The SCEAS System
| |||||||

## Search the dblp DataBase
Erkay Savas:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Johann Großschädl, Roberto Maria Avanzi, Erkay Savas, Stefan Tillich
**Energy-Efficient Software Implementation of Long Integer Modular Arithmetic.**[Citation Graph (0, 0)][DBLP] CHES, 2005, pp:75-90 [Conf] - Johann Großschädl, Erkay Savas
**Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2**[Citation Graph (0, 0)][DBLP]^{m}). CHES, 2004, pp:133-147 [Conf] - Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç
**Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).**[Citation Graph (0, 0)][DBLP] CHES, 2002, pp:484-499 [Conf] - Erdinc Öztürk, Berk Sunar, Erkay Savas
**Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.**[Citation Graph (0, 0)][DBLP] CHES, 2004, pp:92-106 [Conf] - Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç
**Generating Elliptic Curves of Prime Order.**[Citation Graph (0, 0)][DBLP] CHES, 2001, pp:142-158 [Conf] - Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç
**A Scalable and Unified Multiplier Architecture for Finite Fields GF(**[Citation Graph (0, 0)][DBLP]*p*) and GF(2^{m}). CHES, 2000, pp:277-292 [Conf] - Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi
**Privacy Preserving Clustering on Horizontally Partitioned Data.**[Citation Graph (0, 0)][DBLP] ICDE Workshops, 2006, pp:95- [Conf] - Erkay Savas, Berk Sunar
**A Practical and Secure Communication Protocol in the Bounded Storage Model.**[Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:707-717 [Conf] - Albert Levi, Erkay Savas
**Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol.**[Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1245-1250 [Conf] - Cagil Can Oniz, Erkay Savas, Albert Levi
**A Fair Multimedia Exchange Protocol.**[Citation Graph (0, 0)][DBLP] ISCIS, 2005, pp:342-351 [Conf] - Erkay Savas
**A Carry-Free Architecture for Montgomery Inversion.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2005, v:54, n:12, pp:1508-1519 [Journal] - Erkay Savas, Çetin Kaya Koç
**The Montgomery Modular Inverse-Revisited.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2000, v:49, n:7, pp:763-766 [Journal] - Berk Sunar, Erkay Savas, Çetin Kaya Koç
**Constructing Composite Field Representations for Efficient Conversion.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:11, pp:1391-1398 [Journal] **A game theoretic model for digital identity and trust in online communities.**[Citation Graph (, )][DBLP]**Distributed privacy preserving k-means clustering with additive secret sharing.**[Citation Graph (, )][DBLP]**A resilient key predistribution scheme for multiphase wireless sensor networks.**[Citation Graph (, )][DBLP]**Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties.**[Citation Graph (, )][DBLP]**Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography.**[Citation Graph (, )][DBLP]**Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario.**[Citation Graph (, )][DBLP]**Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing.**[Citation Graph (, )][DBLP]**Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Improved Fuzzy Vault Scheme for Fingerprint Verification.**[Citation Graph (, )][DBLP]**Disclosure Risks of Distance Preserving Data Transformations.**[Citation Graph (, )][DBLP]**An optimistic fair e-commerce protocol for large e-goods.**[Citation Graph (, )][DBLP]**An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three.**[Citation Graph (, )][DBLP]**Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit.**[Citation Graph (, )][DBLP]**Implementing a Protected Zone in a Reconfigurable Processor for Isolated Execution of Cryptographic Algorithms.**[Citation Graph (, )][DBLP]**Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath.**[Citation Graph (, )][DBLP]**Parametric, Secure and Compact Implementation of RSA on FPGA.**[Citation Graph (, )][DBLP]**Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security.**[Citation Graph (, )][DBLP]**Public key cryptography based privacy preserving multi-context RFID infrastructure.**[Citation Graph (, )][DBLP]**Privacy preserving clustering on horizontally partitioned data.**[Citation Graph (, )][DBLP]**Impossibility of unconditionally secure scalar products.**[Citation Graph (, )][DBLP]**Discovering private trajectories using background information.**[Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |