The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Çetin Kaya Koç: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alper Halbutogullari, Çetin Kaya Koç
    Mastrovito Multiplier for General Irreducible Polynomials. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:498-507 [Conf]
  2. Murat Aydos, T. Yanik, Çetin Kaya Koç
    An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:401-410 [Conf]
  3. Albert Levi, Çetin Kaya Koç
    CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:286-295 [Conf]
  4. Serdar S. Erdem, Çetin Kaya Koç
    A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2003, pp:28-0 [Conf]
  5. Çetin Kaya Koç, Tolga Acar
    Fast Software Exponentiation in GF(2^k). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 1997, pp:225-0 [Conf]
  6. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Improving Brumley and Boneh timing attack on unprotected SSL implementations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:139-146 [Conf]
  7. Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç
    Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:484-499 [Conf]
  8. Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç
    Generating Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:142-158 [Conf]
  9. Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç
    A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:277-292 [Conf]
  10. Alexandre F. Tenca, Çetin Kaya Koç
    A Scalable Architecture for Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:94-108 [Conf]
  11. Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç
    High-Radix Design of a Scalable Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:185-201 [Conf]
  12. Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
    Predicting Secret Keys Via Branch Prediction. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:225-242 [Conf]
  13. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Cache Based Remote Timing Attack on the AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:271-286 [Conf]
  14. Onur Aciiçmez, Çetin Kaya Koç
    Trace-Driven Cache Attacks on AES (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:112-121 [Conf]
  15. Çetin Kaya Koç, Rose Marie Piedra
    A Parallel Algorithm for Exact Solution of Linear Equations. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1991, pp:1-8 [Conf]
  16. Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan
    Relay Attacks on Bluetooth Authentication and Solutions. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:278-288 [Conf]
  17. Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Çetin Kaya Koç
    Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. [Citation Graph (0, 0)][DBLP]
    ISVLSI, 2002, pp:53-58 [Conf]
  18. Colin Van Dyke, Çetin Kaya Koç
    On Ubiquitous Network Security and Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:374-378 [Conf]
  19. Albert Levi, Çetin Kaya Koç
    Reducing Certificate Revocating Cost using NPKI. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:51-60 [Conf]
  20. Albert Levi, Çetin Kaya Koç
    Risks in email security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:8, pp:112- [Journal]
  21. Alper Halbutogullari, Çetin Kaya Koç
    Parallel Multiplication in using Polynomial Residue Arithmetic. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:20, n:2, pp:155-173 [Journal]
  22. Çetin Kaya Koç, Tolga Acar
    Montgomery Multplication in GF(2k). [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:14, n:1, pp:57-69 [Journal]
  23. Ömer Egecioglu, Efstratios Gallopoulos, Çetin Kaya Koç
    Fast computation of divided differences and parallel hermite interpolation. [Citation Graph (0, 0)][DBLP]
    J. Complexity, 1989, v:5, n:4, pp:417-437 [Journal]
  24. Çetin Kaya Koç, Sarath N. Arachchige
    A Fast Algorithm for Gaussian Elimination over GF(2) and Its Implementation on the GAPP. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1991, v:13, n:1, pp:118-122 [Journal]
  25. Çetin Kaya Koç
    Parallel p-Adic Method for Solving Linear Systems of Equations. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:23, n:13, pp:2067-2074 [Journal]
  26. Ömer Egecioglu, Çetin Kaya Koç
    A parallel algorithm for generating discrete orthogonal polynomials. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1992, v:18, n:6, pp:649-659 [Journal]
  27. Çetin Kaya Koç, Peter R. Cappello
    Systolic Arrays for Integer Chinese Remaindering. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1993, v:19, n:11, pp:1303-1311 [Journal]
  28. Alper Halbutogullari, Çetin Kaya Koç
    Mastrovito Multiplier for General Irreducible Polynomials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:5, pp:503-518 [Journal]
  29. Çetin Kaya Koç, Berk Sunar
    Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:3, pp:353-356 [Journal]
  30. Çetin Kaya Koç, Christof Paar
    Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:401-402 [Journal]
  31. Francisco Rodríguez-Henríquez, Çetin Kaya Koç
    Parallel Multipliers Based on Special Irreducible Pentanomials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:12, pp:1535-1542 [Journal]
  32. Erkay Savas, Çetin Kaya Koç
    The Montgomery Modular Inverse-Revisited. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:7, pp:763-766 [Journal]
  33. Berk Sunar, Çetin Kaya Koç
    An Efficient Optimal Normal Basis Type II Multiplier. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2001, v:50, n:1, pp:83-87 [Journal]
  34. Berk Sunar, Çetin Kaya Koç
    Mastrovito Multiplier for All Trinomials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:5, pp:522-527 [Journal]
  35. Berk Sunar, Erkay Savas, Çetin Kaya Koç
    Constructing Composite Field Representations for Efficient Conversion. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal]
  36. Alexandre F. Tenca, Çetin Kaya Koç
    A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:9, pp:1215-1221 [Journal]
  37. Çetin Kaya Koç, P. F. Ordung
    Schwarz-Christoffel transformation for the simulation of two-dimensional capacitance [VLSI circuits]. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1989, v:8, n:9, pp:1025-1027 [Journal]
  38. Ömer Egecioglu, Çetin Kaya Koç
    Exponentiation Using Canonical Recoding. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1994, v:129, n:2, pp:407-417 [Journal]
  39. Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç
    Elliptic and hyperelliptic curves on embedded µP. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:509-533 [Journal]
  40. Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç
    Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:21-59 [Journal]
  41. Gökay Saldamli, Çetin Kaya Koç
    Spectral Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2007, pp:123-132 [Conf]

  42. Polynomial Multiplication over Finite Fields Using Field Extensions and Interpolation. [Citation Graph (, )][DBLP]


  43. FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m). [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002