BibTeX records: Çetin Kaya Koç

download as .bib file

@article{DBLP:journals/tc/DaiCCK17,
  author    = {Wangchen Dai and
               Donald Donglong Chen and
               Ray C. C. Cheung and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication},
  journal   = {{IEEE} Trans. Computers},
  volume    = {66},
  number    = {3},
  pages     = {375--388},
  year      = {2017},
  url       = {https://doi.org/10.1109/TC.2016.2601334},
  doi       = {10.1109/TC.2016.2601334},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/DaiCCK17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcad/FernSKC17,
  author    = {Nicole Fern and
               Ismail San and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Kwang{-}Ting (Tim) Cheng},
  title     = {Hiding Hardware Trojan Communication Channels in Partially Specified
               SoC Bus Functionality},
  journal   = {{IEEE} Trans. on {CAD} of Integrated Circuits and Systems},
  volume    = {36},
  number    = {9},
  pages     = {1435--1444},
  year      = {2017},
  url       = {https://doi.org/10.1109/TCAD.2016.2638439},
  doi       = {10.1109/TCAD.2016.2638439},
  timestamp = {Thu, 21 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcad/FernSKC17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Koc17,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A New Algorithm for Inversion mod p\({}^{\mbox{k}}\)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {411},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/411},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Koc17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/ChenYCPK16,
  author    = {Donald Donglong Chen and
               Gavin Xiaoxu Yao and
               Ray C. C. Cheung and
               Derek Chi{-}Wai Pao and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Parameter Space for the Architecture of FFT-Based Montgomery Modular
               Multiplication},
  journal   = {{IEEE} Trans. Computers},
  volume    = {65},
  number    = {1},
  pages     = {147--160},
  year      = {2016},
  url       = {https://doi.org/10.1109/TC.2015.2417553},
  doi       = {10.1109/TC.2015.2417553},
  timestamp = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/ChenYCPK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/KizilkaleEK16,
  author    = {Can Kizilkale and
               {\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication},
  journal   = {{IEEE} Trans. Computers},
  volume    = {65},
  number    = {11},
  pages     = {3239--3250},
  year      = {2016},
  url       = {https://doi.org/10.1109/TC.2016.2543228},
  doi       = {10.1109/TC.2016.2543228},
  timestamp = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/KizilkaleEK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/LimPK16,
  author    = {Rone Kwei Lim and
               Linda R. Petzold and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Bitsliced High-Performance {AES-ECB} on GPUs},
  booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  pages     = {125--133},
  year      = {2016},
  crossref  = {DBLP:conf/birthday/2016kahn},
  url       = {https://doi.org/10.1007/978-3-662-49301-4_8},
  doi       = {10.1007/978-3-662-49301-4_8},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/LimPK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/date/FernSKC16,
  author    = {Nicole Fern and
               Ismail San and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Kwang{-}Ting Cheng},
  title     = {Hardware Trojans in incompletely specified on-chip bus systems},
  booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&}
               Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages     = {527--530},
  year      = {2016},
  crossref  = {DBLP:conf/date/2016},
  url       = {http://ieeexplore.ieee.org/document/7459366/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/date/FernSKC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GreenCK16,
  author    = {Sam Green and
               Ihsan Cicek and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Continuous-Time Computational Aspects of Cyber-Physical Security},
  booktitle = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2016, Santa Barbara, CA, USA, August 16, 2016},
  pages     = {59--62},
  year      = {2016},
  crossref  = {DBLP:conf/fdtc/2016},
  url       = {https://doi.org/10.1109/FDTC.2016.19},
  doi       = {10.1109/FDTC.2016.19},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fdtc/GreenCK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fpl/SanFKC16,
  author    = {Ismail San and
               Nicole Fern and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Kwang{-}Ting Cheng},
  title     = {Trojans modifying soft-processor instruction sequences embedded in
               {FPGA} bitstreams},
  booktitle = {26th International Conference on Field Programmable Logic and Applications,
               {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  pages     = {1--4},
  year      = {2016},
  crossref  = {DBLP:conf/fpl/2016},
  url       = {https://doi.org/10.1109/FPL.2016.7577347},
  doi       = {10.1109/FPL.2016.7577347},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpl/SanFKC16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/waifi/2014,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Sihem Mesnager and
               Erkay Savas},
  title     = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
               2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9061},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16277-5},
  doi       = {10.1007/978-3-319-16277-5},
  isbn      = {978-3-319-16276-8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/waifi/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KizilkaleEK15,
  author    = {Can Kizilkale and
               {\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {742},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/742},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/KizilkaleEK15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/waifi/EgeciogluK14,
  author    = {{\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Reducing the Complexity of Normal Basis Multiplication},
  booktitle = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
               2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  pages     = {61--80},
  year      = {2014},
  crossref  = {DBLP:conf/waifi/2014},
  url       = {https://doi.org/10.1007/978-3-319-16277-5_4},
  doi       = {10.1007/978-3-319-16277-5_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/waifi/EgeciogluK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/14/Koc14,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {About Open Problems},
  booktitle = {Open Problems in Mathematics and Computational Science},
  pages     = {1--4},
  year      = {2014},
  crossref  = {DBLP:books/sp/K2014},
  url       = {https://doi.org/10.1007/978-3-319-10683-0_1},
  doi       = {10.1007/978-3-319-10683-0_1},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/14/Koc14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/14/StipcevicK14,
