BibTeX records: Çetin Kaya Koç

download as .bib file

@article{DBLP:journals/tches/HuangAZDLCKC24,
  author       = {Junhao Huang and
                  Alexandre Adomnicai and
                  Jipeng Zhang and
                  Wangchen Dai and
                  Yao Liu and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Revisiting Keccak and Dilithium Implementations on ARMv7-M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {1--24},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.1-24},
  doi          = {10.46586/TCHES.V2024.I2.1-24},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HuangAZDLCKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HeMKBX24,
  author       = {Pengzhou He and
                  Samira Carolina Oliva Madrigal and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Tianyou Bao and
                  Jiafeng Xie},
  title        = {{CASA:} {A} Compact and Scalable Accelerator for Approximate Homomorphic
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {451--480},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.451-480},
  doi          = {10.46586/TCHES.V2024.I2.451-480},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HeMKBX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/HeTKX23,
  author       = {Pengzhou He and
                  Yazheng Tu and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Jiafeng Xie},
  title        = {Hardware-Implemented Lightweight Accelerator for Large Integer Polynomial
                  Multiplication},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {22},
  number       = {1},
  pages        = {57--60},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCA.2023.3274931},
  doi          = {10.1109/LCA.2023.3274931},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cal/HeTKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/MaoCLDSKC23,
  author       = {Gaoyu Mao and
                  Donglong Chen and
                  Guangyan Li and
                  Wangchen Dai and
                  Abdurrashid Ibrahim Sanka and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Ray C. C. Cheung},
  title        = {High-performance and Configurable {SW/HW} Co-design of Post-quantum
                  Signature CRYSTALS-Dilithium},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {16},
  number       = {3},
  pages        = {44:1--44:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3569456},
  doi          = {10.1145/3569456},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/MaoCLDSKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/TuHKX23,
  author       = {Yazheng Tu and
                  Pengzhou He and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Jiafeng Xie},
  title        = {{LEAP:} Lightweight and Efficient Accelerator for Sparse Polynomial
                  Multiplication of {HQC}},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {31},
  number       = {6},
  pages        = {892--896},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVLSI.2023.3246923},
  doi          = {10.1109/TVLSI.2023.3246923},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/TuHKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socc/LiSTWK23,
  author       = {Chen Li and
                  Suwen Song and
                  Jing Tian and
                  Zhongfeng Wang and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {J{\"{u}}rgen Becker and
                  Andrew Marshall and
                  Tanja Harbaum and
                  Amlan Ganguly and
                  Fahad Siddiqui and
                  Kieran McLaughlin},
  title        = {An Efficient Hardware Design for Fast Implementation of {HQC}},
  booktitle    = {36th {IEEE} International System-on-Chip Conference, {SOCC} 2023,
                  Santa Clara, CA, USA, September 5-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SOCC58585.2023.10257054},
  doi          = {10.1109/SOCC58585.2023.10257054},
  timestamp    = {Tue, 21 Nov 2023 07:48:13 +0100},
  biburl       = {https://dblp.org/rec/conf/socc/LiSTWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/23/KocO23,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Funda {\"{O}}zdemir},
  editor       = {Sedat Akleylek and
                  Besik Dundua},
  title        = {Development of Cryptography since Shannon},
  booktitle    = {Handbook of Formal Analysis and Verification in Cryptography},
  pages        = {1--56},
  publisher    = {{CRC} Press},
  year         = {2023},
  url          = {https://doi.org/10.1201/9781003090052-1},
  doi          = {10.1201/9781003090052-1},
  timestamp    = {Mon, 25 Sep 2023 12:19:41 +0200},
  biburl       = {https://dblp.org/rec/books/crc/23/KocO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-11351,
  author       = {Yao Xin and
                  Guoming Tang and
                  Donglong Chen and
                  Rumin Zhang and
                  Teng Liang and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Versatility-Performance Balanced Hardware Architecture for Scene
                  Text Detection},
  journal      = {CoRR},
  volume       = {abs/2306.11351},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.11351},
  doi          = {10.48550/ARXIV.2306.11351},
  eprinttype    = {arXiv},
  eprint       = {2306.11351},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-11351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-00440,
  author       = {Junhao Huang and
                  Haosong Zhao and
                  Jipeng Zhang and
                  Wangchen Dai and
                  Lu Zhou and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Yet another Improvement of Plantard Arithmetic for Faster Kyber on
                  Low-end 32-bit IoT Devices},
  journal      = {CoRR},
  volume       = {abs/2309.00440},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.00440},
  doi          = {10.48550/ARXIV.2309.00440},
  eprinttype    = {arXiv},
  eprint       = {2309.00440},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-00440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangZZLCKC22,
  author       = {Junhao Huang and
                  Jipeng Zhang and
                  Haosong Zhao and
                  Zhe Liu and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Improved Plantard Arithmetic for Lattice-based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {614--636},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.614-636},
  doi          = {10.46586/TCHES.V2022.I4.614-636},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HuangZZLCKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/XinTCZLCK22,
  author       = {Yao Xin and
                  Guoming Tang and
                  Donglong Chen and
                  Rumin Zhang and
                  Teng Liang and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Versatility-Performance Balanced Hardware Architecture for Scene
                  Text Detection},
  booktitle    = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable
                  Computing {\&} Communications, Digital Twin, Privacy Computing,
                  Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta
                  2022, Haikou, China, December 15-18, 2022},
  pages        = {540--549},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00093},
  doi          = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00093},
  timestamp    = {Fri, 04 Aug 2023 17:34:39 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/XinTCZLCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/MadrigalSLGTWK22,
  author       = {Samira Carolina Oliva Madrigal and
                  G{\"{o}}kay Saldamli and
                  Chen Li and
                  Yue Geng and
                  Jing Tian and
                  Zhongfeng Wang and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Sihem Mesnager and
                  Zhengchun Zhou},
  title        = {Reduction-Free Multiplication for Finite Fields and Polynomial Rings},
  booktitle    = {Arithmetic of Finite Fields - 9th International Workshop, {WAIFI}
                  2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13638},
  pages        = {53--78},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22944-2\_4},
  doi          = {10.1007/978-3-031-22944-2\_4},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/MadrigalSLGTWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzdemirK22,
  author       = {Funda {\"{O}}zdemir and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Development of Cryptography since Shannon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/100},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OzdemirK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangZZ0CKC22,
  author       = {Junhao Huang and
                  Jipeng Zhang and
                  Haosong Zhao and
                  Zhe Liu and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Improved Plantard Arithmetic for Lattice-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/956},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangZZ0CKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Koc20,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Algorithms for Inversion Mod ps\({}^{\mbox{k}}\)},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {6},
  pages        = {907--913},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2020.2970411},
  doi          = {10.1109/TC.2020.2970411},
  timestamp    = {Sat, 11 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Koc20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Koc20,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Stefan Katzenbeisser and
                  Patrick Schaumont},
  title        = {Formidable Challenges in Hardware Implementations of Fully Homomorphic
                  Encryption Functions for Applications in Machine Learning},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in
                  Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November
                  13, 2020},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411504.3421208},
  doi          = {10.1145/3411504.3421208},
  timestamp    = {Tue, 02 Feb 2021 15:35:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Koc20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/GreenVHK20,
  author       = {Sam Green and
                  Craig M. Vineyard and
                  Ryan Helinski and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{RAPDARTS:} Resource-Aware Progressive Differentiable Architecture
                  Search},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9206969},
  doi          = {10.1109/IJCNN48605.2020.9206969},
  timestamp    = {Tue, 06 Oct 2020 15:44:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/GreenVHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PeccerilloBK19,
  author       = {Biagio Peccerillo and
                  Sandro Bartolini and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance
                  library for multi-cores and GPUs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {159--171},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0175-4},
  doi          = {10.1007/S13389-017-0175-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icons2/VineyardGSK19,
  author       = {Craig M. Vineyard and
                  Sam Green and
                  William M. Severa and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Thomas E. Potok and
                  Catherine D. Schuman},
  title        = {Benchmarking Event-Driven Neuromorphic Architectures},
  booktitle    = {Proceedings of the International Conference on Neuromorphic Systems,
                  {ICONS} 2019, Knoxville, Tennessee, USA, July 23-25, 2019},
  pages        = {13:1--13:5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3354265.3354278},
  doi          = {10.1145/3354265.3354278},
  timestamp    = {Tue, 17 Sep 2019 19:16:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icons2/VineyardGSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-08128,
  author       = {Sam Green and
                  Craig M. Vineyard and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Distillation Strategies for Proximal Policy Optimization},
  journal      = {CoRR},
  volume       = {abs/1901.08128},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.08128},
  eprinttype    = {arXiv},
  eprint       = {1901.08128},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-08128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05704,
  author       = {Sam Green and
                  Craig M. Vineyard and
                  Ryan Helinski and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{RAPDARTS:} Resource-Aware Progressive Differentiable Architecture
                  Search},
  journal      = {CoRR},
  volume       = {abs/1911.05704},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.05704},
  eprinttype    = {arXiv},
  eprint       = {1911.05704},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-05704.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SavasK18,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Montgomery inversion},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {201--210},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0161-x},
  doi          = {10.1007/S13389-017-0161-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/SavasK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/DaiCCK18,
  author       = {Wangchen Dai and
                  Donald Donglong Chen and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {FFT-Based McLaughlin's Montgomery Exponentiation without Conditional
                  Selections},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {9},
  pages        = {1301--1314},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2018.2811466},
  doi          = {10.1109/TC.2018.2811466},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/DaiCCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiuLK18,
  author       = {Zhe Liu and
                  Patrick Longa and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Guest Editors' Introduction to the Special Issue on Cryptographic
                  Engineering in a Post-Quantum World: State of the Art Advances},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {11},
  pages        = {1532--1534},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2018.2869611},
  doi          = {10.1109/TC.2018.2869611},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/LiuLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/GreenVK18,
  author       = {Sam Green and
                  Craig M. Vineyard and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Impacts of Mathematical Optimizations on Reinforcement Learning Policy
                  Performance},
  booktitle    = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018,
                  Rio de Janeiro, Brazil, July 8-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IJCNN.2018.8489519},
  doi          = {10.1109/IJCNN.2018.8489519},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/GreenVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/GreenVK18,
  author       = {Sam Green and
                  Craig M. Vineyard and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Mathematical Optimizations for Deep Learning},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {69--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_4},
  doi          = {10.1007/978-3-319-98935-8\_4},
  timestamp    = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/GreenVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/LuoGFLK18,
  author       = {Jieliang Luo and
                  Sam Green and
                  Peter Feghali and
                  George Legrady and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Reinforcement Learning and Trustworthy Autonomy},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {191--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_10},
  doi          = {10.1007/978-3-319-98935-8\_10},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/LuoGFLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/K2018,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Cyber-Physical Systems Security},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8},
  doi          = {10.1007/978-3-319-98935-8},
  isbn         = {978-3-319-98934-1},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/K2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06781,
  author       = {Jieliang Luo and
                  Sam Green and
                  Peter Feghali and
                  George Legrady and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Visual Diagnostics for Deep Reinforcement Learning Policy Development},
  journal      = {CoRR},
  volume       = {abs/1809.06781},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.06781},
  eprinttype    = {arXiv},
  eprint       = {1809.06781},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-06781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/DaiCCK17,
  author       = {Wangchen Dai and
                  Donald Donglong Chen and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {3},
  pages        = {375--388},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2601334},
  doi          = {10.1109/TC.2016.2601334},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/DaiCCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/FernSKC17,
  author       = {Nicole Fern and
                  Ismail San and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Kwang{-}Ting (Tim) Cheng},
  title        = {Hiding Hardware Trojan Communication Channels in Partially Specified
                  SoC Bus Functionality},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {36},
  number       = {9},
  pages        = {1435--1444},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCAD.2016.2638439},
  doi          = {10.1109/TCAD.2016.2638439},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/FernSKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koc17,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A New Algorithm for Inversion mod p\({}^{\mbox{k}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Koc17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChenYCPK16,
  author       = {Donald Donglong Chen and
                  Gavin Xiaoxu Yao and
                  Ray C. C. Cheung and
                  Derek Chi{-}Wai Pao and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parameter Space for the Architecture of FFT-Based Montgomery Modular
                  Multiplication},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {1},
  pages        = {147--160},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2417553},
  doi          = {10.1109/TC.2015.2417553},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/ChenYCPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KizilkaleEK16,
  author       = {Can Kizilkale and
                  {\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {11},
  pages        = {3239--3250},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2016.2543228},
  doi          = {10.1109/TC.2016.2543228},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/KizilkaleEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/LimPK16,
  author       = {Rone Kwei Lim and
                  Linda R. Petzold and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Bitsliced High-Performance {AES-ECB} on GPUs},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {125--133},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_8},
  doi          = {10.1007/978-3-662-49301-4\_8},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/LimPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/FernSKC16,
  author       = {Nicole Fern and
                  Ismail San and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Kwang{-}Ting Cheng},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {Hardware Trojans in incompletely specified on-chip bus systems},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {527--530},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459366/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/FernSKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GreenCK16,
  author       = {Sam Green and
                  Ihsan {\c{C}}i{\c{c}}ek and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Continuous-Time Computational Aspects of Cyber-Physical Security},
  booktitle    = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2016, Santa Barbara, CA, USA, August 16, 2016},
  pages        = {59--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FDTC.2016.19},
  doi          = {10.1109/FDTC.2016.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GreenCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/SanFKC16,
  author       = {Ismail San and
                  Nicole Fern and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Kwang{-}Ting Cheng},
  editor       = {Paolo Ienne and
                  Walid A. Najjar and
                  Jason Helge Anderson and
                  Philip Brisk and
                  Walter Stechele},
  title        = {Trojans modifying soft-processor instruction sequences embedded in
                  {FPGA} bitstreams},
  booktitle    = {26th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/FPL.2016.7577347},
  doi          = {10.1109/FPL.2016.7577347},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/SanFKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2014,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16277-5},
  doi          = {10.1007/978-3-319-16277-5},
  isbn         = {978-3-319-16276-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KizilkaleEK15,
  author       = {Can Kizilkale and
                  {\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KizilkaleEK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/EgeciogluK14,
  author       = {{\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sihem Mesnager and
                  Erkay Savas},
  title        = {Reducing the Complexity of Normal Basis Multiplication},
  booktitle    = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
                  2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9061},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16277-5\_4},
  doi          = {10.1007/978-3-319-16277-5\_4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waifi/EgeciogluK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/Koc14,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {About Open Problems},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_1},
  doi          = {10.1007/978-3-319-10683-0\_1},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/Koc14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/StipcevicK14,
  author       = {Mario Stipcevic and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {True Random Number Generators},
  booktitle    = {Open Problems in Mathematics and Computational Science},
  pages        = {275--315},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0\_12},
  doi          = {10.1007/978-3-319-10683-0\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/StipcevicK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/K2014,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Open Problems in Mathematics and Computational Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10683-0},
  doi          = {10.1007/978-3-319-10683-0},
  isbn         = {978-3-319-10682-3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/K2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EgeciogluK14a,
  author       = {{\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Reducing the Complexity of Normal Basis Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EgeciogluK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Trujillo-OlayaSK12,
  author       = {Vladimir Trujillo{-}Olaya and
                  Timothy Sherwood and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Analysis of performance versus security in hardware realizations of
                  small elliptic curves for lightweight applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {179--188},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0039-x},
  doi          = {10.1007/S13389-012-0039-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Trujillo-OlayaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ValamehrHIKKLS12,
  author       = {Jonathan Valamehr and
                  Ted Huffmire and
                  Cynthia E. Irvine and
                  Ryan Kastner and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Timothy E. Levin and
                  Timothy Sherwood},
  editor       = {David Naccache},
  title        = {A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto
                  Co-processors},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {364--382},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_24},
  doi          = {10.1007/978-3-642-28368-0\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ValamehrHIKKLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/ChenYKC12,
  author       = {Donald Donglong Chen and
                  Gavin Xiaoxu Yao and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Ray C. C. Cheung},
  title        = {Low complexity and hardware-friendly spectral modular multiplication},
  booktitle    = {2012 International Conference on Field-Programmable Technology, {FPT}
                  2012, Seoul, Korea (South), December 10-12, 2012},
  pages        = {368--375},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/FPT.2012.6412162},
  doi          = {10.1109/FPT.2012.6412162},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/ChenYKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Koc11,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Introduction to the \emph{Journal of Cryptographic Engineering}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0007-x},
  doi          = {10.1007/S13389-011-0007-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/Koc11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW11,
  author       = {Scott Contini and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Modular Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {795--798},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_49},
  doi          = {10.1007/978-1-4419-5906-5\_49},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/ContiniKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Koc11,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Montgomery Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {799--803},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_38},
  doi          = {10.1007/978-1-4419-5906-5\_38},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Koc11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/YaoCKM10,
  author       = {Gavin Xiaoxu Yao and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Kim{-}Fung Man},
  editor       = {Jinian Bian and
                  Qiang Zhou and
                  Peter Athanas and
                  Yajun Ha and
                  Kang Zhao},
  title        = {Reconfigurable Number Theoretic Transform architectures for cryptographic
                  applications},
  booktitle    = {Proceedings of the International Conference on Field-Programmable
                  Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing,
                  China},
  pages        = {308--311},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPT.2010.5681440},
  doi          = {10.1109/FPT.2010.5681440},
  timestamp    = {Thu, 01 Feb 2018 14:20:39 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/YaoCKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/CenkKO09,
  author       = {Murat Cenk and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Ferruh {\"{O}}zbudak},
  editor       = {Javier D. Bruguera and
                  Marius Cornea and
                  Debjit Das Sarma and
                  John Harrison},
  title        = {Polynomial Multiplication over Finite Fields Using Field Extensions
                  and Interpolation},
  booktitle    = {19th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2009, Portland,
                  Oregon, USA, 9-10 June 2009},
  pages        = {84--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARITH.2009.11},
  doi          = {10.1109/ARITH.2009.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/CenkKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/CheungKV09,
  author       = {Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  John D. Villasenor},
  title        = {A High-Performance Hardware Architecture for Spectral Hash Algorithm},
  booktitle    = {20th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2009, July 7-9, 2009, Boston,
                  MA, {USA}},
  pages        = {215--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ASAP.2009.31},
  doi          = {10.1109/ASAP.2009.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/CheungKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Koc09,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {About Cryptographic Engineering},
  booktitle    = {Cryptographic Engineering},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_1},
  doi          = {10.1007/978-0-387-71817-0\_1},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Koc09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/ErdemYK09,
  author       = {Serdar S{\"{u}}er Erdem and
                  Tugrul Yanik and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Fast Finite Field Multiplication},
  booktitle    = {Cryptographic Engineering},
  pages        = {75--104},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_5},
  doi          = {10.1007/978-0-387-71817-0\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/ErdemYK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SavasK09,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Efficient Unified Arithmetic for Hardware Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {105--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_6},
  doi          = {10.1007/978-0-387-71817-0\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SaldamliK09,
  author       = {G{\"{o}}kay Saldamli and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Spectral Modular Arithmetic for Cryptography},
  booktitle    = {Cryptographic Engineering},
  pages        = {125--169},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_7},
  doi          = {10.1007/978-0-387-71817-0\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/SaldamliK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/AcicmezK09,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Microarchitectural Attacks and Countermeasures},
  booktitle    = {Cryptographic Engineering},
  pages        = {475--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_18},
  doi          = {10.1007/978-0-387-71817-0\_18},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/AcicmezK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Koc2009,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Cryptographic Engineering},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0},
  doi          = {10.1007/978-0-387-71817-0},
  isbn         = {978-0-387-71816-3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Koc2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK08,
  author       = {Min{-}Ho Kim and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Improving the Novikov and Kiselev User Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {241--245},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p241-245.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/KimK08,
  author       = {Minho Kim and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Secure Hash-Based Strong-Password Authentication Protocol Using
                  One-Time Public-Key Cryptography},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {4},
  pages        = {1213--1227},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_14.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/KimK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/YavuzYK08,
  author       = {Ilker Yavuz and
                  Siddika Berna {\"{O}}rs Yal{\c{c}}in and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{FPGA} Implementation of an Elliptic Curve Cryptosystem over GF(3{\^{}}m)},
  booktitle    = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
                  and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages        = {397--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ReConFig.2008.66},
  doi          = {10.1109/RECONFIG.2008.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/YavuzYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2008,
  editor       = {Joachim von zur Gathen and
                  Jos{\'{e}} Luis Ima{\~{n}}a and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008,
                  Siena, Italy, July 6-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5130},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69499-1},
  doi          = {10.1007/978-3-540-69499-1},
  isbn         = {978-3-540-69498-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AcucmezSK07,
  author       = {Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Micro-Architectural Cryptanalysis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {4},
  pages        = {62--64},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.91},
  doi          = {10.1109/MSP.2007.91},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AcucmezSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK07,
  author       = {Minho Kim and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {235--239},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p235-239.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/SaldamliK07,
  author       = {G{\"{o}}kay Saldamli and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Spectral Modular Exponentiation},
  booktitle    = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
                  June 2007, Montpellier, France},
  pages        = {123--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARITH.2007.34},
  doi          = {10.1109/ARITH.2007.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/SaldamliK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezKS07,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Jean{-}Pierre Seifert},
  editor       = {Masayuki Abe},
  title        = {Predicting Secret Keys Via Branch Prediction},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_15},
  doi          = {10.1007/11967668\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AciicmezKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezSK07,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Masayuki Abe},
  title        = {Cache Based Remote Timing Attack on the {AES}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_18},
  doi          = {10.1007/11967668\_18},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AciicmezSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AciicmezK06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Trace-Driven Cache Attacks on {AES} (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_9},
  doi          = {10.1007/11935308\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AciicmezK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezK06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Trace-Driven Cache Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezSK06,
  author       = {Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Predicting Secret Keys via Branch Prediction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezKS06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Jean{-}Pierre Seifert},
  title        = {On the Power of Simple Branch Prediction Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK05,
  author       = {Minho Kim and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Simple Attack on a Recently Introduced Hash-based Strong-password
                  Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {1},
  number       = {2},
  pages        = {77--80},
  year         = {2005},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p77-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AciicmezSK05,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {139--146},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102140},
  doi          = {10.1145/1102120.1102140},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AciicmezSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW05,
  author       = {Scott Contini and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg},
  title        = {Modular Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_259},
  doi          = {10.1007/0-387-23483-7\_259},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/ContiniKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/KocW05,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Colin D. Walter},
  editor       = {Henk C. A. van Tilborg},
  title        = {Montgomery Arithmetic},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_263},
  doi          = {10.1007/0-387-23483-7\_263},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/KocW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/WollingerPWPSK04,
  author       = {Thomas J. Wollinger and
                  Jan Pelzl and
                  Volker Wittelsberger and
                  Christof Paar and
                  G{\"{o}}kay Saldamli and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Elliptic and hyperelliptic curves on embedded {\(\mathrm{\mu}\)}P},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {3},
  pages        = {509--533},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015047.1015051},
  doi          = {10.1145/1015047.1015051},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/WollingerPWPSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeviCK04,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Use of nested certificates for efficient, dynamic, and trust preserving
                  public key infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {21--59},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984336},
  doi          = {10.1145/984334.984336},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeviCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/LeviCAKC04,
  author       = {Albert Levi and
                  Erhan {\c{C}}etintas and
                  Murat Aydos and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Cevdet Aykanat and
                  Tugrul Dayar and
                  Ibrahim Korpeoglu},
  title        = {Relay Attacks on Bluetooth Authentication and Solutions},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2004, 19th International
                  Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3280},
  pages        = {278--288},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30182-0\_29},
  doi          = {10.1007/978-3-540-30182-0\_29},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/LeviCAKC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KocP03,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Guest Editors' Introduction to the Special Section on Cryptographic
                  Hardware and Embedded Systems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {401--402},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190580},
  doi          = {10.1109/TC.2003.1190580},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/KocP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TencaK03,
  author       = {Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Scalable Architecture for Modular Multiplication Based on Montgomery's
                  Algorithm},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {9},
  pages        = {1215--1221},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1228516},
  doi          = {10.1109/TC.2003.1228516},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/TencaK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SunarSK03,
  author       = {Berk Sunar and
                  Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Constructing Composite Field Representations for Efficient Conversion},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {11},
  pages        = {1391--1398},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1244937},
  doi          = {10.1109/TC.2003.1244937},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SunarSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Rodriguez-HenriquezK03,
  author       = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel Multipliers Based on Special Irreducible Pentanomials},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {12},
  pages        = {1535--1542},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1252850},
  doi          = {10.1109/TC.2003.1252850},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Rodriguez-HenriquezK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/ErdemK03,
  author       = {Serdar S{\"{u}}er Erdem and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying
                  Operands of Size a Power of Two},
  booktitle    = {16th {IEEE} Symposium on Computer Arithmetic (Arith-16 2003), 15-18
                  June 2003, Santiago de Compostela, Spain},
  pages        = {28},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ARITH.2003.1207657},
  doi          = {10.1109/ARITH.2003.1207657},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/ErdemK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/DykeK03,
  author       = {Colin Van Dyke and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {On Ubiquitous Network Security and Anomaly Detection},
  booktitle    = {2003 Symposium on Applications and the Internet Workshops {(SAINT}
                  2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings},
  pages        = {374--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SAINTW.2003.1210189},
  doi          = {10.1109/SAINTW.2003.1210189},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/DykeK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36400-5},
  doi          = {10.1007/3-540-36400-5},
  isbn         = {3-540-00409-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6},
  doi          = {10.1007/978-3-540-45238-6},
  isbn         = {3-540-40833-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GutubTSK02,
  author       = {Adnan Abdul{-}Aziz Gutub and
                  Alexandre F. Tenca and
                  Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p)
                  and {GF(2)}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {484--499},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_35},
  doi          = {10.1007/3-540-36400-5\_35},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GutubTSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/SavasK02,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Architectures for unified field inversion with applications in elliptic
                  curve cryptography},
  booktitle    = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics,
                  Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September
                  15-18, 2002},
  pages        = {1155--1158},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICECS.2002.1046457},
  doi          = {10.1109/ICECS.2002.1046457},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/SavasK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/GutubTK02,
  author       = {Adnan Abdul{-}Aziz Gutub and
                  Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Scalable {VLSI} Architecture for GF(p) Montgomery Modular Inverse
                  Computation},
  booktitle    = {2002 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI}
                  2002), 25-26 April 2002, Pittsburgh, PA, {USA}},
  pages        = {53--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ISVLSI.2002.1016874},
  doi          = {10.1109/ISVLSI.2002.1016874},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/GutubTK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LeviK01,
  author       = {Albert Levi and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Risks in email security},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {8},
  pages        = {112},
  year         = {2001},
  url          = {https://doi.org/10.1145/381641.381666},
  doi          = {10.1145/381641.381666},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/LeviK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SunarK01,
  author       = {Berk Sunar and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {An Efficient Optimal Normal Basis Type {II} Multiplier},
  journal      = {{IEEE} Trans. Computers},
  volume       = {50},
  number       = {1},
  pages        = {83--87},
  year         = {2001},
  url          = {https://doi.org/10.1109/12.902754},
  doi          = {10.1109/12.902754},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SunarK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeviK01,
  author       = {Albert Levi and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {{CONSEPP:} CONvenient and Secure Electronic Payment Protocol Based
                  on {X9.59}},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {286--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991544},
  doi          = {10.1109/ACSAC.2001.991544},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LeviK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasSK01,
  author       = {Erkay Savas and
                  Thomas A. Schmidt and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Generating Elliptic Curves of Prime Order},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_13},
  doi          = {10.1007/3-540-44709-1\_13},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SavasSK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TencaTK01,
  author       = {Alexandre F. Tenca and
                  Georgi Todorov and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {High-Radix Design of a Scalable Modular Multiplier},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_17},
  doi          = {10.1007/3-540-44709-1\_17},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TencaTK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LeviK01,
  author       = {Albert Levi and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Reducing Certificate Revocating Cost using {NPKI}},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {51--60},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LeviK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1},
  doi          = {10.1007/3-540-44709-1},
  isbn         = {3-540-42521-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HalbutogullariK00,
  author       = {Alper Halbutogullari and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel Multiplication in using Polynomial Residue Arithmetic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {20},
  number       = {2},
  pages        = {155--173},
  year         = {2000},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HalbutogullariK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HalbutogullariK00,
  author       = {Alper Halbutogullari and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Mastrovito Multiplier for General Irreducible Polynomials},
  journal      = {{IEEE} Trans. Computers},
  volume       = {49},
  number       = {5},
  pages        = {503--518},
  year         = {2000},
  url          = {https://doi.org/10.1109/12.859542},
  doi          = {10.1109/12.859542},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/HalbutogullariK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SavasK00,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {The Montgomery Modular Inverse-Revisited},
  journal      = {{IEEE} Trans. Computers},
  volume       = {49},
  number       = {7},
  pages        = {763--766},
  year         = {2000},
  url          = {https://doi.org/10.1109/12.863048},
  doi          = {10.1109/12.863048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SavasK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AydosYK00,
  author       = {Murat Aydos and
                  Tugrul Yanik and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {An High-Speed ECC-based Wireless Authentication Protocol on an {ARM}
                  Microprocessor},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {401--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898895},
  doi          = {10.1109/ACSAC.2000.898895},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AydosYK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasTK00,
  author       = {Erkay Savas and
                  Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p})
                  and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_22},
  doi          = {10.1007/3-540-44499-8\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SavasTK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8},
  doi          = {10.1007/3-540-44499-8},
  isbn         = {3-540-41455-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SunarK99,
  author       = {Berk Sunar and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Mastrovito Multiplier for All Trinomials},
  journal      = {{IEEE} Trans. Computers},
  volume       = {48},
  number       = {5},
  pages        = {522--527},
  year         = {1999},
  url          = {https://doi.org/10.1109/12.769434},
  doi          = {10.1109/12.769434},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/SunarK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/HalbutogullariK99,
  author       = {Alper Halbutogullari and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Marc P. C. Fossorier and
                  Hideki Imai and
                  Shu Lin and
                  Alain Poli},
  title        = {Mastrovito Multiplier for General Irreducible Polynomials},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November
                  15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1719},
  pages        = {498--507},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46796-3\_48},
  doi          = {10.1007/3-540-46796-3\_48},
  timestamp    = {Thu, 10 Sep 2020 17:39:08 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/HalbutogullariK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TencaK99,
  author       = {Alexandre F. Tenca and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Scalable Architecture for Montgomery Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_10},
  doi          = {10.1007/3-540-48059-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TencaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5},
  doi          = {10.1007/3-540-48059-5},
  isbn         = {3-540-66646-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KocA98,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Tolga Acar},
  title        = {Montgomery Multplication in GF(2\({}^{\mbox{k}}\))},
  journal      = {Des. Codes Cryptogr.},
  volume       = {14},
  number       = {1},
  pages        = {57--69},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008208521515},
  doi          = {10.1023/A:1008208521515},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KocA98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KocS98,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Berk Sunar},
  title        = {Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers
                  for a Class of Finite Fields},
  journal      = {{IEEE} Trans. Computers},
  volume       = {47},
  number       = {3},
  pages        = {353--356},
  year         = {1998},
  url          = {https://doi.org/10.1109/12.660172},
  doi          = {10.1109/12.660172},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/KocS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsi/PennathurSKG98,
  author       = {Subramaniam Pennathur and
                  Can K. Sandalci and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Stephen M. Goodnick},
  title        = {3D Parallel Monte Carlo Simulation of GaAs MESFETs},
  journal      = {{VLSI} Design},
  volume       = {6},
  number       = {1-4},
  pages        = {273--276},
  year         = {1998},
  url          = {https://doi.org/10.1155/1998/64531},
  doi          = {10.1155/1998/64531},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsi/PennathurSKG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/KocI97,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Mustafa Murat Inceoglu},
  title        = {A Parallel algorithm for principal nth roots of matrices},
  journal      = {Autom.},
  volume       = {33},
  number       = {9},
  pages        = {1735--1738},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0005-1098(97)00067-8},
  doi          = {10.1016/S0005-1098(97)00067-8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/KocI97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/BakkalogluEK97,
  author       = {Bertan Bakkaloglu and
                  Kayhan Erciyes and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Parllelization of Parlett's Algorithm for Functions of Triangular
                  Matrices},
  journal      = {Parallel Algorithms Appl.},
  volume       = {11},
  number       = {1-2},
  pages        = {61--69},
  year         = {1997},
  url          = {https://doi.org/10.1080/10637199708915587},
  doi          = {10.1080/10637199708915587},
  timestamp    = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/BakkalogluEK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/Koc97,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel p-Adic Method for Solving Linear Systems of Equations},
  journal      = {Parallel Comput.},
  volume       = {23},
  number       = {13},
  pages        = {2067--2074},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0167-8191(97)00062-8},
  doi          = {10.1016/S0167-8191(97)00062-8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/Koc97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/KocA97,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Tolga Acar},
  title        = {Fast Software Exponentiation in GF(2{\^{}}k)},
  booktitle    = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997,
                  Asilomar, CA, {USA}},
  pages        = {225},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ARITH.1997.614899},
  doi          = {10.1109/ARITH.1997.614899},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/KocA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/KocAK96,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Tolga Acar and
                  Burton S. Kaliski Jr.},
  title        = {Analyzing and comparing Montgomery multiplication algorithms},
  journal      = {{IEEE} Micro},
  volume       = {16},
  number       = {3},
  pages        = {26--33},
  year         = {1996},
  url          = {https://doi.org/10.1109/40.502403},
  doi          = {10.1109/40.502403},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/micro/KocAK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/KocB95,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Bertan Bakkaloglu},
  title        = {Halley's method for the matrix sector function},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {40},
  number       = {5},
  pages        = {944--949},
  year         = {1995},
  url          = {https://doi.org/10.1109/9.384237},
  doi          = {10.1109/9.384237},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/KocB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/KocGB94,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  A. G{\"{u}}ven{\c{c}} and
                  Bertan Bakkaloglu},
  title        = {Exact Solution of Linear Equations on Distributed-memory Multiprocessors},
  journal      = {Parallel Algorithms Appl.},
  volume       = {3},
  number       = {1-2},
  pages        = {135--143},
  year         = {1994},
  url          = {https://doi.org/10.1080/10637199408962531},
  doi          = {10.1080/10637199408962531},
  timestamp    = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/KocGB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/KocBS94,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Bertan Bakkaloglu and
                  Leang{-}San Shieh},
  title        = {Computation of the matrix sign function using continued fraction expansion},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {39},
  number       = {8},
  pages        = {1644--1647},
  year         = {1994},
  url          = {https://doi.org/10.1109/9.310041},
  doi          = {10.1109/9.310041},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/KocBS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/EgeciogluK94,
  author       = {{\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Exponentiation Using Canonical Recoding},
  journal      = {Theor. Comput. Sci.},
  volume       = {129},
  number       = {2},
  pages        = {407--417},
  year         = {1994},
  url          = {https://doi.org/10.1016/0304-3975(94)90037-X},
  doi          = {10.1016/0304-3975(94)90037-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/EgeciogluK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/KocC93,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Peter R. Cappello},
  title        = {Systolic Arrays for Integer Chinese Remaindering},
  journal      = {Parallel Comput.},
  volume       = {19},
  number       = {11},
  pages        = {1303--1311},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-8191(93)90033-H},
  doi          = {10.1016/0167-8191(93)90033-H},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/KocC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/EgeciogluK92,
  author       = {{\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A parallel algorithm for generating discrete orthogonal polynomials},
  journal      = {Parallel Comput.},
  volume       = {18},
  number       = {6},
  pages        = {649--659},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-8191(92)90005-R},
  doi          = {10.1016/0167-8191(92)90005-R},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/EgeciogluK92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/KocCG91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Peter R. Cappello and
                  Efstratios Gallopoulos},
  title        = {Decomposing polynomial interpolation for systolic arrays},
  journal      = {Int. J. Comput. Math.},
  volume       = {38},
  number       = {3-4},
  pages        = {291--239},
  year         = {1991},
  url          = {https://doi.org/10.1080/00207169108803971},
