default search action
Çetin Kaya Koç
Person information
- affiliation: University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j60]Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç:
MLFormer: a high performance MPC linear inference framework for transformers. J. Cryptogr. Eng. 15(1): 2 (2025) - [j59]Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç:
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 632-655 (2025) - 2024
- [j58]Junhao Huang, Alexandre Adomnicai, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 1-24 (2024) - [j57]Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie:
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 451-480 (2024) - [j56]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. IEEE Trans. Inf. Forensics Secur. 19: 3800-3813 (2024) - [c47]Pengzhou He, Ben Mongirdas, Çetin Kaya Koç, Jiafeng Xie:
LAMP: Efficient Implementation of Lightweight Accelerator for Polynomial MultiPlication, From Falcon to RBLWE-ENC. ACM Great Lakes Symposium on VLSI 2024: 210-215 - [c46]Mingshen Huang, Weiwei Yuan, Donghai Guan, Mengze Lu, Çetin Kaya Koç:
Guided Particle Adaptation PSO for Feature Selection on High-dimensional Classification. ICIC (1) 2024: 14-26 - [c45]Pengzhou He, Tianyou Bao, Çetin Kaya Koç, Jiafeng Xie:
HELP: Highly Efficient and Low-Latency Hardware Accelerator for Integer Polynomial Multiplication. ISVLSI 2024: 355-360 - [c44]Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç:
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519. USENIX Security Symposium 2024 - [i15]Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç:
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. IACR Cryptol. ePrint Arch. 2024: 1515 (2024) - [i14]Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, Wangchen Dai:
Efficient Key-Switching for Word-Type FHE and GPU Acceleration. IACR Cryptol. ePrint Arch. 2024: 1629 (2024) - 2023
- [j55]Pengzhou He, Yazheng Tu, Çetin Kaya Koç, Jiafeng Xie:
Hardware-Implemented Lightweight Accelerator for Large Integer Polynomial Multiplication. IEEE Comput. Archit. Lett. 22(1): 57-60 (2023) - [j54]Gaoyu Mao, Donglong Chen, Guangyan Li, Wangchen Dai, Abdurrashid Ibrahim Sanka, Çetin Kaya Koç, Ray C. C. Cheung:
High-performance and Configurable SW/HW Co-design of Post-quantum Signature CRYSTALS-Dilithium. ACM Trans. Reconfigurable Technol. Syst. 16(3): 44:1-44:28 (2023) - [j53]Yazheng Tu, Pengzhou He, Çetin Kaya Koç, Jiafeng Xie:
LEAP: Lightweight and Efficient Accelerator for Sparse Polynomial Multiplication of HQC. IEEE Trans. Very Large Scale Integr. Syst. 31(6): 892-896 (2023) - [c43]Chen Li, Suwen Song, Jing Tian, Zhongfeng Wang, Çetin Kaya Koç:
An Efficient Hardware Design for Fast Implementation of HQC. SOCC 2023: 1-6 - [p10]Çetin Kaya Koç, Funda Özdemir:
Development of Cryptography since Shannon. Handb. Formal Anal. Verification Cryptogr. 2023: 1-56 - [i13]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. CoRR abs/2306.11351 (2023) - [i12]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices. CoRR abs/2309.00440 (2023) - 2022
- [j52]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 614-636 (2022) - [c42]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 540-549 - [c41]Samira Carolina Oliva Madrigal, Gökay Saldamli, Chen Li, Yue Geng, Jing Tian, Zhongfeng Wang, Çetin Kaya Koç:
Reduction-Free Multiplication for Finite Fields and Polynomial Rings. WAIFI 2022: 53-78 - [i11]Funda Özdemir, Çetin Kaya Koç:
Development of Cryptography since Shannon. IACR Cryptol. ePrint Arch. 2022: 100 (2022) - [i10]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Cryptol. ePrint Arch. 2022: 956 (2022) - 2020
- [j51]Çetin Kaya Koç:
Algorithms for Inversion Mod psk. IEEE Trans. Computers 69(6): 907-913 (2020) - [c40]Çetin Kaya Koç:
Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning. ASHES@CCS 2020: 3 - [c39]Sam Green, Craig M. Vineyard, Ryan Helinski, Çetin Kaya Koç:
RAPDARTS: Resource-Aware Progressive Differentiable Architecture Search. IJCNN 2020: 1-7
2010 – 2019
- 2019
