Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Erkay
    Last name: Savas
    DBLP: 99/238
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 88 of 88  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Duygu Karaoglan, Muhammed Ali Bingöl, Albert Levi, Erkay Savas.
    DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.
    Ad Hoc Networks 2017, Volume 54 (0) 2017
    Journal article
    ErdinçÖztürk, Yarkin Doröz, Erkay Savas, Berk Sunar.
    A Custom Accelerator for Homomorphic Encryption Applications.
    IEEE Trans. Computers 2017, Volume 66 (0) 2017
    Conference paper
    Kamil Doruk Gur, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas.
    Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Cengiz Örencik, Erkay Savas, Mahmoud Alewiwi.
    A Unified Framework for Secure Search Over Encrypted Cloud Data.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar.
    Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Journal article
    Ali Can Atici, Cemal Yilmaz, Erkay Savas.
    Remote Cache-Timing Attack without Learning Phase.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Journal article
    Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas.
    Efficient top-k similarity document search utilizing distributed file systems and cosine similarity.
    Cluster Computing 2016, Volume 19 (0) 2016
    Conference paper
    Ecem Ünal, Erkay Savas.
    On Acceleration and Scalability of Number Theoretic Private Information Retrieval.
    IEEE Trans. Parallel Distrib. Syst. 2016, Volume 27 (0) 2016
    Conference paper
    Cengiz Örencik, Ayse Selcuk, Erkay Savas, Murat Kantarcioglu.
    Multi-Keyword search over encrypted data with scoring and search pattern obfuscation.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Conference paper
    Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu.
    A practical privacy-preserving targeted advertising scheme for IPTV users.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Conference paper
    Gamze Tillem, Ömer Mert Candan, Erkay Savas, Kamer Kaya.
    Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM.
    Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 2016 (0) 2016
    Conference paper
    Mehran Mozaffari Kermani, Erkay Savas, Shambhu J. Upadhyaya.
    Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems.
    IEEE Trans. Emerging Topics Comput. 2016, Volume 4 (0) 2016
    Conference paper
    Marco Chiappetta, Erkay Savas, Cemal Yilmaz.
    Real time detection of cache-based side-channel attacks using hardware performance counters.
    Appl. Soft Comput. 2016, Volume 49 (0) 2016
    Conference paper
    Atil U. Ay, ErdinçÖztürk, Francisco Rodríguez-Henríquez, Erkay Savas.
    Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography.
    International Conference on ReConFigurable Computing and FPGAs, ReConFig 2016, Cancun, Mexico, November 30 - Dec. 2, 2016 2016 (0) 2016
    Conference paper
    ErdinçÖztürk, Yarkin Doröz, Berk Sunar, Erkay Savas.
    Accelerating Somewhat Homomorphic Evaluation using FPGAs.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas.
    Low Depth Circuits for Efficient Homomorphic Sorting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Yarkin Doröz, ErdinçÖztürk, Erkay Savas, Berk Sunar.
    Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware.
    Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Erkay Savas, Cemal Yilmaz.
    A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Kazim Yumbul, Erkay Savas.
    Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms .
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Cagatay Karabat, Mehmet Sabir Kiraz, Hakan Erdogan, Erkay Savas.
    THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system.
    EURASIP J. Adv. Sig. Proc. 2015, Volume 2015 (0) 2015
    Conference paper
    Marco Chiappetta, Erkay Savas, Cemal Yilmaz.
    Real time detection of cache-based side-channel attacks using Hardware Performance Counters.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Cengiz Örencik, Mahmoud Alewiwi, Erkay Savas.
    Secure Sketch Search for Document Similarity.
    2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1 2015 (0) 2015
    Conference paper
    Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas.
    Depth Optimized Efficient Homomorphic Sorting.
    Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings 2015 (0) 2015
    Journal article
    Kazim Yumbul, Erkay Savas, Övünç Kocabas, Johann Großschädl.
    Design and implementation of a versatile cryptographic unit for RISC processors.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Journal article
    Cengiz Örencik, Erkay Savas.
    An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking.
    Distributed and Parallel Databases 2014, Volume 32 (0) 2014
    Conference paper
    Kazim Yumbul, Serdar Süer Erdem, Erkay Savas.
    On Selection of Modulus of Quadratic Codes for the Protection of Cryptographic Operations against Fault Attacks.
    IEEE Trans. Computers 2014, Volume 63 (0) 2014
    Journal article
    Cagatay Karabat, Mehmet Sabir Kiraz, Hakan Erdogan, Erkay Savas.
    THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Ecem Ünal, Erkay Savas.
    Bandwidth-Optimized Parallel Private Information Retrieval.
    Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014 2014 (0) 2014
    Conference paper
    Cengiz Örencik, Murat Kantarcioglu, Erkay Savas.
    A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data.
    2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013 2013 (0) 2013
    Conference paper
    Erkay Savas.
    Attacks on implementations of cryptographic algorithms: side-channel and fault attacks.
    The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 2013 (0) 2013
    Conference paper
    Ali Can Atici, Cemal Yilmaz, Erkay Savas.
    An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.
    Seventh International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume 2013 (0) 2013
    Conference paper
    Shawn Merrill, Nilgun Basalp, Joachim Biskup, Erik Buchmann, Chris Clifton, Bart Kuijpers, Walied Othman, Erkay Savas.
    Privacy through Uncertainty in Location-Based Services.
    2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013 - Volume 2 2013 (0) 2013
    Conference paper
    Yarkin Doröz, Erkay Savas.
    Constructing Cluster of Simple FPGA Boards for Cryptologic Computations.
    Reconfigurable Computing: Architectures, Tools and Applications - 8th International Symposium, ARC 2012, Hong Kong, China, March 19-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Cengiz Örencik, Erkay Savas.
    Efficient and secure ranked multi-keyword search on encrypted cloud data.
    Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012 2012 (0) 2012
    Conference paper
    Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik.
    Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Selçuk Baktir, Erkay Savas.
    Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Selçuk Baktir, Erkay Savas.
    Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose Microprocessors.
    Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences, Paris, France, October 3-4, 2012 2013 (0) 2012
    Conference paper
    Ahmet Onur Durahim, Ismail Fatih Yildirim, Erkay Savas, Albert Levi.
    Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication.
    Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences, Paris, France, October 3-4, 2012 2013 (0) 2012
    Conference paper
    Erkay Savas, Cemal Yilmaz.
    Cache Attacks: An Information and Complexity Theoretic Approach.
    5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012 2012 (0) 2012
    Journal article
    Can Yildizli, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi.
    Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data.
    IJDWM 2011, Volume 7 (0) 2011
    Conference paper
    Ahmet Onur Durahim, Erkay Savas.
    A
    Ad Hoc Networks 2011, Volume 9 (0) 2011
    Journal article
    Murat Ergun, Albert Levi, Erkay Savas.
    Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach.
    Comput. J. 2011, Volume 54 (0) 2011
    Conference paper
    Tansu Alpcan, Albert Levi, Erkay Savas.
    Digital Trust Games: An Experimental Study.
    Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kazim Yumbul, Serdar Süer Erdem, Erkay Savas.
    On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes.
    2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, Tokyo, Japan, September 29, 2011 2011 (0) 2011
    Conference paper
    Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas.
    Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing.
    Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 2010 (0) 2010
    Conference paper
    Kazim Yumbul, Serdar Süer Erdem, Erkay Savas.
    Design and implementation of robust embedded processor for cryptographic applications.
    Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 2010 (0) 2010
    Conference paper
    Duygu Karaoglan, Albert Levi, Erkay Savas.
    A distributed key establishment scheme for wireless mesh networks using identity-based cryptography.
    Q2SWinet'10, Proceedings of the Sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010 2010 (0) 2010
    Conference paper
    Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas.
    A game theoretic model for digital identity and trust in online communities.
    Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010 2010 (0) 2010
    Conference paper
    Emre Kaplan, Thomas Brochmann Pedersen, Erkay Savas, Yücel Saygin.
    Discovering private trajectories using background information.
    Data Knowl. Eng. 2010, Volume 69 (0) 2010
    Journal article
    Ahmet Onur Durahim, Erkay Savas, Berk Sunar, Thomas Brochmann Pedersen, Övünç Kocabas.
    Transparent code authentication at the processor level.
    IET Computers Digital Techniques 2009, Volume 3 (0) 2009
    Book chapter
    Erkay Savas, Çetin Kaya Koç.
    Efficient Unified Arithmetic for Hardware Cryptography.
    Cryptographic Engineering 2009 (0) 2009
    Conference paper
    Murat Ergun, Albert Levi, Erkay Savas.
    A resilient key predistribution scheme for multiphase wireless sensor networks.
    The 24th International Symposium on Computer and Information Sciences, ISCIS 2009, 14-16 September 2009, North Cyprus 2009 (0) 2009
    Conference paper
    Kazim Yumbul, Erkay Savas.
    Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit.
    Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 2009 (0) 2009
    Conference paper
    Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin.
    Public key cryptography based privacy preserving multi-context RFID infrastructure.
    Ad Hoc Networks 2009, Volume 7 (0) 2009
    Conference paper
    Thomas Brochmann Pedersen, Erkay Savas.
    Impossibility of unconditionally secure scalar products.
    Data Knowl. Eng. 2009, Volume 68 (0) 2009
    Conference paper
    Ahmet Onur Durahim, Erkay Savas, Kazim Yumbul.
    Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms.
    ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings 2009 (0) 2009
    Conference paper
    Johann Großschädl, Erkay Savas, Kazim Yumbul.
    Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath.
    ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings 2009 (0) 2009
    Journal article
    ErdinçÖztürk, Berk Sunar, Erkay Savas.
    A versatile Montgomery multiplier architecture with characteristic three support.
    Computers Electrical Engineering 2009, Volume 35 (0) 2009
    Conference paper
    Ayse Gül Karatop, Erkay Savas.
    An identity-based key infrastructure suitable for messaging and its application to e-mail.
    4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008 2011 (0) 2008
    Conference paper
    Mahir Can Doganay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi.
    Distributed privacy preserving k-means clustering with additive secret sharing.
    Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008 2008 (0) 2008
    Conference paper
    Emre Kaplan, Thomas Brochmann Pedersen, Erkay Savas, Yücel Saygin.
    Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties.
    Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II 2008 (0) 2008
    Conference paper
    Omer Zekvan Yilmaz, Albert Levi, Erkay Savas.
    Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.
    SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2008 (0) 2008
    Conference paper
    Cengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinoz.
    Improved Fuzzy Vault Scheme for Fingerprint Verification.
    SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2008 (0) 2008
    Conference paper
    E. Onur Turgay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi.
    Disclosure Risks of Distance Preserving Data Transformations.
    Scientific and Statistical Database Management, 20th International Conference, SSDBM 2008, Hong Kong, China, July 9-11, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Giray Kömürcü, Erkay Savas.
    An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three.
    The Third International Conference on Systems, ICONS 2008, April 13-18, 2008, Cancun, Mexico 2008 (0) 2008
    Conference paper
    Berk Sunar, Gunnar Gaubatz, Erkay Savas.
    Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults.
    IEEE Trans. Computers 2008, Volume 57 (0) 2008
    Book chapter
    Francesco Bonchi, Yücel Saygin, Vassilios S. Verykios, Maurizio Atzori, Aris Gkoulalas-Divanis, Selim Volkan Kaya, Erkay Savas.
    Privacy in Spatiotemporal Data Mining.
    Mobility, Data Mining and Privacy - Geographic Knowledge Discovery 2008 (0) 2008
    Conference paper
    Ersin Öksüzoglu, Erkay Savas.
    Parametric, Secure and Compact Implementation of RSA on FPGA.
    ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings 2008 (0) 2008
    Conference paper
    Övünç Kocabas, Erkay Savas, Johann Großschädl.
    Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security.
    ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings 2008 (0) 2008
    Conference paper
    Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin.
    Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography.
    NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Abdülhakim Ünlü, Önsel Armagan, Albert Levi, Erkay Savas, Özgür Erçetin.
    Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario.
    NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Selim Volkan Kaya, Thomas Brochmann Pedersen, Erkay Savas, Yücel Saygin.
    Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing.
    Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers 2007 (0) 2007
    Conference paper
    Ali Inan, Selim Volkan Kaya, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi.
    Privacy preserving clustering on horizontally partitioned data.
    Data Knowl. Eng. 2007, Volume 63 (0) 2007
    Conference paper
    Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi.
    Privacy Preserving Clustering on Horizontally Partitioned Data.
    Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA 2006 (0) 2006
    Conference paper
    Cagil Can Oniz, Erkay Savas, Albert Levi.
    An optimistic fair e-commerce protocol for large e-goods.
    Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey 2006 (0) 2006
    Conference paper
    Cagil Can Oniz, Sinan Emre Tasçi, Erkay Savas, Özgür Erçetin, Albert Levi.
    SeFER: secure, flexible and efficient routing protocol for distributed sensor networks.
    Wireless Sensor Networks, Second European Workshop, EWSN 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Johann Großschädl, Roberto Maria Avanzi, Erkay Savas, Stefan Tillich.
    Energy-Efficient Software Implementation of Long Integer Modular Arithmetic.
    Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Erkay Savas, Berk Sunar.
    A Practical and Secure Communication Protocol in the Bounded Storage Model.
    Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II 2005 (0) 2005
    Conference paper
    Cagil Can Oniz, Erkay Savas, Albert Levi.
    A Fair Multimedia Exchange Protocol.
    Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings 2005 (0) 2005
    Conference paper
    Erkay Savas.
    A Carry-Free Architecture for Montgomery Inversion.
    IEEE Trans. Computers 2005, Volume 54 (0) 2005
    Conference paper
    Johann Großschädl, Erkay Savas.
    Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2
    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings 2004 (0) 2004
    Conference paper
    ErdinçÖztürk, Berk Sunar, Erkay Savas.
    Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.
    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings 2004 (0) 2004
    Conference paper
    Albert Levi, Erkay Savas.
    Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol.
    Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey 2003 (0) 2003
    Conference paper
    Berk Sunar, Erkay Savas, Çetin Kaya Koç.
    Constructing Composite Field Representations for Efficient Conversion.
    IEEE Trans. Computers 2003, Volume 52 (0) 2003
    Conference paper
    Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç.
    Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).
    Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers 2003 (0) 2002
    Conference paper
    Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç.
    Generating Elliptic Curves of Prime Order.
    Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç.
    A Scalable and Unified Multiplier Architecture for Finite Fields GF(
    Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Erkay Savas, Çetin Kaya Koç.
    The Montgomery Modular Inverse-Revisited.
    IEEE Trans. Computers 2000, Volume 49 (0) 2000
    Show item 1 to 88 of 88  

    Your query returned 88 matches in the database.