Search the dblp DataBase
Çetin Kaya Koç :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Alper Halbutogullari , Çetin Kaya Koç Mastrovito Multiplier for General Irreducible Polynomials. [Citation Graph (0, 0)][DBLP ] AAECC, 1999, pp:498-507 [Conf ] Murat Aydos , T. Yanik , Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:401-410 [Conf ] Albert Levi , Çetin Kaya Koç CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:286-295 [Conf ] Serdar S. Erdem , Çetin Kaya Koç A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Computer Arithmetic, 2003, pp:28-0 [Conf ] Çetin Kaya Koç , Tolga Acar Fast Software Exponentiation in GF(2^k). [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Computer Arithmetic, 1997, pp:225-0 [Conf ] Onur Aciiçmez , Werner Schindler , Çetin Kaya Koç Improving Brumley and Boneh timing attack on unprotected SSL implementations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:139-146 [Conf ] Adnan Abdul-Aziz Gutub , Alexandre F. Tenca , Erkay Savas , Çetin Kaya Koç Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:484-499 [Conf ] Erkay Savas , Thomas A. Schmidt , Çetin Kaya Koç Generating Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:142-158 [Conf ] Erkay Savas , Alexandre F. Tenca , Çetin Kaya Koç A Scalable and Unified Multiplier Architecture for Finite Fields GF(p ) and GF(2m ). [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:277-292 [Conf ] Alexandre F. Tenca , Çetin Kaya Koç A Scalable Architecture for Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] CHES, 1999, pp:94-108 [Conf ] Alexandre F. Tenca , Georgi Todorov , Çetin Kaya Koç High-Radix Design of a Scalable Modular Multiplier. [Citation Graph (0, 0)][DBLP ] CHES, 2001, pp:185-201 [Conf ] Onur Aciiçmez , Çetin Kaya Koç , Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:225-242 [Conf ] Onur Aciiçmez , Werner Schindler , Çetin Kaya Koç Cache Based Remote Timing Attack on the AES. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:271-286 [Conf ] Onur Aciiçmez , Çetin Kaya Koç Trace-Driven Cache Attacks on AES (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:112-121 [Conf ] Çetin Kaya Koç , Rose Marie Piedra A Parallel Algorithm for Exact Solution of Linear Equations. [Citation Graph (0, 0)][DBLP ] ICPP (3), 1991, pp:1-8 [Conf ] Albert Levi , Erhan Çetintas , Murat Aydos , Çetin Kaya Koç , M. Ufuk Çaglayan Relay Attacks on Bluetooth Authentication and Solutions. [Citation Graph (0, 0)][DBLP ] ISCIS, 2004, pp:278-288 [Conf ] Adnan Abdul-Aziz Gutub , Alexandre F. Tenca , Çetin Kaya Koç Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. [Citation Graph (0, 0)][DBLP ] ISVLSI, 2002, pp:53-58 [Conf ] Colin Van Dyke , Çetin Kaya Koç On Ubiquitous Network Security and Anomaly Detection. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2003, pp:374-378 [Conf ] Albert Levi , Çetin Kaya Koç Reducing Certificate Revocating Cost using NPKI. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:51-60 [Conf ] Albert Levi , Çetin Kaya Koç Risks in email security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:8, pp:112- [Journal ] Alper Halbutogullari , Çetin Kaya Koç Parallel Multiplication in using Polynomial Residue Arithmetic. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:20, n:2, pp:155-173 [Journal ] Çetin Kaya Koç , Tolga Acar Montgomery Multplication in GF(2k ). [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:14, n:1, pp:57-69 [Journal ] Ömer Egecioglu , Efstratios Gallopoulos , Çetin Kaya Koç Fast computation of divided differences and parallel hermite interpolation. [Citation Graph (0, 0)][DBLP ] J. Complexity, 1989, v:5, n:4, pp:417-437 [Journal ] Çetin Kaya Koç , Sarath N. Arachchige A Fast Algorithm for Gaussian Elimination over GF(2) and Its Implementation on the GAPP. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1991, v:13, n:1, pp:118-122 [Journal ] Çetin Kaya Koç Parallel p-Adic Method for Solving Linear Systems of Equations. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1997, v:23, n:13, pp:2067-2074 [Journal ] Ömer Egecioglu , Çetin Kaya Koç A parallel algorithm for generating discrete orthogonal polynomials. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1992, v:18, n:6, pp:649-659 [Journal ] Çetin Kaya Koç , Peter R. Cappello Systolic Arrays for Integer Chinese Remaindering. [Citation Graph (0, 0)][DBLP ] Parallel Computing, 1993, v:19, n:11, pp:1303-1311 [Journal ] Alper Halbutogullari , Çetin Kaya Koç Mastrovito Multiplier for General Irreducible Polynomials. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2000, v:49, n:5, pp:503-518 [Journal ] Çetin Kaya Koç , Berk Sunar Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:3, pp:353-356 [Journal ] Çetin Kaya Koç , Christof Paar Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:401-402 [Journal ] Francisco Rodríguez-Henríquez , Çetin Kaya Koç Parallel Multipliers Based on Special Irreducible Pentanomials. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:12, pp:1535-1542 [Journal ] Erkay Savas , Çetin Kaya Koç The Montgomery Modular Inverse-Revisited. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2000, v:49, n:7, pp:763-766 [Journal ] Berk Sunar , Çetin Kaya Koç An Efficient Optimal Normal Basis Type II Multiplier. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2001, v:50, n:1, pp:83-87 [Journal ] Berk Sunar , Çetin Kaya Koç Mastrovito Multiplier for All Trinomials. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1999, v:48, n:5, pp:522-527 [Journal ] Berk Sunar , Erkay Savas , Çetin Kaya Koç Constructing Composite Field Representations for Efficient Conversion. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal ] Alexandre F. Tenca , Çetin Kaya Koç A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:9, pp:1215-1221 [Journal ] Çetin Kaya Koç , P. F. Ordung Schwarz-Christoffel transformation for the simulation of two-dimensional capacitance [VLSI circuits]. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1989, v:8, n:9, pp:1025-1027 [Journal ] Ömer Egecioglu , Çetin Kaya Koç Exponentiation Using Canonical Recoding. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1994, v:129, n:2, pp:407-417 [Journal ] Thomas J. Wollinger , Jan Pelzl , Volker Wittelsberger , Christof Paar , Gökay Saldamli , Çetin Kaya Koç Elliptic and hyperelliptic curves on embedded µP. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:509-533 [Journal ] Albert Levi , M. Ufuk Çaglayan , Çetin Kaya Koç Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:21-59 [Journal ] Gökay Saldamli , Çetin Kaya Koç Spectral Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Computer Arithmetic, 2007, pp:123-132 [Conf ] Polynomial Multiplication over Finite Fields Using Field Extensions and Interpolation. [Citation Graph (, )][DBLP ] FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m). [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.304secs