- [j50]Biagio Peccerillo, Sandro Bartolini, Çetin Kaya Koç:
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs. J. Cryptogr. Eng. 9(2): 159-171 (2019) - [c38]Craig M. Vineyard, Sam Green, William M. Severa, Çetin Kaya Koç:
Benchmarking Event-Driven Neuromorphic Architectures. ICONS 2019: 13:1-13:5 - [i9]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Distillation Strategies for Proximal Policy Optimization. CoRR abs/1901.08128 (2019) - [i8]Sam Green, Craig M. Vineyard, Ryan Helinski, Çetin Kaya Koç:
RAPDARTS: Resource-Aware Progressive Differentiable Architecture Search. CoRR abs/1911.05704 (2019) - 2018
- [j49]Erkay Savas, Çetin Kaya Koç:
Montgomery inversion. J. Cryptogr. Eng. 8(3): 201-210 (2018) - [j48]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections. IEEE Trans. Computers 67(9): 1301-1314 (2018) - [j47]Zhe Liu, Patrick Longa, Çetin Kaya Koç:
Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances. IEEE Trans. Computers 67(11): 1532-1534 (2018) - [c37]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Impacts of Mathematical Optimizations on Reinforcement Learning Policy Performance. IJCNN 2018: 1-8 - [p9]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Mathematical Optimizations for Deep Learning. Cyber-Physical Systems Security 2018: 69-92 - [p8]Jieliang Luo, Sam Green, Peter Feghali, George Legrady, Çetin Kaya Koç:
Reinforcement Learning and Trustworthy Autonomy. Cyber-Physical Systems Security 2018: 191-217 - [e10]Çetin Kaya Koç:
Cyber-Physical Systems Security. Springer 2018, ISBN 978-3-319-98934-1 [contents] - [i7]Jieliang Luo, Sam Green, Peter Feghali, George Legrady, Çetin Kaya Koç:
Visual Diagnostics for Deep Reinforcement Learning Policy Development. CoRR abs/1809.06781 (2018) - 2017
- [j46]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication. IEEE Trans. Computers 66(3): 375-388 (2017) - [j45]Nicole Fern, Ismail San, Çetin Kaya Koç, Kwang-Ting (Tim) Cheng:
Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(9): 1435-1444 (2017) - [i6]Çetin Kaya Koç:
A New Algorithm for Inversion mod pk. IACR Cryptol. ePrint Arch. 2017: 411 (2017) - 2016
- [j44]Donald Donglong Chen, Gavin Xiaoxu Yao, Ray C. C. Cheung, Derek Chi-Wai Pao, Çetin Kaya Koç:
Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication. IEEE Trans. Computers 65(1): 147-160 (2016) - [j43]Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. IEEE Trans. Computers 65(11): 3239-3250 (2016) - [c36]Rone Kwei Lim, Linda R. Petzold, Çetin Kaya Koç:
Bitsliced High-Performance AES-ECB on GPUs. The New Codebreakers 2016: 125-133 - [c35]Nicole Fern, Ismail San, Çetin Kaya Koç, Kwang-Ting Cheng:
Hardware Trojans in incompletely specified on-chip bus systems. DATE 2016: 527-530 - [c34]Sam Green, Ihsan Çiçek, Çetin Kaya Koç:
Continuous-Time Computational Aspects of Cyber-Physical Security. FDTC 2016: 59-62 - [c33]Ismail San, Nicole Fern, Çetin Kaya Koç, Kwang-Ting Cheng:
Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams. FPL 2016: 1-4 - 2015
- [e9]Çetin Kaya Koç, Sihem Mesnager, Erkay Savas:
Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9061, Springer 2015, ISBN 978-3-319-16276-8 [contents] - [i5]Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. IACR Cryptol. ePrint Arch. 2015: 742 (2015) - 2014
- [c32]Ömer Egecioglu, Çetin Kaya Koç:
Reducing the Complexity of Normal Basis Multiplication. WAIFI 2014: 61-80 - [p7]Çetin Kaya Koç:
About Open Problems. Open Problems in Mathematics and Computational Science 2014: 1-4 - [p6]Mario Stipcevic, Çetin Kaya Koç:
True Random Number Generators. Open Problems in Mathematics and Computational Science 2014: 275-315 - [e8]Çetin Kaya Koç:
Open Problems in Mathematics and Computational Science. Springer 2014, ISBN 978-3-319-10682-3 [contents] - [i4]Ömer Egecioglu, Çetin Kaya Koç:
Reducing the Complexity of Normal Basis Multiplication. IACR Cryptol. ePrint Arch. 2014: 687 (2014) - 2012
- [j42]Vladimir Trujillo-Olaya, Timothy Sherwood, Çetin Kaya Koç:
Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications. J. Cryptogr. Eng. 2(3): 179-188 (2012) - [c31]Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy E. Levin, Timothy Sherwood:
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Cryptography and Security 2012: 364-382 - [c30]Donald Donglong Chen, Gavin Xiaoxu Yao, Çetin Kaya Koç, Ray C. C. Cheung:
Low complexity and hardware-friendly spectral modular multiplication. FPT 2012: 368-375 - 2011
- [j41]Çetin Kaya Koç:
Introduction to the Journal of Cryptographic Engineering. J. Cryptogr. Eng. 1(1): 1-3 (2011) - [r4]Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 795-798 - [r3]Çetin Kaya Koç:
Montgomery Arithmetic. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 799-803 - 2010
- [c29]Gavin Xiaoxu Yao, Ray C. C. Cheung, Çetin Kaya Koç, Kim-Fung Man:
Reconfigurable Number Theoretic Transform architectures for cryptographic applications. FPT 2010: 308-311
2000 – 2009
- 2009
- [c28]Murat Cenk, Çetin Kaya Koç, Ferruh Özbudak:
Polynomial Multiplication over Finite Fields Using Field Extensions and Interpolation. IEEE Symposium on Computer Arithmetic 2009: 84-91 - [c27]Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor:
A High-Performance Hardware Architecture for Spectral Hash Algorithm. ASAP 2009: 215-218 - [p5]Çetin Kaya Koç:
About Cryptographic Engineering. Cryptographic Engineering 2009: 1-4 - [p4]Serdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç:
Fast Finite Field Multiplication. Cryptographic Engineering 2009: 75-104 - [p3]Erkay Savas, Çetin Kaya Koç:
Efficient Unified Arithmetic for Hardware Cryptography. Cryptographic Engineering 2009: 105-124 - [p2]Gökay Saldamli, Çetin Kaya Koç:
Spectral Modular Arithmetic for Cryptography. Cryptographic Engineering 2009: 125-169 - [p1]Onur Aciiçmez, Çetin Kaya Koç:
Microarchitectural Attacks and Countermeasures. Cryptographic Engineering 2009: 475-504 - [e7]Çetin Kaya Koç:
Cryptographic Engineering. Springer 2009, ISBN 978-0-387-71816-3 [contents] - 2008
- [j40]Min-Ho Kim, Çetin Kaya Koç:
Improving the Novikov and Kiselev User Authentication Scheme. Int. J. Netw. Secur. 6(3): 241-245 (2008) - [j39]Minho Kim, Çetin Kaya Koç:
A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography. J. Inf. Sci. Eng. 24(4): 1213-1227 (2008) - [c26]Ilker Yavuz, Siddika Berna Örs Yalçin, Çetin Kaya Koç:
FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m). ReConFig 2008: 397-402 - [e6]Joachim von zur Gathen, José Luis Imaña, Çetin Kaya Koç:
Arithmetic of Finite Fields, 2nd International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings. Lecture Notes in Computer Science 5130, Springer 2008, ISBN 978-3-540-69498-4 [contents] - 2007
- [j38]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Micro-Architectural Cryptanalysis. IEEE Secur. Priv. 5(4): 62-64 (2007) - [j37]Minho Kim, Çetin Kaya Koç:
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme. Int. J. Netw. Secur. 4(2): 235-239 (2007) - [c25]Gökay Saldamli, Çetin Kaya Koç:
Spectral Modular Exponentiation. IEEE Symposium on Computer Arithmetic 2007: 123-132 - [c24]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
Predicting Secret Keys Via Branch Prediction. CT-RSA 2007: 225-242 - [c23]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Cache Based Remote Timing Attack on the AES. CT-RSA 2007: 271-286 - 2006
- [c22]Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES (Short Paper). ICICS 2006: 112-121 - [i3]Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. IACR Cryptol. ePrint Arch. 2006: 138 (2006) - [i2]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. IACR Cryptol. ePrint Arch. 2006: 288 (2006) - [i1]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 351 (2006) - 2005
- [j36]Minho Kim, Çetin Kaya Koç:
A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme. Int. J. Netw. Secur. 1(2): 77-80 (2005) - [c21]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Improving Brumley and Boneh timing attack on unprotected SSL implementations. CCS 2005: 139-146 - [r2]Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. Encyclopedia of Cryptography and Security 2005 - [r1]Çetin Kaya Koç, Colin D. Walter:
Montgomery Arithmetic. Encyclopedia of Cryptography and Security 2005 - 2004
- [j35]Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç:
Elliptic and hyperelliptic curves on embedded µP. ACM Trans. Embed. Comput. Syst. 3(3): 509-533 (2004) - [j34]Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst. Secur. 7(1): 21-59 (2004) - [c20]Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan:
Relay Attacks on Bluetooth Authentication and Solutions. ISCIS 2004: 278-288 - 2003
- [j33]Çetin Kaya Koç, Christof Paar:
Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems. IEEE Trans. Computers 52(4): 401-402 (2003) - [j32]Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm. IEEE Trans. Computers 52(9): 1215-1221 (2003) - [j31]Berk Sunar, Erkay Savas, Çetin Kaya Koç:
Constructing Composite Field Representations for Efficient Conversion. IEEE Trans. Computers 52(11): 1391-1398 (2003) - [j30]Francisco Rodríguez-Henríquez, Çetin Kaya Koç:
Parallel Multipliers Based on Special Irreducible Pentanomials. IEEE Trans. Computers 52(12): 1535-1542 (2003) - [c19]Serdar Süer Erdem, Çetin Kaya Koç:
A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two. IEEE Symposium on Computer Arithmetic 2003: 28- - [c18]Colin Van Dyke, Çetin Kaya Koç:
On Ubiquitous Network Security and Anomaly Detection. SAINT Workshops 2003: 374-378 - [e5]Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science 2523, Springer 2003, ISBN 3-540-00409-2 [contents] - [e4]Colin D. Walter, Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2779, Springer 2003, ISBN 3-540-40833-9 [contents] - 2002
- [c17]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç:
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). CHES 2002: 484-499 - [c16]Erkay Savas, Çetin Kaya Koç:
Architectures for unified field inversion with applications in elliptic curve cryptography. ICECS 2002: 1155-1158 - [c15]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Çetin Kaya Koç:
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. ISVLSI 2002: 53-58 - 2001
- [j29]Albert Levi, Çetin Kaya Koç:
Risks in email security. Commun. ACM 44(8): 112 (2001) - [j28]Berk Sunar, Çetin Kaya Koç:
An Efficient Optimal Normal Basis Type II Multiplier. IEEE Trans. Computers 50(1): 83-87 (2001) - [c14]Albert Levi, Çetin Kaya Koç:
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. ACSAC 2001: 286-295 - [c13]Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç:
Generating Elliptic Curves of Prime Order. CHES 2001: 142-158 - [c12]Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç:
High-Radix Design of a Scalable Modular Multiplier. CHES 2001: 185-201 - [c11]Albert Levi, Çetin Kaya Koç:
Reducing Certificate Revocating Cost using NPKI. SEC 2001: 51-60 - [e3]Çetin Kaya Koç, David Naccache, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Lecture Notes in Computer Science 2162, Springer 2001, ISBN 3-540-42521-7 [contents] - 2000
- [j27]Alper Halbutogullari, Çetin Kaya Koç:
Parallel Multiplication in using Polynomial Residue Arithmetic. Des. Codes Cryptogr. 20(2): 155-173 (2000) - [j26]Alper Halbutogullari, Çetin Kaya Koç:
Mastrovito Multiplier for General Irreducible Polynomials. IEEE Trans. Computers 49(5): 503-518 (2000) - [j25]Erkay Savas, Çetin Kaya Koç:
The Montgomery Modular Inverse-Revisited. IEEE Trans. Computers 49(7): 763-766 (2000) - [c10]Murat Aydos, Tugrul Yanik, Çetin Kaya Koç:
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. ACSAC 2000: 401-410 - [c9]Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). CHES 2000: 277-292 - [e2]Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Lecture Notes in Computer Science 1965, Springer 2000, ISBN 3-540-41455-X [contents]
1990 – 1999
- 1999
- [j24]Berk Sunar, Çetin Kaya Koç:
Mastrovito Multiplier for All Trinomials. IEEE Trans. Computers 48(5): 522-527 (1999) - [c8]Alper Halbutogullari, Çetin Kaya Koç:
Mastrovito Multiplier for General Irreducible Polynomials. AAECC 1999: 498-507 - [c7]Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable Architecture for Montgomery Multiplication. CHES 1999: 94-108 - [e1]