The SCEAS System
Navigation Menu

Search the dblp DataBase


Erkay Savas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Johann Großschädl, Roberto Maria Avanzi, Erkay Savas, Stefan Tillich
    Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:75-90 [Conf]
  2. Johann Großschädl, Erkay Savas
    Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:133-147 [Conf]
  3. Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç
    Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:484-499 [Conf]
  4. Erdinc Öztürk, Berk Sunar, Erkay Savas
    Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:92-106 [Conf]
  5. Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç
    Generating Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:142-158 [Conf]
  6. Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç
    A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:277-292 [Conf]
  7. Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi
    Privacy Preserving Clustering on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:95- [Conf]
  8. Erkay Savas, Berk Sunar
    A Practical and Secure Communication Protocol in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:707-717 [Conf]
  9. Albert Levi, Erkay Savas
    Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1245-1250 [Conf]
  10. Cagil Can Oniz, Erkay Savas, Albert Levi
    A Fair Multimedia Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:342-351 [Conf]
  11. Erkay Savas
    A Carry-Free Architecture for Montgomery Inversion. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1508-1519 [Journal]
  12. Erkay Savas, Çetin Kaya Koç
    The Montgomery Modular Inverse-Revisited. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:7, pp:763-766 [Journal]
  13. Berk Sunar, Erkay Savas, Çetin Kaya Koç
    Constructing Composite Field Representations for Efficient Conversion. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal]

  14. A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP]

  15. Distributed privacy preserving k-means clustering with additive secret sharing. [Citation Graph (, )][DBLP]

  16. A resilient key predistribution scheme for multiphase wireless sensor networks. [Citation Graph (, )][DBLP]

  17. Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties. [Citation Graph (, )][DBLP]

  18. Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. [Citation Graph (, )][DBLP]

  19. Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario. [Citation Graph (, )][DBLP]

  20. Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing. [Citation Graph (, )][DBLP]

  21. Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  22. Improved Fuzzy Vault Scheme for Fingerprint Verification. [Citation Graph (, )][DBLP]

  23. Disclosure Risks of Distance Preserving Data Transformations. [Citation Graph (, )][DBLP]

  24. An optimistic fair e-commerce protocol for large e-goods. [Citation Graph (, )][DBLP]

  25. An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three. [Citation Graph (, )][DBLP]

  26. Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. [Citation Graph (, )][DBLP]

  27. Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms. [Citation Graph (, )][DBLP]

  28. Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath. [Citation Graph (, )][DBLP]

  29. Parametric, Secure and Compact Implementation of RSA on FPGA. [Citation Graph (, )][DBLP]

  30. Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security. [Citation Graph (, )][DBLP]

  31. Public key cryptography based privacy preserving multi-context RFID infrastructure. [Citation Graph (, )][DBLP]

  32. Privacy preserving clustering on horizontally partitioned data. [Citation Graph (, )][DBLP]

  33. Impossibility of unconditionally secure scalar products. [Citation Graph (, )][DBLP]

  34. Discovering private trajectories using background information. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002