  doi          = {10.1080/00207169108803971},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcm/KocCG91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/KocC91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Guanrong Chen},
  title        = {Parallel algorithms for nevanlinna-pick interpolation: the scalar
                  case},
  journal      = {Int. J. Comput. Math.},
  volume       = {40},
  number       = {1-2},
  pages        = {99--115},
  year         = {1991},
  url          = {https://doi.org/10.1080/00207169108804005},
  doi          = {10.1080/00207169108804005},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcm/KocC91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Koc91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {High-radix and bit recoding techniques for modular exponentiation},
  journal      = {Int. J. Comput. Math.},
  volume       = {40},
  number       = {3-4},
  pages        = {139--156},
  year         = {1991},
  url          = {https://doi.org/10.1080/00207169108804009},
  doi          = {10.1080/00207169108804009},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcm/Koc91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/KocA91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Sarath N. Arachchige},
  title        = {A Fast Algorithm for Gaussian Elimination over {GF(2)} and Its Implementation
                  on the {GAPP}},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {13},
  number       = {1},
  pages        = {118--122},
  year         = {1991},
  url          = {https://doi.org/10.1016/0743-7315(91)90115-P},
  doi          = {10.1016/0743-7315(91)90115-P},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/KocA91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trob/KocCL91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Po Rong Chang and
                  C. S. G. Lee},
  title        = {Comments on 'Residue arithmetic {VLSI} array architecture for manipulator
                  pseudo-inverse Jacobian computation' [with reply]},
  journal      = {{IEEE} Trans. Robotics Autom.},
  volume       = {7},
  number       = {5},
  pages        = {715--717},
  year         = {1991},
  url          = {https://doi.org/10.1109/70.97885},
  doi          = {10.1109/70.97885},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/trob/KocCL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/KocH91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Ching Yu Hung},
  title        = {Bit-level systolic arrays for modular multiplication},
  journal      = {J. {VLSI} Signal Process.},
  volume       = {3},
  number       = {3},
  pages        = {215--223},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00925832},
  doi          = {10.1007/BF00925832},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/KocH91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/KocP91,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Rose Marie Piedra},
  title        = {A Parallel Algorithm for Exact Solution of Linear Equations},
  booktitle    = {Proceedings of the International Conference on Parallel Processing,
                  {ICPP} '91, Austin, Texas, USA, August 1991. Volume {III:} Algorithms
                  and Applications},
  pages        = {1--8},
  publisher    = {{CRC} Press},
  year         = {1991},
  timestamp    = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/KocP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/CappelloGK90,
  author       = {Peter R. Cappello and
                  Efstratios Gallopoulos and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Systolic computation of interpolating polynomials},
  journal      = {Computing},
  volume       = {45},
  number       = {2},
  pages        = {95--117},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF02247877},
  doi          = {10.1007/BF02247877},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computing/CappelloGK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/EgeciogluGK89,
  author       = {{\"{O}}mer Egecioglu and
                  Efstratios Gallopoulos and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel Hermite interpolation: An algebraic approach},
  journal      = {Computing},
  volume       = {42},
  number       = {4},
  pages        = {291--307},
  year         = {1989},
  url          = {https://doi.org/10.1007/BF02243225},
  doi          = {10.1007/BF02243225},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computing/EgeciogluGK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/EgeciogluGK89,
  author       = {{\"{O}}mer Egecioglu and
                  Efstratios Gallopoulos and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Fast computation of divided differences and parallel hermite interpolation},
  journal      = {J. Complex.},
  volume       = {5},
  number       = {4},
  pages        = {417--437},
  year         = {1989},
  url          = {https://doi.org/10.1016/0885-064X(89)90018-6},
  doi          = {10.1016/0885-064X(89)90018-6},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/EgeciogluGK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/KocO89,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  P. F. Ordung},
  title        = {Schwarz-Christoffel transformation for the simulation of two-dimensional
                  capacitance {[VLSI} circuits]},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {8},
  number       = {9},
  pages        = {1025--1027},
  year         = {1989},
  url          = {https://doi.org/10.1109/43.35556},
  doi          = {10.1109/43.35556},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/KocO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/KocC89,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Peter R. Cappello},
  title        = {Systolic arrays for integer Chinese remaindering},
  booktitle    = {9th Symposium on Computer Arithmetic, {ARITH} 1989, Santa Monica,
                  CA, USA, September 6-8, 1989},
  pages        = {216--223},
  publisher    = {{IEEE}},
  year         = {1989},
  url          = {https://doi.org/10.1109/ARITH.1989.72829},
  doi          = {10.1109/ARITH.1989.72829},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/arith/KocC89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/Koc89,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A fast algorithm for mixed-radix conversion in residue arithmetic},
  booktitle    = {Computer Design: {VLSI} in Computers and Processors, {ICCD} 1989.
                  Proceedings., 1989 {IEEE} International Conference on, Cambridge,
                  MA, USA, October 2-4, 1989},
  pages        = {18--21},
  publisher    = {{IEEE}},
  year         = {1989},
  url          = {https://doi.org/10.1109/ICCD.1989.63320},
  doi          = {10.1109/ICCD.1989.63320},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/Koc89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3p/EgeciogluKL88,
  author       = {{\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Alan J. Laub},
  editor       = {Geoffrey C. Fox},
  title        = {Prefix algorithms for tridiagonal systems on hypercube multiprocessors},
  booktitle    = {Proceedings of the Third Conference on Hypercube Concurrent Computers
                  and Applications - Architecture, Software, Computer Systems, and General
                  Issues, C{\({^3}\)}P, Pasadena, California, USA, January 19-20, 1988},
  pages        = {1539--1545},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/63047.63112},
  doi          = {10.1145/63047.63112},
  timestamp    = {Fri, 29 Apr 2022 13:57:54 +0200},
  biburl       = {https://dblp.org/rec/conf/c3p/EgeciogluKL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/CappelloDGKS86,
  author       = {Peter R. Cappello and
                  Grant A. Davidson and
                  Allen Gersho and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  V. Srinivasa Somayazulu},
  title        = {A systolic vector quantization processor for real-time speech coding},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing,
                  {ICASSP} 1986, Tokyo, Japan, April 7-11, 1986},
  pages        = {2143--2146},
  publisher    = {{IEEE}},
  year         = {1986},
  url          = {https://doi.org/10.1109/ICASSP.1986.1168642},
  doi          = {10.1109/ICASSP.1986.1168642},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/CappelloDGKS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics