O}}zcan and Can Ayduman and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {An Accelerated {GPU} Library for Homomorphic Encryption Operations of {BFV} Scheme}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2022, Austin, TX, USA, May 27 - June 1, 2022}, pages = {1155--1159}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCAS48785.2022.9937503}, doi = {10.1109/ISCAS48785.2022.9937503}, timestamp = {Thu, 17 Nov 2022 15:59:17 +0100}, biburl = {https://dblp.org/rec/conf/iscas/TurkogluOAMOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-12195, author = {Ehsan Nowroozi and Mohammadreza Mohammadi and Erkay Savas and Mauro Conti and Yassine Mekdad}, title = {{SPRITZ-1.5C:} Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks}, journal = {CoRR}, volume = {abs/2209.12195}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.12195}, doi = {10.48550/ARXIV.2209.12195}, eprinttype = {arXiv}, eprint = {2209.12195}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-12195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzcanATS22, author = {Ali Sah {\"{O}}zcan and Can Ayduman and Enes Recep T{\"{u}}rkoglu and Erkay Savas}, title = {Homomorphic Encryption on {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1222}, year = {2022}, url = {https://eprint.iacr.org/2022/1222}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzcanATS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KjamiljiSL21, author = {Artrim Kjamilji and Erkay Savas and Albert Levi}, title = {Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms}, journal = {{IEEE} Access}, volume = {9}, pages = {8324--8353}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3049216}, doi = {10.1109/ACCESS.2021.3049216}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KjamiljiSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JaveedYS21, author = {Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, title = {Detector+: An approach for detecting, isolating, and preventing timing attacks}, journal = {Comput. Secur.}, volume = {110}, pages = {102454}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102454}, doi = {10.1016/J.COSE.2021.102454}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JaveedYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TosunS21, author = {Tolun Tosun and Erkay Savas}, title = {{FSDS:} {A} practical and fully secure document similarity search over encrypted data with lightweight client}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102830}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102830}, doi = {10.1016/J.JISA.2021.102830}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TosunS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/CetinSS21, author = {Gizem S. {\c{C}}etin and Erkay Savas and Berk Sunar}, title = {Homomorphic Sorting With Better Scalability}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {32}, number = {4}, pages = {760--771}, year = {2021}, url = {https://doi.org/10.1109/TPDS.2020.3030748}, doi = {10.1109/TPDS.2020.3030748}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/CetinSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/YamanMOS21, author = {Ferhat Yaman and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {A Hardware Accelerator for Polynomial Multiplication Operation of {CRYSTALS-KYBER} {PQC} Scheme}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {1020--1025}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474139}, doi = {10.23919/DATE51398.2021.9474139}, timestamp = {Wed, 21 Jul 2021 10:04:34 +0200}, biburl = {https://dblp.org/rec/conf/date/YamanMOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/KjamiljiLSG21, author = {Artrim Kjamilji and Albert Levi and Erkay Savas and Osman Berke G{\"{u}}ney}, title = {Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2021, Dubai, United Arab Emirates, October 31 - November 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISNCC52172.2021.9615794}, doi = {10.1109/ISNCC52172.2021.9615794}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/KjamiljiLSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11446, author = {Seyma Selcan Magara and Ceren Yildirim and Ferhat Yaman and Berke Dilekoglu and Furkan Reha Tutas and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Kamer Kaya and {\"{O}}znur Tastan and Erkay Savas}, title = {{ML} with {HE:} Privacy Preserving Machine Learning Inferences for Genome Studies}, journal = {CoRR}, volume = {abs/2110.11446}, year = {2021}, url = {https://arxiv.org/abs/2110.11446}, eprinttype = {arXiv}, eprint = {2110.11446}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzerkEMOS21, author = {{\"{O}}zg{\"{u}}n {\"{O}}zerk and Can Elgezen and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Efficient Number Theoretic Transform Implementation on {GPU} for Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2021}, url = {https://eprint.iacr.org/2021/124}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OzerkEMOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YamanMOS21, author = {Ferhat Yaman and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {A Hardware Accelerator for Polynomial Multiplication Operation of {CRYSTALS-KYBER} {PQC} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2021}, url = {https://eprint.iacr.org/2021/485}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YamanMOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaveedYS21, author = {Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, title = {Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2021}, url = {https://eprint.iacr.org/2021/652}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JaveedYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeryaMOS21, author = {Kemal Derya and Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {CoHA-NTT: {A} Configurable Hardware Accelerator for NTT-based Polynomial Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1527}, year = {2021}, url = {https://eprint.iacr.org/2021/1527}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeryaMOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KhayatiSA20, author = {Leyli Javid Khayati and Erkay Savas and Halit Alptekin}, title = {Intrusion Detection Over Encrypted Network Data}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {604--619}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz111}, doi = {10.1093/COMJNL/BXZ111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KhayatiSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AkyildizGYS20, author = {Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas}, title = {MeltdownDetector: {A} runtime approach for detecting meltdown attacks}, journal = {Future Gener. Comput. Syst.}, volume = {112}, pages = {136--147}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.05.017}, doi = {10.1016/J.FUTURE.2020.05.017}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AkyildizGYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MertOS20, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {{FPGA} implementation of a run-time configurable NTT-based polynomial multiplication hardware}, journal = {Microprocess. Microsystems}, volume = {78}, pages = {103219}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2020.103219}, doi = {10.1016/J.MICPRO.2020.103219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/MertOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/MertOS20, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Design and Implementation of Encryption/Decryption Architectures for {BFV} Homomorphic Encryption Scheme}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {28}, number = {2}, pages = {353--362}, year = {2020}, url = {https://doi.org/10.1109/TVLSI.2019.2943127}, doi = {10.1109/TVLSI.2019.2943127}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/MertOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MertKOSBA20, author = {Ahmet Can Mert and Emre Karabulut and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas and Michela Becchi and Aydin Aysu}, title = {A Flexible and Scalable {NTT} Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {346--351}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116470}, doi = {10.23919/DATE48585.2020.9116470}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/MertKOSBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MertOS20, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Low-Latency {ASIC} Algorithms of Modular Squaring of Large Integers for {VDF} Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2020}, url = {https://eprint.iacr.org/2020/480}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MertOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KulahDYS19, author = {Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and Erkay Savas}, title = {SpyDetector: An approach for detecting side-channel attacks at runtime}, journal = {Int. J. Inf. Sec.}, volume = {18}, number = {4}, pages = {393--422}, year = {2019}, url = {https://doi.org/10.1007/s10207-018-0411-7}, doi = {10.1007/S10207-018-0411-7}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/KulahDYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GurPRRSS19, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Hadi Sajjadpour and Erkay Savas}, title = {Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices}, journal = {{IEEE} Trans. Computers}, volume = {68}, number = {4}, pages = {570--584}, year = {2019}, url = {https://doi.org/10.1109/TC.2018.2874479}, doi = {10.1109/TC.2018.2874479}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/GurPRRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/MertOS19, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture}, booktitle = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea, Greece, August 28-30, 2019}, pages = {253--260}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSD.2019.00045}, doi = {10.1109/DSD.2019.00045}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/MertOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/AlptekinYSL19, author = {Halit Alptekin and Can Yildizli and Erkay Savas and Albert Levi}, title = {{TRAPDROID:} Bare-Metal Android Malware Behavior Analysis Framework}, booktitle = {21st International Conference on Advanced Communication Technology, {ICACT} 2019, Pyeongchang, South Korea, February 17-20, 2019}, pages = {664--671}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/ICACT.2019.8702030}, doi = {10.23919/ICACT.2019.8702030}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/AlptekinYSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MertOS19, author = {Ahmet Can Mert and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas}, title = {Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2019}, url = {https://eprint.iacr.org/2019/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MertOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkyildizGYS19, author = {Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas}, title = {MeltdownDetector: {A} Runtime Approach for Detecting Meltdown Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2019}, url = {https://eprint.iacr.org/2019/613}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AkyildizGYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/TopcuogluKS18, author = {Cem Topcuoglu and Kamer Kaya and Erkay Savas}, title = {A generic Private Information Retrieval scheme with parallel multi-exponentiations on multicore processors}, journal = {Concurr. Comput. Pract. Exp.}, volume = {30}, number = {21}, year = {2018}, url = {https://doi.org/10.1002/cpe.4685}, doi = {10.1002/CPE.4685}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/TopcuogluKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/elektrik/AticiYS18, author = {Ali Can Atici and Cemal Yilmaz and Erkay Savas}, title = {Cache-timing attacks without a profiling phase}, journal = {Turkish J. Electr. Eng. Comput. Sci.}, volume = {26}, number = {4}, pages = {1953--1966}, year = {2018}, url = {https://doi.org/10.3906/elk-1711-359}, doi = {10.3906/ELK-1711-359}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/elektrik/AticiYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Rodriguez-Henriquez18, author = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Erkay Savas}, title = {Special issue in honor of Peter Lawrence Montgomery}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {185--187}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0168-3}, doi = {10.1007/S13389-017-0168-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Rodriguez-Henriquez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SavasK18, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Montgomery inversion}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {201--210}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0161-x}, doi = {10.1007/S13389-017-0161-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/SavasK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/AyMORS18, author = {Atil U. Ay and Cuauhtemoc Mancillas{-}L{\'{o}}pez and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Erkay Savas}, title = {Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level}, journal = {Microprocess. Microsystems}, volume = {62}, pages = {79--90}, year = {2018}, url = {https://doi.org/10.1016/j.micpro.2018.05.005}, doi = {10.1016/J.MICPRO.2018.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/AyMORS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiDPRSSS18, author = {Wei Dai and Yarkin Dor{\"{o}}z and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savas and Berk Sunar}, title = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE} Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1169--1184}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779427}, doi = {10.1109/TIFS.2017.2779427}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiDPRSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GurPRRS18, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, editor = {Michael Brenner and Kurt Rohloff}, title = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors}, booktitle = {Proceedings of the 6th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {61--71}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267973.3267975}, doi = {10.1145/3267973.3267975}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GurPRRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CousinsCGKPRRS18, author = {David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk G{\"{u}}r and Kevin King and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, title = {Implementing Conjunction Obfuscation Under Entropic Ring {LWE}}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {354--371}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00007}, doi = {10.1109/SP.2018.00007}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CousinsCGKPRRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AltopBLS17, author = {Duygu Karaoglan Altop and Muhammed Ali Bing{\"{o}}l and Albert Levi and Erkay Savas}, title = {{DKEM:} Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks}, journal = {Ad Hoc Networks}, volume = {54}, pages = {53--68}, year = {2017}, url = {https://doi.org/10.1016/j.adhoc.2016.10.001}, doi = {10.1016/J.ADHOC.2016.10.001}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AltopBLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TillemSK17, author = {Gamze Tillem and Erkay Savas and Kamer Kaya}, title = {A New Method for Computational Private Information Retrieval}, journal = {Comput. J.