Search the dblp DataBase
Berk Sunar :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Selçuk Baktir , Berk Sunar Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:549-554 [Conf ] Erdinc Öztürk , Berk Sunar , Erkay Savas Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:92-106 [Conf ] Berk Sunar , David Cyganski Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:237-249 [Conf ] Gunnar Gaubatz , Jens-Peter Kaps , Berk Sunar Public Key Cryptography in Sensor Networks - Revisited. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:2-18 [Conf ] Jens-Peter Kaps , Berk Sunar Energy Comparison of AES and SHA-1 for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:372-381 [Conf ] Gunnar Gaubatz , Berk Sunar Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:196-210 [Conf ] Gunnar Gaubatz , Berk Sunar , Mark G. Karpovsky Non-linear Residue Codes for Robust Public-Key Arithmetic. [Citation Graph (0, 0)][DBLP ] FDTC, 2006, pp:173-184 [Conf ] Erkay Savas , Berk Sunar A Practical and Secure Communication Protocol in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:707-717 [Conf ] Selçuk Baktir , Berk Sunar Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ISCIS, 2006, pp:991-1001 [Conf ] Gunnar Gaubatz , Berk Sunar Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. [Citation Graph (0, 0)][DBLP ] NCA, 2005, pp:235-238 [Conf ] Gunnar Gaubatz , Jens-Peter Kaps , Erdinc Öztürk , Berk Sunar State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2005, pp:146-150 [Conf ] Dakshi Agrawal , Selçuk Baktir , Deniz Karakoyunlu , Pankaj Rohatgi , Berk Sunar Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf ] Selçuk Baktir , Berk Sunar Optimal Tower Fields. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:10, pp:1231-1243 [Journal ] Jens-Peter Kaps , Kaan Yüksel , Berk Sunar Energy Scalable Universal Hashing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:12, pp:1484-1495 [Journal ] Çetin Kaya Koç , Berk Sunar Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:3, pp:353-356 [Journal ] Colleen O'Rourke , Berk Sunar Achieving NTRU with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:440-448 [Journal ] Berk Sunar A Generalized Method for Constructing Subquadratic Complexity GF(2^k) Multipliers. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:9, pp:1097-1105 [Journal ] Berk Sunar An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:8, pp:992-997 [Journal ] Berk Sunar , Çetin Kaya Koç An Efficient Optimal Normal Basis Type II Multiplier. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2001, v:50, n:1, pp:83-87 [Journal ] Berk Sunar , Çetin Kaya Koç Mastrovito Multiplier for All Trinomials. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1999, v:48, n:5, pp:522-527 [Journal ] Berk Sunar , Erkay Savas , Çetin Kaya Koç Constructing Composite Field Representations for Efficient Conversion. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal ] Berk Sunar , William J. Martin , Douglas R. Stinson A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:1, pp:109-119 [Journal ] PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. [Citation Graph (, )][DBLP ] Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP ] A fast real-time memory authentication protocol. [Citation Graph (, )][DBLP ] CDs Have Fingerprints Too. [Citation Graph (, )][DBLP ] Tate Pairing with Strong Fault Resiliency. [Citation Graph (, )][DBLP ] Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. [Citation Graph (, )][DBLP ] Unclonable Lightweight Authentication Scheme. [Citation Graph (, )][DBLP ] Novel PUF-Based Error Detection Methods in Finite State Machines. [Citation Graph (, )][DBLP ] Multilinear codes for robust error detection. [Citation Graph (, )][DBLP ] Physical unclonable function with tristate buffers. [Citation Graph (, )][DBLP ] Towards Robust Low Cost Authentication for Pervasive Devices. [Citation Graph (, )][DBLP ] Non-linear Error Detection for Finite State Machines. [Citation Graph (, )][DBLP ] Optimal Extension Field Inversion in the Frequency Domain. [Citation Graph (, )][DBLP ] An Improved Memory Integrity Protection Scheme. [Citation Graph (, )][DBLP ] Cryptography on a Speck of Dust. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs