The SCEAS System
Navigation Menu

Search the dblp DataBase


Berk Sunar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Selçuk Baktir, Berk Sunar
    Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:549-554 [Conf]
  2. Erdinc Öztürk, Berk Sunar, Erkay Savas
    Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:92-106 [Conf]
  3. Berk Sunar, David Cyganski
    Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:237-249 [Conf]
  4. Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
    Public Key Cryptography in Sensor Networks - Revisited. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:2-18 [Conf]
  5. Jens-Peter Kaps, Berk Sunar
    Energy Comparison of AES and SHA-1 for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:372-381 [Conf]
  6. Gunnar Gaubatz, Berk Sunar
    Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:196-210 [Conf]
  7. Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
    Non-linear Residue Codes for Robust Public-Key Arithmetic. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:173-184 [Conf]
  8. Erkay Savas, Berk Sunar
    A Practical and Secure Communication Protocol in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:707-717 [Conf]
  9. Selçuk Baktir, Berk Sunar
    Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:991-1001 [Conf]
  10. Gunnar Gaubatz, Berk Sunar
    Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:235-238 [Conf]
  11. Gunnar Gaubatz, Jens-Peter Kaps, Erdinc Öztürk, Berk Sunar
    State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:146-150 [Conf]
  12. Dakshi Agrawal, Selçuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar
    Trojan Detection using IC Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:296-310 [Conf]
  13. Selçuk Baktir, Berk Sunar
    Optimal Tower Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:10, pp:1231-1243 [Journal]
  14. Jens-Peter Kaps, Kaan Yüksel, Berk Sunar
    Energy Scalable Universal Hashing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1484-1495 [Journal]
  15. Çetin Kaya Koç, Berk Sunar
    Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:3, pp:353-356 [Journal]
  16. Colleen O'Rourke, Berk Sunar
    Achieving NTRU with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:440-448 [Journal]
  17. Berk Sunar
    A Generalized Method for Constructing Subquadratic Complexity GF(2^k) Multipliers. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:9, pp:1097-1105 [Journal]
  18. Berk Sunar
    An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:8, pp:992-997 [Journal]
  19. Berk Sunar, Çetin Kaya Koç
    An Efficient Optimal Normal Basis Type II Multiplier. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2001, v:50, n:1, pp:83-87 [Journal]
  20. Berk Sunar, Çetin Kaya Koç
    Mastrovito Multiplier for All Trinomials. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:5, pp:522-527 [Journal]
  21. Berk Sunar, Erkay Savas, Çetin Kaya Koç
    Constructing Composite Field Representations for Efficient Conversion. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal]
  22. Berk Sunar, William J. Martin, Douglas R. Stinson
    A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:1, pp:109-119 [Journal]

  23. PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. [Citation Graph (, )][DBLP]

  24. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]

  25. A fast real-time memory authentication protocol. [Citation Graph (, )][DBLP]

  26. CDs Have Fingerprints Too. [Citation Graph (, )][DBLP]

  27. Tate Pairing with Strong Fault Resiliency. [Citation Graph (, )][DBLP]

  28. Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. [Citation Graph (, )][DBLP]

  29. Unclonable Lightweight Authentication Scheme. [Citation Graph (, )][DBLP]

  30. Novel PUF-Based Error Detection Methods in Finite State Machines. [Citation Graph (, )][DBLP]

  31. Multilinear codes for robust error detection. [Citation Graph (, )][DBLP]

  32. Physical unclonable function with tristate buffers. [Citation Graph (, )][DBLP]

  33. Towards Robust Low Cost Authentication for Pervasive Devices. [Citation Graph (, )][DBLP]

  34. Non-linear Error Detection for Finite State Machines. [Citation Graph (, )][DBLP]

  35. Optimal Extension Field Inversion in the Frequency Domain. [Citation Graph (, )][DBLP]

  36. An Improved Memory Integrity Protection Scheme. [Citation Graph (, )][DBLP]

  37. Cryptography on a Speck of Dust. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002