Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Çetin Kaya Koç
@article{DBLP:journals/tches/HuangAZDLCKC24, author = {Junhao Huang and Alexandre Adomnicai and Jipeng Zhang and Wangchen Dai and Yao Liu and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Revisiting Keccak and Dilithium Implementations on ARMv7-M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {1--24}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.1-24}, doi = {10.46586/TCHES.V2024.I2.1-24}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HuangAZDLCKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HeMKBX24, author = {Pengzhou He and Samira Carolina Oliva Madrigal and {\c{C}}etin Kaya Ko{\c{c}} and Tianyou Bao and Jiafeng Xie}, title = {{CASA:} {A} Compact and Scalable Accelerator for Approximate Homomorphic Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {451--480}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.451-480}, doi = {10.46586/TCHES.V2024.I2.451-480}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HeMKBX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cal/HeTKX23, author = {Pengzhou He and Yazheng Tu and {\c{C}}etin Kaya Ko{\c{c}} and Jiafeng Xie}, title = {Hardware-Implemented Lightweight Accelerator for Large Integer Polynomial Multiplication}, journal = {{IEEE} Comput. Archit. Lett.}, volume = {22}, number = {1}, pages = {57--60}, year = {2023}, url = {https://doi.org/10.1109/LCA.2023.3274931}, doi = {10.1109/LCA.2023.3274931}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cal/HeTKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/MaoCLDSKC23, author = {Gaoyu Mao and Donglong Chen and Guangyan Li and Wangchen Dai and Abdurrashid Ibrahim Sanka and {\c{C}}etin Kaya Ko{\c{c}} and Ray C. C. Cheung}, title = {High-performance and Configurable {SW/HW} Co-design of Post-quantum Signature CRYSTALS-Dilithium}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {16}, number = {3}, pages = {44:1--44:28}, year = {2023}, url = {https://doi.org/10.1145/3569456}, doi = {10.1145/3569456}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/MaoCLDSKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/TuHKX23, author = {Yazheng Tu and Pengzhou He and {\c{C}}etin Kaya Ko{\c{c}} and Jiafeng Xie}, title = {{LEAP:} Lightweight and Efficient Accelerator for Sparse Polynomial Multiplication of {HQC}}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {31}, number = {6}, pages = {892--896}, year = {2023}, url = {https://doi.org/10.1109/TVLSI.2023.3246923}, doi = {10.1109/TVLSI.2023.3246923}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/TuHKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socc/LiSTWK23, author = {Chen Li and Suwen Song and Jing Tian and Zhongfeng Wang and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {J{\"{u}}rgen Becker and Andrew Marshall and Tanja Harbaum and Amlan Ganguly and Fahad Siddiqui and Kieran McLaughlin}, title = {An Efficient Hardware Design for Fast Implementation of {HQC}}, booktitle = {36th {IEEE} International System-on-Chip Conference, {SOCC} 2023, Santa Clara, CA, USA, September 5-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SOCC58585.2023.10257054}, doi = {10.1109/SOCC58585.2023.10257054}, timestamp = {Tue, 21 Nov 2023 07:48:13 +0100}, biburl = {https://dblp.org/rec/conf/socc/LiSTWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/23/KocO23, author = {{\c{C}}etin Kaya Ko{\c{c}} and Funda {\"{O}}zdemir}, editor = {Sedat Akleylek and Besik Dundua}, title = {Development of Cryptography since Shannon}, booktitle = {Handbook of Formal Analysis and Verification in Cryptography}, pages = {1--56}, publisher = {{CRC} Press}, year = {2023}, url = {https://doi.org/10.1201/9781003090052-1}, doi = {10.1201/9781003090052-1}, timestamp = {Mon, 25 Sep 2023 12:19:41 +0200}, biburl = {https://dblp.org/rec/books/crc/23/KocO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-11351, author = {Yao Xin and Guoming Tang and Donglong Chen and Rumin Zhang and Teng Liang and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection}, journal = {CoRR}, volume = {abs/2306.11351}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.11351}, doi = {10.48550/ARXIV.2306.11351}, eprinttype = {arXiv}, eprint = {2306.11351}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-11351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-00440, author = {Junhao Huang and Haosong Zhao and Jipeng Zhang and Wangchen Dai and Lu Zhou and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices}, journal = {CoRR}, volume = {abs/2309.00440}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.00440}, doi = {10.48550/ARXIV.2309.00440}, eprinttype = {arXiv}, eprint = {2309.00440}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-00440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangZZLCKC22, author = {Junhao Huang and Jipeng Zhang and Haosong Zhao and Zhe Liu and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Improved Plantard Arithmetic for Lattice-based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {614--636}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.614-636}, doi = {10.46586/TCHES.V2022.I4.614-636}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HuangZZLCKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/XinTCZLCK22, author = {Yao Xin and Guoming Tang and Donglong Chen and Rumin Zhang and Teng Liang and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection}, booktitle = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable Computing {\&} Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022}, pages = {540--549}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00093}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00093}, timestamp = {Fri, 04 Aug 2023 17:34:39 +0200}, biburl = {https://dblp.org/rec/conf/uic/XinTCZLCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/MadrigalSLGTWK22, author = {Samira Carolina Oliva Madrigal and G{\"{o}}kay Saldamli and Chen Li and Yue Geng and Jing Tian and Zhongfeng Wang and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Sihem Mesnager and Zhengchun Zhou}, title = {Reduction-Free Multiplication for Finite Fields and Polynomial Rings}, booktitle = {Arithmetic of Finite Fields - 9th International Workshop, {WAIFI} 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13638}, pages = {53--78}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22944-2\_4}, doi = {10.1007/978-3-031-22944-2\_4}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/MadrigalSLGTWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzdemirK22, author = {Funda {\"{O}}zdemir and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Development of Cryptography since Shannon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2022}, url = {https://eprint.iacr.org/2022/100}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OzdemirK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangZZ0CKC22, author = {Junhao Huang and Jipeng Zhang and Haosong Zhao and Zhe Liu and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Improved Plantard Arithmetic for Lattice-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2022}, url = {https://eprint.iacr.org/2022/956}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangZZ0CKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Koc20, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Algorithms for Inversion Mod ps\({}^{\mbox{k}}\)}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {6}, pages = {907--913}, year = {2020}, url = {https://doi.org/10.1109/TC.2020.2970411}, doi = {10.1109/TC.2020.2970411}, timestamp = {Sat, 11 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Koc20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Koc20, author = {{\c{C}}etin Kaya Ko{\c{c}}}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Patrick Schaumont}, title = {Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning}, booktitle = {Proceedings of the 4th {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020}, pages = {3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411504.3421208}, doi = {10.1145/3411504.3421208}, timestamp = {Tue, 02 Feb 2021 15:35:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Koc20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/GreenVHK20, author = {Sam Green and Craig M. Vineyard and Ryan Helinski and {\c{C}}etin Kaya Ko{\c{c}}}, title = {{RAPDARTS:} Resource-Aware Progressive Differentiable Architecture Search}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9206969}, doi = {10.1109/IJCNN48605.2020.9206969}, timestamp = {Tue, 06 Oct 2020 15:44:04 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/GreenVHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PeccerilloBK19, author = {Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance library for multi-cores and GPUs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {159--171}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0175-4}, doi = {10.1007/S13389-017-0175-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icons2/VineyardGSK19, author = {Craig M. Vineyard and Sam Green and William M. Severa and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Thomas E. Potok and Catherine D. Schuman}, title = {Benchmarking Event-Driven Neuromorphic Architectures}, booktitle = {Proceedings of the International Conference on Neuromorphic Systems, {ICONS} 2019, Knoxville, Tennessee, USA, July 23-25, 2019}, pages = {13:1--13:5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3354265.3354278}, doi = {10.1145/3354265.3354278}, timestamp = {Tue, 17 Sep 2019 19:16:40 +0200}, biburl = {https://dblp.org/rec/conf/icons2/VineyardGSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-08128, author = {Sam Green and Craig M. Vineyard and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Distillation Strategies for Proximal Policy Optimization}, journal = {CoRR}, volume = {abs/1901.08128}, year = {2019}, url = {http://arxiv.org/abs/1901.08128}, eprinttype = {arXiv}, eprint = {1901.08128}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-08128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05704, author = {Sam Green and Craig M. Vineyard and Ryan Helinski and {\c{C}}etin Kaya Ko{\c{c}}}, title = {{RAPDARTS:} Resource-Aware Progressive Differentiable Architecture Search}, journal = {CoRR}, volume = {abs/1911.05704}, year = {2019}, url = {http://arxiv.org/abs/1911.05704}, eprinttype = {arXiv}, eprint = {1911.05704}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05704.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SavasK18, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Montgomery inversion}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {201--210}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0161-x}, doi = {10.1007/S13389-017-0161-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/SavasK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/DaiCCK18, author = {Wangchen Dai and Donald Donglong Chen and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}}}, title = {FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {9}, pages = {1301--1314}, year = {2018}, url = {https://doi.org/10.1109/TC.2018.2811466}, doi = {10.1109/TC.2018.2811466}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/DaiCCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiuLK18, author = {Zhe Liu and Patrick Longa and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {11}, pages = {1532--1534}, year = {2018}, url = {https://doi.org/10.1109/TC.2018.2869611}, doi = {10.1109/TC.2018.2869611}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/LiuLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/GreenVK18, author = {Sam Green and Craig M. Vineyard and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Impacts of Mathematical Optimizations on Reinforcement Learning Policy Performance}, booktitle = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018, Rio de Janeiro, Brazil, July 8-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IJCNN.2018.8489519}, doi = {10.1109/IJCNN.2018.8489519}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/GreenVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/GreenVK18, author = {Sam Green and Craig M. Vineyard and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Mathematical Optimizations for Deep Learning}, booktitle = {Cyber-Physical Systems Security}, pages = {69--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_4}, doi = {10.1007/978-3-319-98935-8\_4}, timestamp = {Fri, 08 Mar 2019 12:57:04 +0100}, biburl = {https://dblp.org/rec/books/sp/18/GreenVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/LuoGFLK18, author = {Jieliang Luo and Sam Green and Peter Feghali and George Legrady and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Reinforcement Learning and Trustworthy Autonomy}, booktitle = {Cyber-Physical Systems Security}, pages = {191--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_10}, doi = {10.1007/978-3-319-98935-8\_10}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/LuoGFLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/K2018, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Cyber-Physical Systems Security}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8}, doi = {10.1007/978-3-319-98935-8}, isbn = {978-3-319-98934-1}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/K2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-06781, author = {Jieliang Luo and Sam Green and Peter Feghali and George Legrady and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Visual Diagnostics for Deep Reinforcement Learning Policy Development}, journal = {CoRR}, volume = {abs/1809.06781}, year = {2018}, url = {http://arxiv.org/abs/1809.06781}, eprinttype = {arXiv}, eprint = {1809.06781}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-06781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/DaiCCK17, author = {Wangchen Dai and Donald Donglong Chen and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {3}, pages = {375--388}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2601334}, doi = {10.1109/TC.2016.2601334}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/DaiCCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/FernSKC17, author = {Nicole Fern and Ismail San and {\c{C}}etin Kaya Ko{\c{c}} and Kwang{-}Ting (Tim) Cheng}, title = {Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {36}, number = {9}, pages = {1435--1444}, year = {2017}, url = {https://doi.org/10.1109/TCAD.2016.2638439}, doi = {10.1109/TCAD.2016.2638439}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/FernSKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koc17, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {A New Algorithm for Inversion mod p\({}^{\mbox{k}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2017}, url = {http://eprint.iacr.org/2017/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Koc17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChenYCPK16, author = {Donald Donglong Chen and Gavin Xiaoxu Yao and Ray C. C. Cheung and Derek Chi{-}Wai Pao and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {1}, pages = {147--160}, year = {2016}, url = {https://doi.org/10.1109/TC.2015.2417553}, doi = {10.1109/TC.2015.2417553}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/ChenYCPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KizilkaleEK16, author = {Can Kizilkale and {\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {11}, pages = {3239--3250}, year = {2016}, url = {https://doi.org/10.1109/TC.2016.2543228}, doi = {10.1109/TC.2016.2543228}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/KizilkaleEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/LimPK16, author = {Rone Kwei Lim and Linda R. Petzold and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Bitsliced High-Performance {AES-ECB} on GPUs}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {125--133}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_8}, doi = {10.1007/978-3-662-49301-4\_8}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/LimPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/FernSKC16, author = {Nicole Fern and Ismail San and {\c{C}}etin Kaya Ko{\c{c}} and Kwang{-}Ting Cheng}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {Hardware Trojans in incompletely specified on-chip bus systems}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {527--530}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459366/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/FernSKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GreenCK16, author = {Sam Green and Ihsan {\c{C}}i{\c{c}}ek and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Continuous-Time Computational Aspects of Cyber-Physical Security}, booktitle = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2016, Santa Barbara, CA, USA, August 16, 2016}, pages = {59--62}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FDTC.2016.19}, doi = {10.1109/FDTC.2016.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GreenCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/SanFKC16, author = {Ismail San and Nicole Fern and {\c{C}}etin Kaya Ko{\c{c}} and Kwang{-}Ting Cheng}, editor = {Paolo Ienne and Walid A. Najjar and Jason Helge Anderson and Philip Brisk and Walter Stechele}, title = {Trojans modifying soft-processor instruction sequences embedded in {FPGA} bitstreams}, booktitle = {26th International Conference on Field Programmable Logic and Applications, {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FPL.2016.7577347}, doi = {10.1109/FPL.2016.7577347}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/SanFKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waifi/2014, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16277-5}, doi = {10.1007/978-3-319-16277-5}, isbn = {978-3-319-16276-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KizilkaleEK15, author = {Can Kizilkale and {\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2015}, url = {http://eprint.iacr.org/2015/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KizilkaleEK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/EgeciogluK14, author = {{\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Sihem Mesnager and Erkay Savas}, title = {Reducing the Complexity of Normal Basis Multiplication}, booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI} 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9061}, pages = {61--80}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16277-5\_4}, doi = {10.1007/978-3-319-16277-5\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waifi/EgeciogluK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/Koc14, author = {{\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {About Open Problems}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {1--4}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_1}, doi = {10.1007/978-3-319-10683-0\_1}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/14/Koc14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/StipcevicK14, author = {Mario Stipcevic and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {True Random Number Generators}, booktitle = {Open Problems in Mathematics and Computational Science}, pages = {275--315}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0\_12}, doi = {10.1007/978-3-319-10683-0\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/14/StipcevicK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/K2014, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Open Problems in Mathematics and Computational Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10683-0}, doi = {10.1007/978-3-319-10683-0}, isbn = {978-3-319-10682-3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/K2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EgeciogluK14a, author = {{\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Reducing the Complexity of Normal Basis Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2014}, url = {http://eprint.iacr.org/2014/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EgeciogluK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Trujillo-OlayaSK12, author = {Vladimir Trujillo{-}Olaya and Timothy Sherwood and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {179--188}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0039-x}, doi = {10.1007/S13389-012-0039-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Trujillo-OlayaSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ValamehrHIKKLS12, author = {Jonathan Valamehr and Ted Huffmire and Cynthia E. Irvine and Ryan Kastner and {\c{C}}etin Kaya Ko{\c{c}} and Timothy E. Levin and Timothy Sherwood}, editor = {David Naccache}, title = {A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {364--382}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_24}, doi = {10.1007/978-3-642-28368-0\_24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ValamehrHIKKLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/ChenYKC12, author = {Donald Donglong Chen and Gavin Xiaoxu Yao and {\c{C}}etin Kaya Ko{\c{c}} and Ray C. C. Cheung}, title = {Low complexity and hardware-friendly spectral modular multiplication}, booktitle = {2012 International Conference on Field-Programmable Technology, {FPT} 2012, Seoul, Korea (South), December 10-12, 2012}, pages = {368--375}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/FPT.2012.6412162}, doi = {10.1109/FPT.2012.6412162}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpt/ChenYKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Koc11, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Introduction to the \emph{Journal of Cryptographic Engineering}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0007-x}, doi = {10.1007/S13389-011-0007-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/Koc11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/ContiniKW11, author = {Scott Contini and {\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Modular Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {795--798}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_49}, doi = {10.1007/978-1-4419-5906-5\_49}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/ContiniKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Koc11, author = {{\c{C}}etin Kaya Ko{\c{c}}}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Montgomery Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {799--803}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_38}, doi = {10.1007/978-1-4419-5906-5\_38}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Koc11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/YaoCKM10, author = {Gavin Xiaoxu Yao and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Kim{-}Fung Man}, editor = {Jinian Bian and Qiang Zhou and Peter Athanas and Yajun Ha and Kang Zhao}, title = {Reconfigurable Number Theoretic Transform architectures for cryptographic applications}, booktitle = {Proceedings of the International Conference on Field-Programmable Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing, China}, pages = {308--311}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/FPT.2010.5681440}, doi = {10.1109/FPT.2010.5681440}, timestamp = {Thu, 01 Feb 2018 14:20:39 +0100}, biburl = {https://dblp.org/rec/conf/fpt/YaoCKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/CenkKO09, author = {Murat Cenk and {\c{C}}etin Kaya Ko{\c{c}} and Ferruh {\"{O}}zbudak}, editor = {Javier D. Bruguera and Marius Cornea and Debjit Das Sarma and John Harrison}, title = {Polynomial Multiplication over Finite Fields Using Field Extensions and Interpolation}, booktitle = {19th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2009, Portland, Oregon, USA, 9-10 June 2009}, pages = {84--91}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARITH.2009.11}, doi = {10.1109/ARITH.2009.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/CenkKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/CheungKV09, author = {Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and John D. Villasenor}, title = {A High-Performance Hardware Architecture for Spectral Hash Algorithm}, booktitle = {20th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2009, July 7-9, 2009, Boston, MA, {USA}}, pages = {215--218}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ASAP.2009.31}, doi = {10.1109/ASAP.2009.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/CheungKV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Koc09, author = {{\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {About Cryptographic Engineering}, booktitle = {Cryptographic Engineering}, pages = {1--4}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_1}, doi = {10.1007/978-0-387-71817-0\_1}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Koc09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/ErdemYK09, author = {Serdar S{\"{u}}er Erdem and Tugrul Yanik and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Fast Finite Field Multiplication}, booktitle = {Cryptographic Engineering}, pages = {75--104}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_5}, doi = {10.1007/978-0-387-71817-0\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/ErdemYK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/SavasK09, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Efficient Unified Arithmetic for Hardware Cryptography}, booktitle = {Cryptographic Engineering}, pages = {105--124}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_6}, doi = {10.1007/978-0-387-71817-0\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/SavasK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/SaldamliK09, author = {G{\"{o}}kay Saldamli and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Spectral Modular Arithmetic for Cryptography}, booktitle = {Cryptographic Engineering}, pages = {125--169}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_7}, doi = {10.1007/978-0-387-71817-0\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/SaldamliK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/AcicmezK09, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Microarchitectural Attacks and Countermeasures}, booktitle = {Cryptographic Engineering}, pages = {475--504}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_18}, doi = {10.1007/978-0-387-71817-0\_18}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/AcicmezK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Koc2009, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Cryptographic Engineering}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0}, doi = {10.1007/978-0-387-71817-0}, isbn = {978-0-387-71816-3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Koc2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimK08, author = {Min{-}Ho Kim and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Improving the Novikov and Kiselev User Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {3}, pages = {241--245}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p241-245.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/KimK08, author = {Minho Kim and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {4}, pages = {1213--1227}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_14.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/KimK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/YavuzYK08, author = {Ilker Yavuz and Siddika Berna {\"{O}}rs Yal{\c{c}}in and {\c{C}}etin Kaya Ko{\c{c}}}, title = {{FPGA} Implementation of an Elliptic Curve Cryptosystem over GF(3{\^{}}m)}, booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings}, pages = {397--402}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ReConFig.2008.66}, doi = {10.1109/RECONFIG.2008.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/YavuzYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waifi/2008, editor = {Joachim von zur Gathen and Jos{\'{e}} Luis Ima{\~{n}}a and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008, Siena, Italy, July 6-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5130}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69499-1}, doi = {10.1007/978-3-540-69499-1}, isbn = {978-3-540-69498-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AcucmezSK07, author = {Onur Acii{\c{c}}mez and Jean{-}Pierre Seifert and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Micro-Architectural Cryptanalysis}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {4}, pages = {62--64}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.91}, doi = {10.1109/MSP.2007.91}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AcucmezSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimK07, author = {Minho Kim and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {235--239}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p235-239.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/SaldamliK07, author = {G{\"{o}}kay Saldamli and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Spectral Modular Exponentiation}, booktitle = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27 June 2007, Montpellier, France}, pages = {123--132}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARITH.2007.34}, doi = {10.1109/ARITH.2007.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/SaldamliK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AciicmezKS07, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}} and Jean{-}Pierre Seifert}, editor = {Masayuki Abe}, title = {Predicting Secret Keys Via Branch Prediction}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {225--242}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_15}, doi = {10.1007/11967668\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AciicmezKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AciicmezSK07, author = {Onur Acii{\c{c}}mez and Werner Schindler and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Masayuki Abe}, title = {Cache Based Remote Timing Attack on the {AES}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {271--286}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_18}, doi = {10.1007/11967668\_18}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AciicmezSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AciicmezK06, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Trace-Driven Cache Attacks on {AES} (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {112--121}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_9}, doi = {10.1007/11935308\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AciicmezK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezK06, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Trace-Driven Cache Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2006}, url = {http://eprint.iacr.org/2006/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezSK06, author = {Onur Acii{\c{c}}mez and Jean{-}Pierre Seifert and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Predicting Secret Keys via Branch Prediction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2006}, url = {http://eprint.iacr.org/2006/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezKS06, author = {Onur Acii{\c{c}}mez and {\c{C}}etin Kaya Ko{\c{c}} and Jean{-}Pierre Seifert}, title = {On the Power of Simple Branch Prediction Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2006}, url = {http://eprint.iacr.org/2006/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimK05, author = {Minho Kim and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {1}, number = {2}, pages = {77--80}, year = {2005}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p77-80.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AciicmezSK05, author = {Onur Acii{\c{c}}mez and Werner Schindler and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {139--146}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102140}, doi = {10.1145/1102120.1102140}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AciicmezSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/ContiniKW05, author = {Scott Contini and {\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg}, title = {Modular Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_259}, doi = {10.1007/0-387-23483-7\_259}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/ContiniKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/KocW05, author = {{\c{C}}etin Kaya Ko{\c{c}} and Colin D. Walter}, editor = {Henk C. A. van Tilborg}, title = {Montgomery Arithmetic}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_263}, doi = {10.1007/0-387-23483-7\_263}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/KocW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/WollingerPWPSK04, author = {Thomas J. Wollinger and Jan Pelzl and Volker Wittelsberger and Christof Paar and G{\"{o}}kay Saldamli and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Elliptic and hyperelliptic curves on embedded {\(\mathrm{\mu}\)}P}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {3}, pages = {509--533}, year = {2004}, url = {https://doi.org/10.1145/1015047.1015051}, doi = {10.1145/1015047.1015051}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/WollingerPWPSK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeviCK04, author = {Albert Levi and M. Ufuk {\c{C}}aglayan and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {21--59}, year = {2004}, url = {https://doi.org/10.1145/984334.984336}, doi = {10.1145/984334.984336}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeviCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/LeviCAKC04, author = {Albert Levi and Erhan {\c{C}}etintas and Murat Aydos and {\c{C}}etin Kaya Ko{\c{c}} and M. Ufuk {\c{C}}aglayan}, editor = {Cevdet Aykanat and Tugrul Dayar and Ibrahim Korpeoglu}, title = {Relay Attacks on Bluetooth Authentication and Solutions}, booktitle = {Computer and Information Sciences - {ISCIS} 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3280}, pages = {278--288}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30182-0\_29}, doi = {10.1007/978-3-540-30182-0\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/LeviCAKC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KocP03, author = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {401--402}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190580}, doi = {10.1109/TC.2003.1190580}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/KocP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TencaK03, author = {Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {9}, pages = {1215--1221}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1228516}, doi = {10.1109/TC.2003.1228516}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/TencaK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SunarSK03, author = {Berk Sunar and Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Constructing Composite Field Representations for Efficient Conversion}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {11}, pages = {1391--1398}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1244937}, doi = {10.1109/TC.2003.1244937}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SunarSK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Rodriguez-HenriquezK03, author = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel Multipliers Based on Special Irreducible Pentanomials}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {12}, pages = {1535--1542}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1252850}, doi = {10.1109/TC.2003.1252850}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Rodriguez-HenriquezK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/ErdemK03, author = {Serdar S{\"{u}}er Erdem and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two}, booktitle = {16th {IEEE} Symposium on Computer Arithmetic (Arith-16 2003), 15-18 June 2003, Santiago de Compostela, Spain}, pages = {28}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ARITH.2003.1207657}, doi = {10.1109/ARITH.2003.1207657}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/ErdemK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/DykeK03, author = {Colin Van Dyke and {\c{C}}etin Kaya Ko{\c{c}}}, title = {On Ubiquitous Network Security and Anomaly Detection}, booktitle = {2003 Symposium on Applications and the Internet Workshops {(SAINT} 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings}, pages = {374--378}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SAINTW.2003.1210189}, doi = {10.1109/SAINTW.2003.1210189}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/DykeK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2002, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36400-5}, doi = {10.1007/3-540-36400-5}, isbn = {3-540-00409-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2003, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6}, doi = {10.1007/978-3-540-45238-6}, isbn = {3-540-40833-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GutubTSK02, author = {Adnan Abdul{-}Aziz Gutub and Alexandre F. Tenca and Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and {GF(2)}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {484--499}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_35}, doi = {10.1007/3-540-36400-5\_35}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GutubTSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/SavasK02, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Architectures for unified field inversion with applications in elliptic curve cryptography}, booktitle = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September 15-18, 2002}, pages = {1155--1158}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICECS.2002.1046457}, doi = {10.1109/ICECS.2002.1046457}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/SavasK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/GutubTK02, author = {Adnan Abdul{-}Aziz Gutub and Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Scalable {VLSI} Architecture for GF(p) Montgomery Modular Inverse Computation}, booktitle = {2002 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI} 2002), 25-26 April 2002, Pittsburgh, PA, {USA}}, pages = {53--58}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ISVLSI.2002.1016874}, doi = {10.1109/ISVLSI.2002.1016874}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/GutubTK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LeviK01, author = {Albert Levi and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Risks in email security}, journal = {Commun. {ACM}}, volume = {44}, number = {8}, pages = {112}, year = {2001}, url = {https://doi.org/10.1145/381641.381666}, doi = {10.1145/381641.381666}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/LeviK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SunarK01, author = {Berk Sunar and {\c{C}}etin Kaya Ko{\c{c}}}, title = {An Efficient Optimal Normal Basis Type {II} Multiplier}, journal = {{IEEE} Trans. Computers}, volume = {50}, number = {1}, pages = {83--87}, year = {2001}, url = {https://doi.org/10.1109/12.902754}, doi = {10.1109/12.902754}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SunarK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeviK01, author = {Albert Levi and {\c{C}}etin Kaya Ko{\c{c}}}, title = {{CONSEPP:} CONvenient and Secure Electronic Payment Protocol Based on {X9.59}}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {286--295}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991544}, doi = {10.1109/ACSAC.2001.991544}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeviK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavasSK01, author = {Erkay Savas and Thomas A. Schmidt and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Generating Elliptic Curves of Prime Order}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {142--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_13}, doi = {10.1007/3-540-44709-1\_13}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SavasSK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TencaTK01, author = {Alexandre F. Tenca and Georgi Todorov and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {High-Radix Design of a Scalable Modular Multiplier}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {185--201}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_17}, doi = {10.1007/3-540-44709-1\_17}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TencaTK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LeviK01, author = {Albert Levi and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Reducing Certificate Revocating Cost using {NPKI}}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {51--60}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/LeviK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2001, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1}, doi = {10.1007/3-540-44709-1}, isbn = {3-540-42521-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HalbutogullariK00, author = {Alper Halbutogullari and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel Multiplication in using Polynomial Residue Arithmetic}, journal = {Des. Codes Cryptogr.}, volume = {20}, number = {2}, pages = {155--173}, year = {2000}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HalbutogullariK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HalbutogullariK00, author = {Alper Halbutogullari and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Mastrovito Multiplier for General Irreducible Polynomials}, journal = {{IEEE} Trans. Computers}, volume = {49}, number = {5}, pages = {503--518}, year = {2000}, url = {https://doi.org/10.1109/12.859542}, doi = {10.1109/12.859542}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/HalbutogullariK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SavasK00, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {The Montgomery Modular Inverse-Revisited}, journal = {{IEEE} Trans. Computers}, volume = {49}, number = {7}, pages = {763--766}, year = {2000}, url = {https://doi.org/10.1109/12.863048}, doi = {10.1109/12.863048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SavasK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AydosYK00, author = {Murat Aydos and Tugrul Yanik and {\c{C}}etin Kaya Ko{\c{c}}}, title = {An High-Speed ECC-based Wireless Authentication Protocol on an {ARM} Microprocessor}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {401--410}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898895}, doi = {10.1109/ACSAC.2000.898895}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AydosYK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavasTK00, author = {Erkay Savas and Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p}) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {277--292}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_22}, doi = {10.1007/3-540-44499-8\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SavasTK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2000, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8}, doi = {10.1007/3-540-44499-8}, isbn = {3-540-41455-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SunarK99, author = {Berk Sunar and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Mastrovito Multiplier for All Trinomials}, journal = {{IEEE} Trans. Computers}, volume = {48}, number = {5}, pages = {522--527}, year = {1999}, url = {https://doi.org/10.1109/12.769434}, doi = {10.1109/12.769434}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/SunarK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/HalbutogullariK99, author = {Alper Halbutogullari and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli}, title = {Mastrovito Multiplier for General Irreducible Polynomials}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1719}, pages = {498--507}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46796-3\_48}, doi = {10.1007/3-540-46796-3\_48}, timestamp = {Thu, 10 Sep 2020 17:39:08 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/HalbutogullariK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TencaK99, author = {Alexandre F. Tenca and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Scalable Architecture for Montgomery Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {94--108}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_10}, doi = {10.1007/3-540-48059-5\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/TencaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/1999, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5}, doi = {10.1007/3-540-48059-5}, isbn = {3-540-66646-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KocA98, author = {{\c{C}}etin Kaya Ko{\c{c}} and Tolga Acar}, title = {Montgomery Multplication in GF(2\({}^{\mbox{k}}\))}, journal = {Des. Codes Cryptogr.}, volume = {14}, number = {1}, pages = {57--69}, year = {1998}, url = {https://doi.org/10.1023/A:1008208521515}, doi = {10.1023/A:1008208521515}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KocA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KocS98, author = {{\c{C}}etin Kaya Ko{\c{c}} and Berk Sunar}, title = {Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields}, journal = {{IEEE} Trans. Computers}, volume = {47}, number = {3}, pages = {353--356}, year = {1998}, url = {https://doi.org/10.1109/12.660172}, doi = {10.1109/12.660172}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/KocS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsi/PennathurSKG98, author = {Subramaniam Pennathur and Can K. Sandalci and {\c{C}}etin Kaya Ko{\c{c}} and Stephen M. Goodnick}, title = {3D Parallel Monte Carlo Simulation of GaAs MESFETs}, journal = {{VLSI} Design}, volume = {6}, number = {1-4}, pages = {273--276}, year = {1998}, url = {https://doi.org/10.1155/1998/64531}, doi = {10.1155/1998/64531}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsi/PennathurSKG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/KocI97, author = {{\c{C}}etin Kaya Ko{\c{c}} and Mustafa Murat Inceoglu}, title = {A Parallel algorithm for principal nth roots of matrices}, journal = {Autom.}, volume = {33}, number = {9}, pages = {1735--1738}, year = {1997}, url = {https://doi.org/10.1016/S0005-1098(97)00067-8}, doi = {10.1016/S0005-1098(97)00067-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/automatica/KocI97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/BakkalogluEK97, author = {Bertan Bakkaloglu and Kayhan Erciyes and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Parllelization of Parlett's Algorithm for Functions of Triangular Matrices}, journal = {Parallel Algorithms Appl.}, volume = {11}, number = {1-2}, pages = {61--69}, year = {1997}, url = {https://doi.org/10.1080/10637199708915587}, doi = {10.1080/10637199708915587}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/BakkalogluEK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/Koc97, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel p-Adic Method for Solving Linear Systems of Equations}, journal = {Parallel Comput.}, volume = {23}, number = {13}, pages = {2067--2074}, year = {1997}, url = {https://doi.org/10.1016/S0167-8191(97)00062-8}, doi = {10.1016/S0167-8191(97)00062-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/Koc97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/KocA97, author = {{\c{C}}etin Kaya Ko{\c{c}} and Tolga Acar}, title = {Fast Software Exponentiation in GF(2{\^{}}k)}, booktitle = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997, Asilomar, CA, {USA}}, pages = {225}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ARITH.1997.614899}, doi = {10.1109/ARITH.1997.614899}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/KocA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/KocAK96, author = {{\c{C}}etin Kaya Ko{\c{c}} and Tolga Acar and Burton S. Kaliski Jr.}, title = {Analyzing and comparing Montgomery multiplication algorithms}, journal = {{IEEE} Micro}, volume = {16}, number = {3}, pages = {26--33}, year = {1996}, url = {https://doi.org/10.1109/40.502403}, doi = {10.1109/40.502403}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/micro/KocAK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/KocB95, author = {{\c{C}}etin Kaya Ko{\c{c}} and Bertan Bakkaloglu}, title = {Halley's method for the matrix sector function}, journal = {{IEEE} Trans. Autom. Control.}, volume = {40}, number = {5}, pages = {944--949}, year = {1995}, url = {https://doi.org/10.1109/9.384237}, doi = {10.1109/9.384237}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tac/KocB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/KocGB94, author = {{\c{C}}etin Kaya Ko{\c{c}} and A. G{\"{u}}ven{\c{c}} and Bertan Bakkaloglu}, title = {Exact Solution of Linear Equations on Distributed-memory Multiprocessors}, journal = {Parallel Algorithms Appl.}, volume = {3}, number = {1-2}, pages = {135--143}, year = {1994}, url = {https://doi.org/10.1080/10637199408962531}, doi = {10.1080/10637199408962531}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/KocGB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/KocBS94, author = {{\c{C}}etin Kaya Ko{\c{c}} and Bertan Bakkaloglu and Leang{-}San Shieh}, title = {Computation of the matrix sign function using continued fraction expansion}, journal = {{IEEE} Trans. Autom. Control.}, volume = {39}, number = {8}, pages = {1644--1647}, year = {1994}, url = {https://doi.org/10.1109/9.310041}, doi = {10.1109/9.310041}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tac/KocBS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/EgeciogluK94, author = {{\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Exponentiation Using Canonical Recoding}, journal = {Theor. Comput. Sci.}, volume = {129}, number = {2}, pages = {407--417}, year = {1994}, url = {https://doi.org/10.1016/0304-3975(94)90037-X}, doi = {10.1016/0304-3975(94)90037-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/EgeciogluK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/KocC93, author = {{\c{C}}etin Kaya Ko{\c{c}} and Peter R. Cappello}, title = {Systolic Arrays for Integer Chinese Remaindering}, journal = {Parallel Comput.}, volume = {19}, number = {11}, pages = {1303--1311}, year = {1993}, url = {https://doi.org/10.1016/0167-8191(93)90033-H}, doi = {10.1016/0167-8191(93)90033-H}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/KocC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/EgeciogluK92, author = {{\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A parallel algorithm for generating discrete orthogonal polynomials}, journal = {Parallel Comput.}, volume = {18}, number = {6}, pages = {649--659}, year = {1992}, url = {https://doi.org/10.1016/0167-8191(92)90005-R}, doi = {10.1016/0167-8191(92)90005-R}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/EgeciogluK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/KocCG91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Peter R. Cappello and Efstratios Gallopoulos}, title = {Decomposing polynomial interpolation for systolic arrays}, journal = {Int. J. Comput. Math.}, volume = {38}, number = {3-4}, pages = {291--239}, year = {1991}, url = {https://doi.org/10.1080/00207169108803971}, doi = {10.1080/00207169108803971}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcm/KocCG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/KocC91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Guanrong Chen}, title = {Parallel algorithms for nevanlinna-pick interpolation: the scalar case}, journal = {Int. J. Comput. Math.}, volume = {40}, number = {1-2}, pages = {99--115}, year = {1991}, url = {https://doi.org/10.1080/00207169108804005}, doi = {10.1080/00207169108804005}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcm/KocC91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/Koc91, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {High-radix and bit recoding techniques for modular exponentiation}, journal = {Int. J. Comput. Math.}, volume = {40}, number = {3-4}, pages = {139--156}, year = {1991}, url = {https://doi.org/10.1080/00207169108804009}, doi = {10.1080/00207169108804009}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcm/Koc91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/KocA91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Sarath N. Arachchige}, title = {A Fast Algorithm for Gaussian Elimination over {GF(2)} and Its Implementation on the {GAPP}}, journal = {J. Parallel Distributed Comput.}, volume = {13}, number = {1}, pages = {118--122}, year = {1991}, url = {https://doi.org/10.1016/0743-7315(91)90115-P}, doi = {10.1016/0743-7315(91)90115-P}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/KocA91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trob/KocCL91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Po Rong Chang and C. S. G. Lee}, title = {Comments on 'Residue arithmetic {VLSI} array architecture for manipulator pseudo-inverse Jacobian computation' [with reply]}, journal = {{IEEE} Trans. Robotics Autom.}, volume = {7}, number = {5}, pages = {715--717}, year = {1991}, url = {https://doi.org/10.1109/70.97885}, doi = {10.1109/70.97885}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/trob/KocCL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/KocH91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Ching Yu Hung}, title = {Bit-level systolic arrays for modular multiplication}, journal = {J. {VLSI} Signal Process.}, volume = {3}, number = {3}, pages = {215--223}, year = {1991}, url = {https://doi.org/10.1007/BF00925832}, doi = {10.1007/BF00925832}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/KocH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/KocP91, author = {{\c{C}}etin Kaya Ko{\c{c}} and Rose Marie Piedra}, title = {A Parallel Algorithm for Exact Solution of Linear Equations}, booktitle = {Proceedings of the International Conference on Parallel Processing, {ICPP} '91, Austin, Texas, USA, August 1991. Volume {III:} Algorithms and Applications}, pages = {1--8}, publisher = {{CRC} Press}, year = {1991}, timestamp = {Mon, 28 Jul 2014 17:06:01 +0200}, biburl = {https://dblp.org/rec/conf/icpp/KocP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/CappelloGK90, author = {Peter R. Cappello and Efstratios Gallopoulos and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Systolic computation of interpolating polynomials}, journal = {Computing}, volume = {45}, number = {2}, pages = {95--117}, year = {1990}, url = {https://doi.org/10.1007/BF02247877}, doi = {10.1007/BF02247877}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computing/CappelloGK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/EgeciogluGK89, author = {{\"{O}}mer Egecioglu and Efstratios Gallopoulos and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel Hermite interpolation: An algebraic approach}, journal = {Computing}, volume = {42}, number = {4}, pages = {291--307}, year = {1989}, url = {https://doi.org/10.1007/BF02243225}, doi = {10.1007/BF02243225}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computing/EgeciogluGK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/EgeciogluGK89, author = {{\"{O}}mer Egecioglu and Efstratios Gallopoulos and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Fast computation of divided differences and parallel hermite interpolation}, journal = {J. Complex.}, volume = {5}, number = {4}, pages = {417--437}, year = {1989}, url = {https://doi.org/10.1016/0885-064X(89)90018-6}, doi = {10.1016/0885-064X(89)90018-6}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/EgeciogluGK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/KocO89, author = {{\c{C}}etin Kaya Ko{\c{c}} and P. F. Ordung}, title = {Schwarz-Christoffel transformation for the simulation of two-dimensional capacitance {[VLSI} circuits]}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {8}, number = {9}, pages = {1025--1027}, year = {1989}, url = {https://doi.org/10.1109/43.35556}, doi = {10.1109/43.35556}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/KocO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/KocC89, author = {{\c{C}}etin Kaya Ko{\c{c}} and Peter R. Cappello}, title = {Systolic arrays for integer Chinese remaindering}, booktitle = {9th Symposium on Computer Arithmetic, {ARITH} 1989, Santa Monica, CA, USA, September 6-8, 1989}, pages = {216--223}, publisher = {{IEEE}}, year = {1989}, url = {https://doi.org/10.1109/ARITH.1989.72829}, doi = {10.1109/ARITH.1989.72829}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/arith/KocC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/Koc89, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {A fast algorithm for mixed-radix conversion in residue arithmetic}, booktitle = {Computer Design: {VLSI} in Computers and Processors, {ICCD} 1989. Proceedings., 1989 {IEEE} International Conference on, Cambridge, MA, USA, October 2-4, 1989}, pages = {18--21}, publisher = {{IEEE}}, year = {1989}, url = {https://doi.org/10.1109/ICCD.1989.63320}, doi = {10.1109/ICCD.1989.63320}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/Koc89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3p/EgeciogluKL88, author = {{\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}} and Alan J. Laub}, editor = {Geoffrey C. Fox}, title = {Prefix algorithms for tridiagonal systems on hypercube multiprocessors}, booktitle = {Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications - Architecture, Software, Computer Systems, and General Issues, C{\({^3}\)}P, Pasadena, California, USA, January 19-20, 1988}, pages = {1539--1545}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/63047.63112}, doi = {10.1145/63047.63112}, timestamp = {Fri, 29 Apr 2022 13:57:54 +0200}, biburl = {https://dblp.org/rec/conf/c3p/EgeciogluKL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/CappelloDGKS86, author = {Peter R. Cappello and Grant A. Davidson and Allen Gersho and {\c{C}}etin Kaya Ko{\c{c}} and V. Srinivasa Somayazulu}, title = {A systolic vector quantization processor for real-time speech coding}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 1986, Tokyo, Japan, April 7-11, 1986}, pages = {2143--2146}, publisher = {{IEEE}}, year = {1986}, url = {https://doi.org/10.1109/ICASSP.1986.1168642}, doi = {10.1109/ICASSP.1986.1168642}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icassp/CappelloDGKS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.