}, volume = {60}, number = {8}, pages = {1238--1250}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx025}, doi = {10.1093/COMJNL/BXX025}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TillemSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/OzturkDSS17, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Yarkin Dor{\"{o}}z and Erkay Savas and Berk Sunar}, title = {A Custom Accelerator for Homomorphic Encryption Applications}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {1}, pages = {3--16}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2574340}, doi = {10.1109/TC.2016.2574340}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/OzturkDSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GurPRRS17, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, title = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2017}, url = {http://eprint.iacr.org/2017/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GurPRRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/orencikSA17, author = {Cengiz {\"{O}}rencik and Erkay Savas and Mahmoud Alewiwi}, title = {A Unified Framework for Secure Search Over Encrypted Cloud Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2017}, url = {http://eprint.iacr.org/2017/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/orencikSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiDPRSSS17, author = {Wei Dai and Yarkin Dor{\"{o}}z and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savas and Berk Sunar}, title = {Implementation and Evaluation of a Lattice-Based Key-Policy {ABE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2017}, url = {http://eprint.iacr.org/2017/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiDPRSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CousinsCGKPRRS17, author = {David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk G{\"{u}}r and Kevin King and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savas}, title = {Implementing Conjunction Obfuscation under Entropic Ring {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2017}, url = {http://eprint.iacr.org/2017/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CousinsCGKPRRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GurPRRSS17, author = {Kamil Doruk G{\"{u}}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Hadi Sajjadpour and Erkay Savas}, title = {Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1254}, year = {2017}, url = {http://eprint.iacr.org/2017/1254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GurPRRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ChiappettaSY16, author = {Marco Chiappetta and Erkay Savas and Cemal Yilmaz}, title = {Real time detection of cache-based side-channel attacks using hardware performance counters}, journal = {Appl. Soft Comput.}, volume = {49}, pages = {1162--1174}, year = {2016}, url = {https://doi.org/10.1016/j.asoc.2016.09.014}, doi = {10.1016/J.ASOC.2016.09.014}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/ChiappettaSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AlewiwiOS16, author = {Mahmoud Alewiwi and Cengiz {\"{O}}rencik and Erkay Savas}, title = {Efficient top-k similarity document search utilizing distributed file systems and cosine similarity}, journal = {Clust. Comput.}, volume = {19}, number = {1}, pages = {109--126}, year = {2016}, url = {https://doi.org/10.1007/s10586-015-0506-0}, doi = {10.1007/S10586-015-0506-0}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/AlewiwiOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/OrencikSSK16, author = {Cengiz {\"{O}}rencik and Ayse Selcuk and Erkay Savas and Murat Kantarcioglu}, title = {Multi-Keyword search over encrypted data with scoring and search pattern obfuscation}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {3}, pages = {251--269}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0294-9}, doi = {10.1007/S10207-015-0294-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/OrencikSSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KhayatiOSU16, author = {Leyli Javid Khayati and Cengiz {\"{O}}rencik and Erkay Savas and Berkant Ustaoglu}, title = {A practical privacy-preserving targeted advertising scheme for {IPTV} users}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {4}, pages = {335--360}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0296-7}, doi = {10.1007/S10207-015-0296-7}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KhayatiOSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/KermaniSU16, author = {Mehran Mozaffari Kermani and Erkay Savas and Shambhu J. Upadhyaya}, title = {Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {4}, number = {3}, pages = {318--320}, year = {2016}, url = {https://doi.org/10.1109/TETC.2015.2482778}, doi = {10.1109/TETC.2015.2482778}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/KermaniSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/UnalS16, author = {Ecem {\"{U}}nal and Erkay Savas}, title = {On Acceleration and Scalability of Number Theoretic Private Information Retrieval}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {6}, pages = {1727--1741}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2456021}, doi = {10.1109/TPDS.2015.2456021}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/UnalS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TillemCSK16, author = {Gamze Tillem and {\"{O}}mer Mert Candan and Erkay Savas and Kamer Kaya}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Hiding Access Patterns in Range Queries Using Private Information Retrieval and {ORAM}}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {253--270}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_17}, doi = {10.1007/978-3-662-53357-4\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/TillemCSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/AyORS16, author = {Atil U. Ay and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Erkay Savas}, editor = {Peter M. Athanas and Ren{\'{e}} Cumplido and Claudia Feregrino and Ron Sass}, title = {Design and implementation of a constant-time {FPGA} accelerator for fast elliptic curve cryptography}, booktitle = {International Conference on ReConFigurable Computing and FPGAs, ReConFig 2016, Cancun, Mexico, November 30 - Dec. 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ReConFig.2016.7857163}, doi = {10.1109/RECONFIG.2016.7857163}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/AyORS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AticiYS16, author = {Ali Can Atici and Cemal Yilmaz and Erkay Savas}, title = {Remote Cache-Timing Attack without Learning Phase}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2016}, url = {http://eprint.iacr.org/2016/002}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AticiYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YumbulS15, author = {Kazim Yumbul and Erkay Savas}, title = {Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2368--2387}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu040}, doi = {10.1093/COMJNL/BXU040}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YumbulS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SavasY15, author = {Erkay Savas and Cemal Yilmaz}, title = {A Generic Method for the Analysis of a Class of Cache Attacks: {A} Case Study for {AES}}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2716--2737}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv027}, doi = {10.1093/COMJNL/BXV027}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SavasY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/KarabatKES15, author = {Cagatay Karabat and Mehmet S. Kiraz and Hakan Erdogan and Erkay Savas}, title = {{THRIVE:} threshold homomorphic encryption based secure and privacy preserving biometric verification system}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2015}, pages = {71}, year = {2015}, url = {https://doi.org/10.1186/s13634-015-0255-5}, doi = {10.1186/S13634-015-0255-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/KarabatKES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DorozOSS15, author = {Yarkin Dor{\"{o}}z and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas and Berk Sunar}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Accelerating {LTV} Based Homomorphic Encryption in Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {185--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_10}, doi = {10.1007/978-3-662-48324-4\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DorozOSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/CetinDSS15, author = {Gizem S. {\c{C}}etin and Yarkin Dor{\"{o}}z and Berk Sunar and Erkay Savas}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Depth Optimized Efficient Homomorphic Sorting}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {61--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_4}, doi = {10.1007/978-3-319-22174-8\_4}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/CetinDSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OrencikAS15, author = {Cengiz {\"{O}}rencik and Mahmoud Alewiwi and Erkay Savas}, title = {Secure Sketch Search for Document Similarity}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1102--1107}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.489}, doi = {10.1109/TRUSTCOM.2015.489}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OrencikAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waifi/2014, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16277-5}, doi = {10.1007/978-3-319-16277-5}, isbn = {978-3-319-16276-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinDSS15, author = {Gizem S. {\c{C}}etin and Yarkin Dor{\"{o}}z and Berk Sunar and Erkay Savas}, title = {Low Depth Circuits for Efficient Homomorphic Sorting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2015}, url = {http://eprint.iacr.org/2015/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinDSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzturkDSS15, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Yarkin Dor{\"{o}}z and Berk Sunar and Erkay Savas}, title = {Accelerating Somewhat Homomorphic Evaluation using FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2015}, url = {http://eprint.iacr.org/2015/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzturkDSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiappettaSY15, author = {Marco Chiappetta and Erkay Savas and Cemal Yilmaz}, title = {Real time detection of cache-based side-channel attacks using Hardware Performance Counters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2015}, url = {http://eprint.iacr.org/2015/1034}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChiappettaSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/OrencikS14, author = {Cengiz {\"{O}}rencik and Erkay Savas}, title = {An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking}, journal = {Distributed Parallel Databases}, volume = {32}, number = {1}, pages = {119--160}, year = {2014}, url = {https://doi.org/10.1007/s10619-013-7123-9}, doi = {10.1007/S10619-013-7123-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/OrencikS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YumbulSKG14, author = {Kazim Yumbul and Erkay Savas and {\"{O}}v{\"{u}}n{\c{c}} Kocabas and Johann Gro{\ss}sch{\"{a}}dl}, title = {Design and implementation of a versatile cryptographic unit for {RISC} processors}, journal = {Secur. Commun. Networks}, volume = {7}, number = {1}, pages = {36--52}, year = {2014}, url = {https://doi.org/10.1002/sec.555}, doi = {10.1002/SEC.555}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YumbulSKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YumbulES14, author = {Kazim Yumbul and Serdar S{\"{u}}er Erdem and Erkay Savas}, title = {On Selection of Modulus of Quadratic Codes for the Protection of Cryptographic Operations against Fault Attacks}, journal = {{IEEE} Trans. Computers}, volume = {63}, number = {5}, pages = {1182--1196}, year = {2014}, url = {https://doi.org/10.1109/TC.2012.236}, doi = {10.1109/TC.2012.236}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YumbulES14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/UnalS14, author = {Ecem {\"{U}}nal and Erkay Savas}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Bandwidth-Optimized Parallel Private Information Retrieval}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {197}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659702}, doi = {10.1145/2659651.2659702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/UnalS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KarabatKES14, author = {Cagatay Karabat and Mehmet Sabir Kiraz and Hakan Erdogan and Erkay Savas}, title = {{THRIVE:} Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system}, journal = {CoRR}, volume = {abs/1409.8212}, year = {2014}, url = {http://arxiv.org/abs/1409.8212}, eprinttype = {arXiv}, eprint = {1409.8212}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KarabatKES14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/OrencikKS13, author = {Cengiz {\"{O}}rencik and Murat Kantarcioglu and Erkay Savas}, title = {A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data}, booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {390--397}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CLOUD.2013.18}, doi = {10.1109/CLOUD.2013.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/OrencikKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/MerrillBBBCKOS13, author = {Shawn Merrill and Nilgun Basalp and Joachim Biskup and Erik Buchmann and Chris Clifton and Bart Kuijpers and Walied Othman and Erkay Savas}, title = {Privacy through Uncertainty in Location-Based Services}, booktitle = {2013 {IEEE} 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013 - Volume 2}, pages = {67--72}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MDM.2013.71}, doi = {10.1109/MDM.2013.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/MerrillBBBCKOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Savas13, author = {Erkay Savas}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {Attacks on implementations of cryptographic algorithms: side-channel and fault attacks}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {7--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2523593}, doi = {10.1145/2523514.2523593}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Savas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/AticiYS13, author = {Ali Can Atici and Cemal Yilmaz and Erkay Savas}, title = {An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks}, booktitle = {Seventh International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume}, pages = {74--83}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE-C.2013.15}, doi = {10.1109/SERE-C.2013.15}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/AticiYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/DorozS12, author = {Yarkin Dor{\"{o}}z and Erkay Savas}, editor = {Oliver C. S. Choy and Ray C. C. Cheung and Peter M. Athanas and Kentaro Sano}, title = {Constructing Cluster of Simple {FPGA} Boards for Cryptologic Computations}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications - 8th International Symposium, {ARC} 2012, Hong Kong, China, March 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7199}, pages = {320--328}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28365-9\_27}, doi = {10.1007/978-3-642-28365-9\_27}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/DorozS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/OrencikS12, author = {Cengiz {\"{O}}rencik and Erkay Savas}, editor = {Divesh Srivastava and Ismail Ari}, title = {Efficient and secure ranked multi-keyword search on encrypted cloud data}, booktitle = {Proceedings of the 2012 Joint {EDBT/ICDT} Workshops, Berlin, Germany, March 30, 2012}, pages = {186--195}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2320765.2320820}, doi = {10.1145/2320765.2320820}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/OrencikS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/DurahimYSL12, author = {Ahmet Onur Durahim and Ismail Fatih Yildirim and Erkay Savas and Albert Levi}, editor = {Erol Gelenbe and Ricardo Lent}, title = {Performance Evaluation of Different {CRL} Distribution Schemes Embedded in {WMN} Authentication}, booktitle = {Computer and Information Sciences {III} - 27th International Symposium on Computer and Information Sciences, Paris, France, October 3-4, 2012}, pages = {333--342}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-1-4471-4594-3\_34}, doi = {10.1007/978-1-4471-4594-3\_34}, timestamp = {Sat, 16 Sep 2017 12:11:33 +0200}, biburl = {https://dblp.org/rec/conf/iscis/DurahimYSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/BaktirS12, author = {Sel{\c{c}}uk Baktir and Erkay Savas}, editor = {Erol Gelenbe and Ricardo Lent}, title = {Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose Microprocessors}, booktitle = {Computer and Information Sciences {III} - 27th International Symposium on Computer and Information Sciences, Paris, France, October 3-4, 2012}, pages = {467--476}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-1-4471-4594-3\_48}, doi = {10.1007/978-1-4471-4594-3\_48}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscis/BaktirS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/SavasY12, author = {Erkay Savas and Cemal Yilmaz}, editor = {Albert Levi and Mohamad Badra and Matteo Cesana and Mona Ghassemian and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Nafa{\^{a}} Jabeur and Marek Klonowski and Antonio Ma{\~{n}}a and Susana Sargento and Sherali Zeadally}, title = {Cache Attacks: An Information and Complexity Theoretic Approach}, booktitle = {5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NTMS.2012.6208720}, doi = {10.1109/NTMS.2012.6208720}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/SavasY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12, author = {Leyli Javid Khayati and Erkay Savas and Berkant Ustaoglu and Cengiz {\"{O}}rencik}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the Cloud}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {74--83}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KhayatiSUO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaktirS12, author = {Sel{\c{c}}uk Baktir and Erkay Savas}, title = {Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2012}, url = {http://eprint.iacr.org/2012/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaktirS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/DurahimS11, author = {Ahmet Onur Durahim and Erkay Savas}, title = {A\({}^{\mbox{2}}\)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs}, journal = {Ad Hoc Networks}, volume = {9}, number = {7}, pages = {1202--1220}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2011.01.008}, doi = {10.1016/J.ADHOC.2011.01.008}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/DurahimS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ErgunLS11, author = {Murat Ergun and Albert Levi and Erkay Savas}, title = {Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach}, journal = {Comput. J.}, volume = {54}, number = {4}, pages = {602--616}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxq043}, doi = {10.1093/COMJNL/BXQ043}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ErgunLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/YildizliPSSL11, author = {Can Yildizli and Thomas Brochmann Pedersen and Y{\"{u}}cel Saygin and Erkay Savas and Albert Levi}, title = {Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data}, journal = {Int. J. Data Warehous. Min.}, volume = {7}, number = {1}, pages = {46--66}, year = {2011}, url = {https://doi.org/10.4018/jdwm.2011010103}, doi = {10.4018/JDWM.2011010103}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/YildizliPSSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/YumbulES11, author = {Kazim Yumbul and Serdar S{\"{u}}er Erdem and Erkay Savas}, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes}, booktitle = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, pages = {69--79}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FDTC.2011.14}, doi = {10.1109/FDTC.2011.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/YumbulES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlpcanLS11, author = {Tansu Alpcan and Albert Levi and Erkay Savas}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Digital Trust Games: An Experimental Study}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {182--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_15}, doi = {10.1007/978-3-642-25280-8\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlpcanLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/KaplanPSS10, author = {Emre Kaplan and Thomas Brochmann Pedersen and Erkay Savas and Y{\"{u}}cel Saygin}, title = {Discovering private trajectories using background information}, journal = {Data Knowl. Eng.}, volume = {69}, number = {7}, pages = {723--736}, year = {2010}, url = {https://doi.org/10.1016/j.datak.2010.02.008}, doi = {10.1016/J.DATAK.2010.02.008}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/KaplanPSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlpcanOLS10, author = {Tansu Alpcan and Cengiz {\"{O}}rencik and Albert Levi and Erkay Savas}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {A game theoretic model for digital identity and trust in online communities}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {341--344}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755735}, doi = {10.1145/1755688.1755735}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlpcanOLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/KaraoglanLS10, author = {Duygu Karaoglan and Albert Levi and Erkay Savas}, editor = {Mario Gerla and Matteo Cesana and Jalel Ben{-}Othman}, title = {A distributed key establishment scheme for wireless mesh networks using identity-based cryptography}, booktitle = {Q2SWinet'10, Proceedings of the Sixth {ACM} Symposium on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010}, pages = {11--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1868630.1868633}, doi = {10.1145/1868630.1868633}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/KaraoglanLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AkinAUS10, author = {Abdulkadir Akin and Aydin Aysu and Onur Can Ulusel and Erkay Savas}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {Efficient hardware implementations of high throughput {SHA-3} candidates keccak, luffa and blue midnight wish for single- and multi-message hashing}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {168--177}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854135}, doi = {10.1145/1854099.1854135}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/AkinAUS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/YumbulES10, author = {Kazim Yumbul and Serdar S{\"{u}}er Erdem and Erkay Savas}, editor = {Oleg B. Makarevich and Atilla El{\c{c}}i and Mehmet A. Orgun and Sorin A. Huss and Ludmila K. Babenko and Alexander G. Chefranov and Vijay Varadharajan}, title = {Design and implementation of robust embedded processor for cryptographic applications}, booktitle = {Proceedings of the 3rd International Conference on Security of Information and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010}, pages = {178--185}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854099.1854137}, doi = {10.1145/1854099.1854137}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/YumbulES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KayaSLE09, author = {Selim Volkan Kaya and Erkay Savas and Albert Levi and {\"{O}}zg{\"{u}}r Er{\c{c}}etin}, title = {Public key cryptography based privacy preserving multi-context {RFID} infrastructure}, journal = {Ad Hoc Networks}, volume = {7}, number = {1}, pages = {136--152}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2007.12.004}, doi = {10.1016/J.ADHOC.2007.12.004}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/KayaSLE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/OzturkSS09, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Berk Sunar and Erkay Savas}, title = {A versatile Montgomery multiplier architecture with characteristic three support}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {1}, pages = {71--85}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2008.05.009}, doi = {10.1016/J.COMPELECENG.2008.05.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/OzturkSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/PedersenS09, author = {Thomas Brochmann Pedersen and Erkay Savas}, title = {Impossibility of unconditionally secure scalar products}, journal = {Data Knowl. Eng.}, volume = {68}, number = {10}, pages = {1059--1070}, year = {2009}, url = {https://doi.org/10.1016/j.datak.2009.04.006}, doi = {10.1016/J.DATAK.2009.04.006}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/PedersenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cdt/DurahimSSPK09, author = {Ahmet Onur Durahim and Erkay Savas and Berk Sunar and Thomas Brochmann Pedersen and {\"{O}}v{\"{u}}n{\c{c}} Kocabas}, title = {Transparent code authentication at the processor level}, journal = {{IET} Comput. Digit. Tech.}, volume = {3}, number = {4}, pages = {354--372}, year = {2009}, url = {https://doi.org/10.1049/iet-cdt.2007.0122}, doi = {10.1049/IET-CDT.2007.0122}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cdt/DurahimSSPK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/ErgunLS09, author = {Murat Ergun and Albert Levi and Erkay Savas}, title = {A resilient key predistribution scheme for multiphase wireless sensor networks}, booktitle = {The 24th International Symposium on Computer and Information Sciences, {ISCIS} 2009, 14-16 September 2009, North Cyprus}, pages = {375--380}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISCIS.2009.5291809}, doi = {10.1109/ISCIS.2009.5291809}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscis/ErgunLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/DurahimSY09, author = {Ahmet Onur Durahim and Erkay Savas and Kazim Yumbul}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {207--212}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.46}, doi = {10.1109/RECONFIG.2009.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/DurahimSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/GrossschadlSY09, author = {Johann Gro{\ss}sch{\"{a}}dl and Erkay Savas and Kazim Yumbul}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {261--266}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.83}, doi = {10.1109/RECONFIG.2009.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/GrossschadlSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/YumbulS09, author = {Kazim Yumbul and Erkay Savas}, editor = {Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Alexander G. Chefranov and Josef Pieprzyk and Yuri Anatolievich Bryukhomitsky and Siddika Berna {\"{O}}rs}, title = {Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit}, booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10, 2009}, pages = {143--151}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1626195.1626233}, doi = {10.1145/1626195.1626233}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/YumbulS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/SavasK09, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Efficient Unified Arithmetic for Hardware Cryptography}, booktitle = {Cryptographic Engineering}, pages = {105--124}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_6}, doi = {10.1007/978-0-387-71817-0\_6}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SunarGS08, author = {Berk Sunar and Gunnar Gaubatz and Erkay Savas}, title = {Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {1}, pages = {126--138}, year = {2008}, url = {https://doi.org/10.1109/TC.2007.70784}, doi = {10.1109/TC.2007.70784}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/SunarGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/DoganayPSSL08, author = {Mahir Can Doganay and Thomas Brochmann Pedersen and Y{\"{u}}cel Saygin and Erkay Savas and Albert Levi}, editor = {Farshad Fotouhi and Li Xiong and Traian Marius Truta}, title = {Distributed privacy preserving k-means clustering with additive secret sharing}, booktitle = {Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, {PAIS} 2008, Nantes, France, March 29, 2008}, series = {{ACM} International Conference Proceeding Series}, pages = {3--11}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1379287.1379291}, doi = {10.1145/1379287.1379291}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edbt/DoganayPSSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/YilmazLS08, author = {{\"{O}}mer Zekvan Yilmaz and Albert Levi and Erkay Savas}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes}, booktitle = {e-Business and Telecommunications - International Conference, {ICETE} 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {48}, pages = {180--198}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-05197-5\_13}, doi = {10.1007/978-3-642-05197-5\_13}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/YilmazLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icons/KomurcuS08, author = {Giray K{\"{o}}m{\"{u}}rc{\"{u}} and Erkay Savas}, title = {An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three}, booktitle = {The Third International Conference on Systems, {ICONS} 2008, April 13-18, 2008, Cancun, Mexico}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICONS.2008.27}, doi = {10.1109/ICONS.2008.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icons/KomurcuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/KaplanPSS08, author = {Emre Kaplan and Thomas Brochmann Pedersen and Erkay Savas and Y{\"{u}}cel Saygin}, editor = {Ignac Lovrek and Robert J. Howlett and Lakhmi C. Jain}, title = {Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, {KES} 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5178}, pages = {642--649}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85565-1\_79}, doi = {10.1007/978-3-540-85565-1\_79}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/KaplanPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/OksuzogluS08, author = {Ersin {\"{O}}ks{\"{u}}zoglu and Erkay Savas}, title = {Parametric, Secure and Compact Implementation of {RSA} on {FPGA}}, booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings}, pages = {391--396}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ReConFig.2008.13}, doi = {10.1109/RECONFIG.2008.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/OksuzogluS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/KocabasSG08, author = {{\"{O}}v{\"{u}}n{\c{c}} Kocabas and Erkay Savas and Johann Gro{\ss}sch{\"{a}}dl}, title = {Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security}, booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings}, pages = {409--414}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ReConFig.2008.59}, doi = {10.1109/RECONFIG.2008.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/KocabasSG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OrencikPSK08, author = {Cengiz {\"{O}}rencik and Thomas Brochmann Pedersen and Erkay Savas and Mehmet Keskin{\"{o}}z}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Improved Fuzzy Vault Scheme for Fingerprint Verification}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--43}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/OrencikPSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YilmazLS08, author = {Omer Zekvan Yilmaz and Albert Levi and Erkay Savas}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {136--144}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YilmazLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KaratopS08, author = {Ayse G{\"{u}}l Karatop and Erkay Savas}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {An identity-based key infrastructure suitable for messaging and its application to e-mail}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460890}, doi = {10.1145/1460877.1460890}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KaratopS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssdbm/TurgayPSSL08, author = {E. Onur Turgay and Thomas Brochmann Pedersen and Y{\"{u}}cel Saygin and Erkay Savas and Albert Levi}, editor = {Bertram Lud{\"{a}}scher and Nikos Mamoulis}, title = {Disclosure Risks of Distance Preserving Data Transformations}, booktitle = {Scientific and Statistical Database Management, 20th International Conference, {SSDBM} 2008, Hong Kong, China, July 9-11, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5069}, pages = {79--94}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69497-7\_8}, doi = {10.1007/978-3-540-69497-7\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssdbm/TurgayPSSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/springer/BonchiSVAGKS08, author = {Francesco Bonchi and Y{\"{u}}cel Saygin and Vassilios S. Verykios and Maurizio Atzori and Aris Gkoulalas{-}Divanis and Selim Volkan Kaya and Erkay Savas}, editor = {Fosca Giannotti and Dino Pedreschi}, title = {Privacy in Spatiotemporal Data Mining}, booktitle = {Mobility, Data Mining and Privacy - Geographic Knowledge Discovery}, pages = {297--333}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-75177-9\_12}, doi = {10.1007/978-3-540-75177-9\_12}, timestamp = {Mon, 03 Jan 2022 21:52:36 +0100}, biburl = {https://dblp.org/rec/series/springer/BonchiSVAGKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/InanKSSHL07, author = {Ali Inan and Selim Volkan Kaya and Y{\"{u}}cel Saygin and Erkay Savas and Ay{\c{c}}a Azgin Hintoglu and Albert Levi}, title = {Privacy preserving clustering on horizontally partitioned data}, journal = {Data Knowl. Eng.}, volume = {63}, number = {3}, pages = {646--666}, year = {2007}, url = {https://doi.org/10.1016/j.datak.2007.03.015}, doi = {10.1016/J.DATAK.2007.03.015}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/InanKSSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/UnluALSE07, author = {Abd{\"{u}}lhakim {\"{U}}nl{\"{u}} and {\"{O}}nsel Armagan and Albert Levi and Erkay Savas and {\"{O}}zg{\"{u}}r Er{\c{c}}etin}, editor = {Ian F. Akyildiz and Raghupathy Sivakumar and Eylem Ekici and Jaudelice Cavalcante de Oliveira and Janise McNair}, title = {Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario}, booktitle = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International {IFIP-TC6} Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4479}, pages = {239--250}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72606-7\_21}, doi = {10.1007/978-3-540-72606-7\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/UnluALSE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KayaSLE07, author = {Selim Volkan Kaya and Erkay Savas and Albert Levi and {\"{O}}zg{\"{u}}r Er{\c{c}}etin}, editor = {Ian F. Akyildiz and Raghupathy Sivakumar and Eylem Ekici and Jaudelice Cavalcante de Oliveira and Janise McNair}, title = {Privacy-Aware Multi-Context {RFID} Infrastructure Using Public Key Cryptography}, booktitle = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International {IFIP-TC6} Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4479}, pages = {263--274}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72606-7\_23}, doi = {10.1007/978-3-540-72606-7\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/KayaSLE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/KayaPSS07, author = {Selim Volkan Kaya and Thomas Brochmann Pedersen and Erkay Savas and Y{\"{u}}cel Saygin}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {280--291}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_29}, doi = {10.1007/978-3-540-77018-3\_29}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/KayaPSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/InanSSHL06, author = {Ali Inan and Y{\"{u}}cel Saygin and Erkay Savas and Ay{\c{c}}a Azgin Hintoglu and Albert Levi}, editor = {Roger S. Barga and Xiaofang Zhou}, title = {Privacy Preserving Clustering on Horizontally Partitioned Data}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}}, pages = {95}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDEW.2006.115}, doi = {10.1109/ICDEW.2006.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/InanSSHL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscn/OnizSL06, author = {Cagil Can Oniz and Erkay Savas and Albert Levi}, title = {An optimistic fair e-commerce protocol for large e-goods}, booktitle = {Proceedings of the International Symposium on Computer Networks, {ISCN} 2006, June 16-18, 2006, Istanbul, Turkey}, pages = {214--219}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCN.2006.1662536}, doi = {10.1109/ISCN.2006.1662536}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscn/OnizSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscis/2006, editor = {Albert Levi and Erkay Savas and H{\"{u}}sn{\"{u}} Yenig{\"{u}}n and Selim Balcisoy and Y{\"{u}}cel Saygin}, title = {Computer and Information Sciences - {ISCIS} 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4263}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11902140}, doi = {10.1007/11902140}, isbn = {3-540-47242-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscis/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Savas05, author = {Erkay Savas}, title = {A Carry-Free Architecture for Montgomery Inversion}, journal = {{IEEE} Trans. Computers}, volume = {54}, number = {12}, pages = {1508--1519}, year = {2005}, url = {https://doi.org/10.1109/TC.2005.188}, doi = {10.1109/TC.2005.188}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Savas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossschadlAST05, author = {Johann Gro{\ss}sch{\"{a}}dl and Roberto Maria Avanzi and Erkay Savas and Stefan Tillich}, editor = {Josyula R. Rao and Berk Sunar}, title = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {75--90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_6}, doi = {10.1007/11545262\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/OnizTSEL05, author = {Cagil Can Oniz and Sinan Emre Tas{\c{c}}i and Erkay Savas and {\"{O}}zg{\"{u}}r Er{\c{c}}etin and Albert Levi}, title = {SeFER: secure, flexible and efficient routing protocol for distributed sensor networks}, booktitle = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings}, pages = {246--255}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/EWSN.2005.1462017}, doi = {10.1109/EWSN.2005.1462017}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/OnizTSEL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/SavasS05, author = {Erkay Savas and Berk Sunar}, editor = {Pascal Lorenz and Petre Dini}, title = {A Practical and Secure Communication Protocol in the Bounded Storage Model}, booktitle = {Networking - {ICN} 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3421}, pages = {707--717}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31957-3\_80}, doi = {10.1007/978-3-540-31957-3\_80}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/SavasS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/OnizSL05, author = {Cagil Can Oniz and Erkay Savas and Albert Levi}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {A Fair Multimedia Exchange Protocol}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {342--351}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_37}, doi = {10.1007/11569596\_37}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscis/OnizSL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/others/05/BayogluLS05, author = {Burak Bayoglu and Albert Levi and Erkay Savas}, editor = {Tuna Tugcu and Erol Gelenbe and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {Performance Evaluation of End-to-End Security in Wireless Applications using {WTLS} Handshake Protocol}, booktitle = {New Trends in Computer Networks}, series = {Advances in Computer Science and Engineering : Reports and Monographs}, volume = {1}, publisher = {Imperial College Press}, year = {2005}, url = {https://doi.org/10.1142/9781860947308\_0021}, doi = {10.1142/9781860947308\_0021}, timestamp = {Mon, 22 Jun 2020 14:58:58 +0200}, biburl = {https://dblp.org/rec/books/others/05/BayogluLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OzturkSS04, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Berk Sunar and Erkay Savas}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {92--106}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_7}, doi = {10.1007/978-3-540-28632-5\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OzturkSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossschadlS04, author = {Johann Gro{\ss}sch{\"{a}}dl and Erkay Savas}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Instruction Set Extensions for Fast Arithmetic in Finite Fields {GF(} p) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {133--147}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_10}, doi = {10.1007/978-3-540-28632-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossschadlS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SunarSK03, author = {Berk Sunar and Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Constructing Composite Field Representations for Efficient Conversion}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {11}, pages = {1391--1398}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1244937}, doi = {10.1109/TC.2003.1244937}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SunarSK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LeviS03, author = {Albert Levi and Erkay Savas}, title = {Performance Evaluation of Public-Key Cryptosystem Operations in {WTLS} Protocol}, booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey}, pages = {1245--1250}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ISCC.2003.1214285}, doi = {10.1109/ISCC.2003.1214285}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/LeviS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GutubTSK02, author = {Adnan Abdul{-}Aziz Gutub and Alexandre F. Tenca and Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and {GF(2)}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {484--499}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_35}, doi = {10.1007/3-540-36400-5\_35}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GutubTSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/SavasK02, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Architectures for unified field inversion with applications in elliptic curve cryptography}, booktitle = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September 15-18, 2002}, pages = {1155--1158}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICECS.2002.1046457}, doi = {10.1109/ICECS.2002.1046457}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/SavasK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavasSK01, author = {Erkay Savas and Thomas A. Schmidt and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Generating Elliptic Curves of Prime Order}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {142--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_13}, doi = {10.1007/3-540-44709-1\_13}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SavasSK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SavasK00, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {The Montgomery Modular Inverse-Revisited}, journal = {{IEEE} Trans. Computers}, volume = {49}, number = {7}, pages = {763--766}, year = {2000}, url = {https://doi.org/10.1109/12.863048}, doi = {10.1109/12.863048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SavasK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavasTK00, author = {Erkay Savas and Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p}) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {277--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_22}, doi = {10.1007/3-540-44499-8\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SavasTK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.