  author    = {Mario Stipcevic and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {True Random Number Generators},
  booktitle = {Open Problems in Mathematics and Computational Science},
  pages     = {275--315},
  year      = {2014},
  crossref  = {DBLP:books/sp/K2014},
  url       = {https://doi.org/10.1007/978-3-319-10683-0_12},
  doi       = {10.1007/978-3-319-10683-0_12},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/14/StipcevicK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/K2014,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Open Problems in Mathematics and Computational Science},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10683-0},
  doi       = {10.1007/978-3-319-10683-0},
  isbn      = {978-3-319-10682-3},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/K2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/EgeciogluK14a,
  author    = {{\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Reducing the Complexity of Normal Basis Multiplication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {687},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/687},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/EgeciogluK14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jce/Trujillo-OlayaSK12,
  author    = {Vladimir Trujillo{-}Olaya and
               Timothy Sherwood and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Analysis of performance versus security in hardware realizations of
               small elliptic curves for lightweight applications},
  journal   = {J. Cryptographic Engineering},
  volume    = {2},
  number    = {3},
  pages     = {179--188},
  year      = {2012},
  url       = {https://doi.org/10.1007/s13389-012-0039-x},
  doi       = {10.1007/s13389-012-0039-x},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jce/Trujillo-OlayaSK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ValamehrHIKKLS12,
  author    = {Jonathan Valamehr and
               Ted Huffmire and
               Cynthia E. Irvine and
               Ryan Kastner and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Timothy E. Levin and
               Timothy Sherwood},
  title     = {A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto
               Co-processors},
  booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated
               to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  pages     = {364--382},
  year      = {2012},
  crossref  = {DBLP:conf/birthday/2012quisquater},
  url       = {https://doi.org/10.1007/978-3-642-28368-0_24},
  doi       = {10.1007/978-3-642-28368-0_24},
  timestamp = {Tue, 23 May 2017 01:06:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/ValamehrHIKKLS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fpt/ChenYKC12,
  author    = {Donald Donglong Chen and
               Gavin Xiaoxu Yao and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Ray C. C. Cheung},
  title     = {Low complexity and hardware-friendly spectral modular multiplication},
  booktitle = {2012 International Conference on Field-Programmable Technology, {FPT}
               2012, Seoul, Korea (South), December 10-12, 2012},
  pages     = {368--375},
  year      = {2012},
  crossref  = {DBLP:conf/fpt/2012},
  url       = {https://doi.org/10.1109/FPT.2012.6412162},
  doi       = {10.1109/FPT.2012.6412162},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpt/ChenYKC12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jce/Koc11,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Introduction to the \emph{Journal of Cryptographic Engineering}},
  journal   = {J. Cryptographic Engineering},
  volume    = {1},
  number    = {1},
  pages     = {1--3},
  year      = {2011},
  url       = {https://doi.org/10.1007/s13389-011-0007-x},
  doi       = {10.1007/s13389-011-0007-x},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jce/Koc11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW11,
  author    = {Scott Contini and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Colin D. Walter},
  title     = {Modular Arithmetic},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {795--798},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_49},
  doi       = {10.1007/978-1-4419-5906-5_49},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/ContiniKW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Koc11,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Montgomery Arithmetic},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {799--803},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_38},
  doi       = {10.1007/978-1-4419-5906-5_38},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Koc11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fpt/YaoCKM10,
  author    = {Gavin Xiaoxu Yao and
               Ray C. C. Cheung and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Kim{-}Fung Man},
  title     = {Reconfigurable Number Theoretic Transform architectures for cryptographic
               applications},
  booktitle = {Proceedings of the International Conference on Field-Programmable
               Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing,
               China},
  pages     = {308--311},
  year      = {2010},
  crossref  = {DBLP:conf/fpt/2010},
  url       = {https://doi.org/10.1109/FPT.2010.5681440},
  doi       = {10.1109/FPT.2010.5681440},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpt/YaoCKM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/arith/CenkKO09,
  author    = {Murat Cenk and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Ferruh {\"{O}}zbudak},
  title     = {Polynomial Multiplication over Finite Fields Using Field Extensions
               and Interpolation},
  booktitle = {19th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2009, Portland,
               Oregon, USA, 9-10 June 2009},
  pages     = {84--91},
  year      = {2009},
  crossref  = {DBLP:conf/arith/2009},
  url       = {https://doi.org/10.1109/ARITH.2009.11},
  doi       = {10.1109/ARITH.2009.11},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/CenkKO09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asap/CheungKV09,
  author    = {Ray C. C. Cheung and
               {\c{C}}etin Kaya Ko{\c{c}} and
               John D. Villasenor},
  title     = {A High-Performance Hardware Architecture for Spectral Hash Algorithm},
  booktitle = {20th {IEEE} International Conference on Application-Specific Systems,
               Architectures and Processors, {ASAP} 2009, July 7-9, 2009, Boston,
               MA, {USA}},
  pages     = {215--218},
  year      = {2009},
  crossref  = {DBLP:conf/asap/2009},
  url       = {https://doi.org/10.1109/ASAP.2009.31},
  doi       = {10.1109/ASAP.2009.31},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asap/CheungKV09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Koc09,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {About Cryptographic Engineering},
  booktitle = {Cryptographic Engineering},
  pages     = {1--4},
  year      = {2009},
  crossref  = {DBLP:books/sp/Koc2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0_1},
  doi       = {10.1007/978-0-387-71817-0_1},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/koc09/Koc09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/koc09/ErdemYK09,
  author    = {Serdar S{\"{u}}er Erdem and
               Tugrul Yanik and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Fast Finite Field Multiplication},
  booktitle = {Cryptographic Engineering},
  pages     = {75--104},
  year      = {2009},
  crossref  = {DBLP:books/sp/Koc2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0_5},
  doi       = {10.1007/978-0-387-71817-0_5},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/koc09/ErdemYK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SavasK09,
  author    = {Erkay Savas and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Efficient Unified Arithmetic for Hardware Cryptography},
  booktitle = {Cryptographic Engineering},
  pages     = {105--124},
  year      = {2009},
  crossref  = {DBLP:books/sp/Koc2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0_6},
  doi       = {10.1007/978-0-387-71817-0_6},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/koc09/SavasK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/koc09/SaldamliK09,
  author    = {G{\"{o}}kay Saldamli and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Spectral Modular Arithmetic for Cryptography},
  booktitle = {Cryptographic Engineering},
  pages     = {125--169},
  year      = {2009},
  crossref  = {DBLP:books/sp/Koc2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0_7},
  doi       = {10.1007/978-0-387-71817-0_7},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/koc09/SaldamliK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:books/sp/koc09/AcicmezK09,
  author    = {Onur Acii{\c{c}}mez and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Microarchitectural Attacks and Countermeasures},
  booktitle = {Cryptographic Engineering},
  pages     = {475--504},
  year      = {2009},
  crossref  = {DBLP:books/sp/Koc2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0_18},
  doi       = {10.1007/978-0-387-71817-0_18},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/koc09/AcicmezK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/Koc2009,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Cryptographic Engineering},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0},
  doi       = {10.1007/978-0-387-71817-0},
  isbn      = {978-0-387-71816-3},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/Koc2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK08,
  author    = {Min{-}Ho Kim and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Improving the Novikov and Kiselev User Authentication Scheme},
  journal   = {I. J. Network Security},
  volume    = {6},
  number    = {3},
  pages     = {241--245},
  year      = {2008},
  url       = {http://ijns.femto.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p241-245.pdf},
  timestamp = {Sun, 08 Nov 2009 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijnsec/KimK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jise/KimK08,
  author    = {Minho Kim and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Secure Hash-Based Strong-Password Authentication Protocol Using
               One-Time Public-Key Cryptography},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {24},
  number    = {4},
  pages     = {1213--1227},
  year      = {2008},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2008/200807_14.html},
  timestamp = {Fri, 19 Dec 2008 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jise/KimK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/YavuzYK08,
  author    = {Ilker Yavuz and
               Siddika Berna Ors Yalcin and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {{FPGA} Implementation of an Elliptic Curve Cryptosystem over GF(3{\^{}}m)},
  booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
               and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages     = {397--402},
  year      = {2008},
  crossref  = {DBLP:conf/reconfig/2008},
  url       = {https://doi.org/10.1109/ReConFig.2008.66},
  doi       = {10.1109/ReConFig.2008.66},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/reconfig/YavuzYK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/waifi/2008,
  editor    = {Joachim von zur Gathen and
               Jos{\'{e}} Luis Ima{\~{n}}a and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Arithmetic of Finite Fields, 2nd International Workshop, {WAIFI} 2008,
               Siena, Italy, July 6-9, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5130},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-69499-1},
  doi       = {10.1007/978-3-540-69499-1},
  isbn      = {978-3-540-69498-4},
  timestamp = {Tue, 13 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/waifi/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieeesp/AcucmezSK07,
  author    = {Onur Acii{\c{c}}mez and
               Jean{-}Pierre Seifert and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Micro-Architectural Cryptanalysis},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {5},
  number    = {4},
  pages     = {62--64},
  year      = {2007},
  url       = {https://doi.org/10.1109/MSP.2007.91},
  doi       = {10.1109/MSP.2007.91},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieeesp/AcucmezSK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK07,
  author    = {Minho Kim and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme},
  journal   = {I. J. Network Security},
  volume    = {4},
  number    = {2},
  pages     = {235--239},
  year      = {2007},
  url       = {http://ijns.femto.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p235-239.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijnsec/KimK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/arith/SaldamliK07,
  author    = {G{\"{o}}kay Saldamli and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Spectral Modular Exponentiation},
  booktitle = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
               June 2007, Montpellier, France},
  pages     = {123--132},
  year      = {2007},
  crossref  = {DBLP:conf/arith/2007},
  url       = {https://doi.org/10.1109/ARITH.2007.34},
  doi       = {10.1109/ARITH.2007.34},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/SaldamliK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezKS07,
  author    = {Onur Acii{\c{c}}mez and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Jean{-}Pierre Seifert},
  title     = {Predicting Secret Keys Via Branch Prediction},
  booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  pages     = {225--242},
  year      = {2007},
  crossref  = {DBLP:conf/ctrsa/2007},
  url       = {https://doi.org/10.1007/11967668_15},
  doi       = {10.1007/11967668_15},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/AciicmezKS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezSK07,
  author    = {Onur Acii{\c{c}}mez and
               Werner Schindler and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Cache Based Remote Timing Attack on the {AES}},
  booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  pages     = {271--286},
  year      = {2007},
  crossref  = {DBLP:conf/ctrsa/2007},
  url       = {https://doi.org/10.1007/11967668_18},
  doi       = {10.1007/11967668_18},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/AciicmezSK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icics/AciicmezK06,
  author    = {Onur Acii{\c{c}}mez and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Trace-Driven Cache Attacks on {AES} (Short Paper)},
  booktitle = {Information and Communications Security, 8th International Conference,
               {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  pages     = {112--121},
  year      = {2006},
  crossref  = {DBLP:conf/icics/2006},
  url       = {https://doi.org/10.1007/11935308_9},
  doi       = {10.1007/11935308_9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/AciicmezK06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezK06,
  author    = {Onur Acii{\c{c}}mez and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Trace-Driven Cache Attacks on {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {138},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/138},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AciicmezK06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezSK06,
  author    = {Onur Acii{\c{c}}mez and
               Jean{-}Pierre Seifert and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Predicting Secret Keys via Branch Prediction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {288},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/288},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AciicmezSK06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezKS06,
  author    = {Onur Acii{\c{c}}mez and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Jean{-}Pierre Seifert},
  title     = {On the Power of Simple Branch Prediction Analysis},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {351},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/351},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AciicmezKS06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK05,
  author    = {Minho Kim and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Simple Attack on a Recently Introduced Hash-based Strong-password
               Authentication Scheme},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {2},
  pages     = {77--80},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p77-80.pdf},
  timestamp = {Mon, 09 Nov 2009 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijnsec/KimK05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AciicmezSK05,
  author    = {Onur Acii{\c{c}}mez and
               Werner Schindler and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {139--146},
  year      = {2005},
  crossref  = {DBLP:conf/ccs/2005},
  url       = {http://doi.acm.org/10.1145/1102120.1102140},
  doi       = {10.1145/1102120.1102140},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/AciicmezSK05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/ContiniKW05,
  author    = {Scott Contini and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Colin D. Walter},
  title     = {Modular Arithmetic},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_259},
  doi       = {10.1007/0-387-23483-7_259},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/ContiniKW05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/KocW05,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Colin D. Walter},
  title     = {Montgomery Arithmetic},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_263},
  doi       = {10.1007/0-387-23483-7_263},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/KocW05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tecs/WollingerPWPSK04,
  author    = {Thomas J. Wollinger and
               Jan Pelzl and
               Volker Wittelsberger and
               Christof Paar and
               G{\"{o}}kay Saldamli and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Elliptic and hyperelliptic curves on embedded {\(\mathrm{\mu}\)}P},
  journal   = {{ACM} Trans. Embedded Comput. Syst.},
  volume    = {3},
  number    = {3},
  pages     = {509--533},
  year      = {2004},
  url       = {http://doi.acm.org/10.1145/1015047.1015051},
  doi       = {10.1145/1015047.1015051},
  timestamp = {Thu, 09 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tecs/WollingerPWPSK04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tissec/LeviCK04,
  author    = {Albert Levi and
               M. Ufuk {\c{C}}aglayan and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Use of nested certificates for efficient, dynamic, and trust preserving
               public key infrastructure},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {7},
  number    = {1},
  pages     = {21--59},
  year      = {2004},
  url       = {http://doi.acm.org/10.1145/984334.984336},
  doi       = {10.1145/984334.984336},
  timestamp = {Thu, 09 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tissec/LeviCK04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iscis/LeviCAKC04,
  author    = {Albert Levi and
               Erhan {\c{C}}etintas and
               Murat Aydos and
               {\c{C}}etin Kaya Ko{\c{c}} and
               M. Ufuk {\c{C}}aglayan},
  title     = {Relay Attacks on Bluetooth Authentication and Solutions},
  booktitle = {Computer and Information Sciences - {ISCIS} 2004, 19th International
               Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  pages     = {278--288},
  year      = {2004},
  crossref  = {DBLP:conf/iscis/2004},
  url       = {https://doi.org/10.1007/978-3-540-30182-0_29},
  doi       = {10.1007/978-3-540-30182-0_29},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscis/LeviCAKC04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/KocP03,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Guest Editors' Introduction to the Special Section on Cryptographic
               Hardware and Embedded Systems},
  journal   = {{IEEE} Trans. Computers},
  volume    = {52},
  number    = {4},
  pages     = {401--402},
  year      = {2003},
  url       = {https://doi.org/10.1109/TC.2003.1190580},
  doi       = {10.1109/TC.2003.1190580},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/KocP03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/TencaK03,
  author    = {Alexandre F. Tenca and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Scalable Architecture for Modular Multiplication Based on Montgomery's
               Algorithm},
  journal   = {{IEEE} Trans. Computers},
  volume    = {52},
  number    = {9},
  pages     = {1215--1221},
  year      = {2003},
  url       = {https://doi.org/10.1109/TC.2003.1228516},
  doi       = {10.1109/TC.2003.1228516},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/TencaK03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/SunarSK03,
  author    = {Berk Sunar and
               Erkay Savas and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Constructing Composite Field Representations for Efficient Conversion},
  journal   = {{IEEE} Trans. Computers},
  volume    = {52},
  number    = {11},
  pages     = {1391--1398},
  year      = {2003},
  url       = {https://doi.org/10.1109/TC.2003.1244937},
  doi       = {10.1109/TC.2003.1244937},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/SunarSK03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/Rodriguez-HenriquezK03,
  author    = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Parallel Multipliers Based on Special Irreducible Pentanomials},
  journal   = {{IEEE} Trans. Computers},
  volume    = {52},
  number    = {12},
  pages     = {1535--1542},
  year      = {2003},
  url       = {https://doi.org/10.1109/TC.2003.1252850},
  doi       = {10.1109/TC.2003.1252850},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/Rodriguez-HenriquezK03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/arith/ErdemK03,
  author    = {Serdar S{\"{u}}er Erdem and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying
               Operands of Size a Power of Two},
  booktitle = {16th {IEEE} Symposium on Computer Arithmetic (Arith-16 2003), 15-18
               June 2003, Santiago de Compostela, Spain},
  pages     = {28},
  year      = {2003},
  crossref  = {DBLP:conf/arith/2003},
  url       = {https://doi.org/10.1109/ARITH.2003.1207657},
  doi       = {10.1109/ARITH.2003.1207657},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/ErdemK03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/saint/DykeK03,
  author    = {Colin Van Dyke and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {On Ubiquitous Network Security and Anomaly Detection},
  booktitle = {2003 Symposium on Applications and the Internet Workshops {(SAINT}
               2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings},
  pages     = {374--378},
  year      = {2003},
  crossref  = {DBLP:conf/saint/2003w},
  url       = {https://doi.org/10.1109/SAINTW.2003.1210189},
  doi       = {10.1109/SAINTW.2003.1210189},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/saint/DykeK03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor    = {Burton S. Kaliski Jr. and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2523},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36400-5},
  doi       = {10.1007/3-540-36400-5},
  isbn      = {3-540-00409-2},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor    = {Colin D. Walter and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2779},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45238-6},
  doi       = {10.1007/978-3-540-45238-6},
  isbn      = {3-540-40833-9},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/GutubTSK02,
  author    = {Adnan Abdul{-}Aziz Gutub and
               Alexandre F. Tenca and
               Erkay Savas and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p)
               and {GF(2)}},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  pages     = {484--499},
  year      = {2002},
  crossref  = {DBLP:conf/ches/2002},
  url       = {https://doi.org/10.1007/3-540-36400-5_35},
  doi       = {10.1007/3-540-36400-5_35},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/GutubTSK02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/GutubTK02,
  author    = {Adnan Abdul{-}Aziz Gutub and
               Alexandre F. Tenca and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Scalable {VLSI} Architecture for GF(p) Montgomery Modular Inverse
               Computation},
  booktitle = {2002 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI}
               2002), 25-26 April 2002, Pittsburgh, PA, {USA}},
  pages     = {53--58},
  year      = {2002},
  crossref  = {DBLP:conf/isvlsi/2002},
  url       = {https://doi.org/10.1109/ISVLSI.2002.1016874},
  doi       = {10.1109/ISVLSI.2002.1016874},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isvlsi/GutubTK02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/LeviK01,
  author    = {Albert Levi and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Risks in email security},
  journal   = {Commun. {ACM}},
  volume    = {44},
  number    = {8},
  pages     = {112},
  year      = {2001},
  url       = {http://doi.acm.org/10.1145/381641.381666},
  doi       = {10.1145/381641.381666},
  timestamp = {Thu, 20 Nov 2003 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/LeviK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/SunarK01,
  author    = {Berk Sunar and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {An Efficient Optimal Normal Basis Type {II} Multiplier},
  journal   = {{IEEE} Trans. Computers},
  volume    = {50},
  number    = {1},
  pages     = {83--87},
  year      = {2001},
  url       = {https://doi.org/10.1109/12.902754},
  doi       = {10.1109/12.902754},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/SunarK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LeviK01,
  author    = {Albert Levi and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {{CONSEPP:} CONvenient and Secure Electronic Payment Protocol Based
               on {X9.59}},
  booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
               11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages     = {286--295},
  year      = {2001},
  crossref  = {DBLP:conf/acsac/2001},
  url       = {https://doi.org/10.1109/ACSAC.2001.991544},
  doi       = {10.1109/ACSAC.2001.991544},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/LeviK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasSK01,
  author    = {Erkay Savas and
               Thomas A. Schmidt and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Generating Elliptic Curves of Prime Order},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  number    = {Generators},
  pages     = {142--158},
  year      = {2001},
  crossref  = {DBLP:conf/ches/2001},
  url       = {https://doi.org/10.1007/3-540-44709-1_13},
  doi       = {10.1007/3-540-44709-1_13},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/SavasSK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/TencaTK01,
  author    = {Alexandre F. Tenca and
               Georgi Todorov and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {High-Radix Design of a Scalable Modular Multiplier},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  number    = {Generators},
  pages     = {185--201},
  year      = {2001},
  crossref  = {DBLP:conf/ches/2001},
  url       = {https://doi.org/10.1007/3-540-44709-1_17},
  doi       = {10.1007/3-540-44709-1_17},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/TencaTK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sec/LeviK01,
  author    = {Albert Levi and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Reducing Certificate Revocating Cost using {NPKI}},
  booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
               Annual Working Conference on Information Security (IFIP/Sec'01), June
               11-13, 2001, Paris, France},
  pages     = {51--60},
  year      = {2001},
  crossref  = {DBLP:conf/sec/2001},
  timestamp = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sec/LeviK01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               David Naccache and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2162},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44709-1},
  doi       = {10.1007/3-540-44709-1},
  isbn      = {3-540-42521-7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/HalbutogullariK00,
  author    = {Alper Halbutogullari and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Parallel Multiplication in using Polynomial Residue Arithmetic},
  journal   = {Des. Codes Cryptography},
  volume    = {20},
  number    = {2},
  pages     = {155--173},
  year      = {2000},
  timestamp = {Wed, 22 Aug 2007 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/HalbutogullariK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/HalbutogullariK00,
  author    = {Alper Halbutogullari and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Mastrovito Multiplier for General Irreducible Polynomials},
  journal   = {{IEEE} Trans. Computers},
  volume    = {49},
  number    = {5},
  pages     = {503--518},
  year      = {2000},
  url       = {https://doi.org/10.1109/12.859542},
  doi       = {10.1109/12.859542},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/HalbutogullariK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/SavasK00,
  author    = {Erkay Savas and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {The Montgomery Modular Inverse-Revisited},
  journal   = {{IEEE} Trans. Computers},
  volume    = {49},
  number    = {7},
  pages     = {763--766},
  year      = {2000},
  url       = {https://doi.org/10.1109/12.863048},
  doi       = {10.1109/12.863048},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/SavasK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AydosYK00,
  author    = {Murat Aydos and
               Tugrul Yanik and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {An High-Speed ECC-based Wireless Authentication Protocol on an {ARM}
               Microprocessor},
  booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages     = {401--410},
  year      = {2000},
  crossref  = {DBLP:conf/acsac/2000},
  url       = {https://doi.org/10.1109/ACSAC.2000.898895},
  doi       = {10.1109/ACSAC.2000.898895},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/AydosYK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavasTK00,
  author    = {Erkay Savas and
               Alexandre F. Tenca and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Scalable and Unified Multiplier Architecture for Finite Fields GF(\emph{p})
               and GF(2\({}^{\mbox{m}}\))},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  pages     = {277--292},
  year      = {2000},
  crossref  = {DBLP:conf/ches/2000},
  url       = {https://doi.org/10.1007/3-540-44499-8_22},
  doi       = {10.1007/3-540-44499-8_22},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/SavasTK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8},
  doi       = {10.1007/3-540-44499-8},
  isbn      = {3-540-41455-X},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/SunarK99,
  author    = {Berk Sunar and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Mastrovito Multiplier for All Trinomials},
  journal   = {{IEEE} Trans. Computers},
  volume    = {48},
  number    = {5},
  pages     = {522--527},
  year      = {1999},
  url       = {https://doi.org/10.1109/12.769434},
  doi       = {10.1109/12.769434},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/SunarK99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/HalbutogullariK99,
  author    = {Alper Halbutogullari and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Mastrovito Multiplier for General Irreducible Polynomials},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November
               15-19, 1999, Proceedings},
  pages     = {498--507},
  year      = {1999},
  crossref  = {DBLP:conf/aaecc/1999},
  url       = {https://doi.org/10.1007/3-540-46796-3_48},
  doi       = {10.1007/3-540-46796-3_48},
  timestamp = {Wed, 24 May 2017 15:40:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/aaecc/HalbutogullariK99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/TencaK99,
  author    = {Alexandre F. Tenca and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Scalable Architecture for Montgomery Multiplication},
  booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  pages     = {94--108},
  year      = {1999},
  crossref  = {DBLP:conf/ches/1999},
  url       = {https://doi.org/10.1007/3-540-48059-5_10},
  doi       = {10.1007/3-540-48059-5_10},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/TencaK99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5},
  doi       = {10.1007/3-540-48059-5},
  isbn      = {3-540-66646-X},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/KocA98,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Tolga Acar},
  title     = {Montgomery Multplication in GF(2\({}^{\mbox{k}}\))},
  journal   = {Des. Codes Cryptography},
  volume    = {14},
  number    = {1},
  pages     = {57--69},
  year      = {1998},
  url       = {https://doi.org/10.1023/A:1008208521515},
  doi       = {10.1023/A:1008208521515},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/KocA98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/KocS98,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Berk Sunar},
  title     = {Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers
               for a Class of Finite Fields},
  journal   = {{IEEE} Trans. Computers},
  volume    = {47},
  number    = {3},
  pages     = {353--356},
  year      = {1998},
  url       = {https://doi.org/10.1109/12.660172},
  doi       = {10.1109/12.660172},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/KocS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/automatica/KocI97,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Mustafa Murat Inceoglu},
  title     = {A Parallel algorithm for principal nth roots of matrices},
  journal   = {Automatica},
  volume    = {33},
  number    = {9},
  pages     = {1735--1738},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0005-1098(97)00067-8},
  doi       = {10.1016/S0005-1098(97)00067-8},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/automatica/KocI97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/paapp/BakkalogluEK97,
  author    = {B. Bakkaloglu and
               Kayhan Erciyes and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A Parllelization of Parlett's Algorithm for Functions of Triangular
               Matrices},
  journal   = {Parallel Algorithms Appl.},
  volume    = {11},
  number    = {1-2},
  pages     = {61--69},
  year      = {1997},
  url       = {https://doi.org/10.1080/10637199708915587},
  doi       = {10.1080/10637199708915587},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/paapp/BakkalogluEK97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pc/Koc97,
  author    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Parallel p-Adic Method for Solving Linear Systems of Equations},
  journal   = {Parallel Computing},
  volume    = {23},
  number    = {13},
  pages     = {2067--2074},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0167-8191(97)00062-8},
  doi       = {10.1016/S0167-8191(97)00062-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/pc/Koc97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/arith/KocA97,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Tolga Acar},
  title     = {Fast Software Exponentiation in GF(2{\^{}}k)},
  booktitle = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997,
               Asilomar, CA, {USA}},
  pages     = {225},
  year      = {1997},
  crossref  = {DBLP:conf/arith/1997},
  url       = {https://doi.org/10.1109/ARITH.1997.614899},
  doi       = {10.1109/ARITH.1997.614899},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/KocA97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/micro/KocAK96,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Tolga Acar and
               Burton S. Kaliski Jr.},
  title     = {Analyzing and comparing Montgomery multiplication algorithms},
  journal   = {{IEEE} Micro},
  volume    = {16},
  number    = {3},
  pages     = {26--33},
  year      = {1996},
  url       = {https://doi.org/10.1109/40.502403},
  doi       = {10.1109/40.502403},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/micro/KocAK96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/paapp/KocGB94,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               A. G{\"{u}}ven{\c{c}} and
               B. Bakkaloglu},
  title     = {Exact Solution of Linear Equations on Distributed-memory Multiprocessors},
  journal   = {Parallel Algorithms Appl.},
  volume    = {3},
  number    = {1-2},
  pages     = {135--143},
  year      = {1994},
  url       = {https://doi.org/10.1080/10637199408962531},
  doi       = {10.1080/10637199408962531},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/paapp/KocGB94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/EgeciogluK94,
  author    = {{\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Exponentiation Using Canonical Recoding},
  journal   = {Theor. Comput. Sci.},
  volume    = {129},
  number    = {2},
  pages     = {407--417},
  year      = {1994},
  url       = {https://doi.org/10.1016/0304-3975(94)90037-X},
  doi       = {10.1016/0304-3975(94)90037-X},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/EgeciogluK94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pc/KocC93,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Peter R. Cappello},
  title     = {Systolic Arrays for Integer Chinese Remaindering},
  journal   = {Parallel Computing},
  volume    = {19},
  number    = {11},
  pages     = {1303--1311},
  year      = {1993},
  url       = {https://doi.org/10.1016/0167-8191(93)90033-H},
  doi       = {10.1016/0167-8191(93)90033-H},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/pc/KocC93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pc/EgeciogluK92,
  author    = {{\"{O}}mer Egecioglu and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {A parallel algorithm for generating discrete orthogonal polynomials},
  journal   = {Parallel Computing},
  volume    = {18},
  number    = {6},
  pages     = {649--659},
  year      = {1992},
  url       = {https://doi.org/10.1016/0167-8191(92)90005-R},
  doi       = {10.1016/0167-8191(92)90005-R},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/pc/EgeciogluK92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jpdc/KocA91,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Sarath N. Arachchige},
  title     = {A Fast Algorithm for Gaussian Elimination over {GF(2)} and Its Implementation
               on the {GAPP}},
  journal   = {J. Parallel Distrib. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {118--122},
  year      = {1991},
  url       = {https://doi.org/10.1016/0743-7315(91)90115-P},
  doi       = {10.1016/0743-7315(91)90115-P},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jpdc/KocA91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/trob/KocCL91,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Po Rong Chang and
               C. S. G. Lee},
  title     = {Comments on 'Residue arithmetic {VLSI} array architecture for manipulator
               pseudo-inverse Jacobian computation' [with reply]},
  journal   = {{IEEE} Trans. Robotics and Automation},
  volume    = {7},
  number    = {5},
  pages     = {715--717},
  year      = {1991},
  url       = {https://doi.org/10.1109/70.97885},
  doi       = {10.1109/70.97885},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/trob/KocCL91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/vlsisp/KocH91,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Ching Yu Hung},
  title     = {Bit-level systolic arrays for modular multiplication},
  journal   = {{VLSI} Signal Processing},
  volume    = {3},
  number    = {3},
  pages     = {215--223},
  year      = {1991},
  url       = {https://doi.org/10.1007/BF00925832},
  doi       = {10.1007/BF00925832},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/vlsisp/KocH91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icpp/KocP91,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Rose Marie Piedra},
  title     = {A Parallel Algorithm for Exact Solution of Linear Equations},
  booktitle = {Proceedings of the International Conference on Parallel Processing,
               {ICPP} '91, Austin, Texas, USA, August 1991. Volume {III:} Algorithms
               and Applications.},
  pages     = {1--8},
  year      = {1991},
  crossref  = {DBLP:conf/icpp/1991-3},
  timestamp = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icpp/KocP91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/computing/CappelloGK90,
  author    = {Peter R. Cappello and
               Efstratios Gallopoulos and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Systolic computation of interpolating polynomials},
  journal   = {Computing},
  volume    = {45},
  number    = {2},
  pages     = {95--117},
  year      = {1990},
  url       = {https://doi.org/10.1007/BF02247877},
  doi       = {10.1007/BF02247877},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/computing/CappelloGK90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/computing/EgeciogluGK89,
  author    = {{\"{O}}mer Egecioglu and
               Efstratios Gallopoulos and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Parallel Hermite interpolation: An algebraic approach},
  journal   = {Computing},
  volume    = {42},
  number    = {4},
  pages     = {291--307},
  year      = {1989},
  url       = {https://doi.org/10.1007/BF02243225},
  doi       = {10.1007/BF02243225},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/computing/EgeciogluGK89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jc/EgeciogluGK89,
  author    = {{\"{O}}mer Egecioglu and
               Efstratios Gallopoulos and
               {\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Fast computation of divided differences and parallel hermite interpolation},
  journal   = {J. Complexity},
  volume    = {5},
  number    = {4},
  pages     = {417--437},
  year      = {1989},
  url       = {https://doi.org/10.1016/0885-064X(89)90018-6},
  doi       = {10.1016/0885-064X(89)90018-6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jc/EgeciogluGK89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcad/KocO89,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               P. F. Ordung},
  title     = {Schwarz-Christoffel transformation for the simulation of two-dimensional
               capacitance {[VLSI} circuits]},
  journal   = {{IEEE} Trans. on {CAD} of Integrated Circuits and Systems},
  volume    = {8},
  number    = {9},
  pages     = {1025--1027},
  year      = {1989},
  url       = {https://doi.org/10.1109/43.35556},
  doi       = {10.1109/43.35556},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcad/KocO89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/arith/KocC89,
  author    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Peter R. Cappello},
  title     = {Systolic arrays for integer Chinese remaindering},
  booktitle = {9th Symposium on Computer Arithmetic, {ARITH} 1989, Santa Monica,
               CA, USA, September 6-8, 1989},
  pages     = {216--223},
  year      = {1989},
  crossref  = {DBLP:conf/arith/1989},
  url       = {https://doi.org/10.1109/ARITH.1989.72829},
  doi       = {10.1109/ARITH.1989.72829},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/KocC89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor    = {Peter Y. A. Ryan and
               David Naccache and
               Jean{-}Jacques Quisquater},
  title     = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {9100},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49301-4},
  doi       = {10.1007/978-3-662-49301-4},
  isbn      = {978-3-662-49300-7},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/2016kahn},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/date/2016,
  editor    = {Luca Fanucci and
               J{\"{u}}rgen Teich},
  title     = {2016 Design, Automation {\&} Test in Europe Conference {\&}
               Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7454909},
  isbn      = {978-3-9815-3707-9},
  timestamp = {Tue, 03 May 2016 10:06:49 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/date/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2016,
  title     = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2016, Santa Barbara, CA, USA, August 16, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7774236},
  isbn      = {978-1-5090-1108-7},
  timestamp = {Mon, 19 Dec 2016 10:37:54 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fdtc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fpl/2016,
  editor    = {Paolo Ienne and
               Walid A. Najjar and
               Jason Anderson and
               Philip Brisk and
               Walter Stechele},
  title     = {26th International Conference on Field Programmable Logic and Applications,
               {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7573873},
  isbn      = {978-2-8399-1844-2},
  timestamp = {Tue, 04 Oct 2016 13:21:43 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpl/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/waifi/2014,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Sihem Mesnager and
               Erkay Savas},
  title     = {Arithmetic of Finite Fields - 5th International Workshop, {WAIFI}
               2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9061},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16277-5},
  doi       = {10.1007/978-3-319-16277-5},
  isbn      = {978-3-319-16276-8},
  timestamp = {Fri, 26 May 2017 00:48:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/waifi/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/K2014,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Open Problems in Mathematics and Computational Science},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10683-0},
  doi       = {10.1007/978-3-319-10683-0},
  isbn      = {978-3-319-10682-3},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/K2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/birthday/2012quisquater,
  editor    = {David Naccache},
  title     = {Cryptography and Security: From Theory to Applications - Essays Dedicated
               to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {6805},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28368-0},
  doi       = {10.1007/978-3-642-28368-0},
  isbn      = {978-3-642-28367-3},
  timestamp = {Tue, 23 May 2017 01:06:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/birthday/2012quisquater},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fpt/2012,
  title     = {2012 International Conference on Field-Programmable Technology, {FPT}
               2012, Seoul, Korea (South), December 10-12, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6395855},
  isbn      = {978-1-4673-2846-3},
  timestamp = {Tue, 22 Jan 2013 09:51:55 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fpt/2010,
  editor    = {Jinian Bian and
               Qiang Zhou and
               Peter Athanas and
               Yajun Ha and
               Kang Zhao},
  title     = {Proceedings of the International Conference on Field-Programmable
               Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing,
               China},
  publisher = {{IEEE}},
  year      = {2010},
  isbn      = {978-1-4244-8981-7},
  timestamp = {Mon, 11 Jul 2011 11:16:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fpt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/arith/2009,
  editor    = {Javier D. Bruguera and
               Marius Cornea and
               Debjit Das Sarma and
               John Harrison},
  title     = {19th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2009, Portland,
               Oregon, USA, 9-10 June 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5223291},
  isbn      = {978-0-7695-3670-5},
  timestamp = {Fri, 08 May 2015 15:30:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asap/2009,
  title     = {20th {IEEE} International Conference on Application-Specific Systems,
               Architectures and Processors, {ASAP} 2009, July 7-9, 2009, Boston,
               MA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5199994},
  isbn      = {978-0-7695-3732-0},
  timestamp = {Thu, 03 Dec 2015 16:23:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asap/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/sp/Koc2009,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}}},
  title     = {Cryptographic Engineering},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-0-387-71817-0},
  doi       = {10.1007/978-0-387-71817-0},
  isbn      = {978-0-387-71816-3},
  timestamp = {Tue, 16 May 2017 14:01:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/sp/Koc2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/reconfig/2008,
  title     = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
               and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4731750},
  isbn      = {978-0-7695-3474-9},
  timestamp = {Tue, 21 Oct 2014 16:16:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/reconfig/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/arith/2007,
  title     = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
               June 2007, Montpellier, France},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4272835},
  isbn      = {0-7695-2854-6},
  timestamp = {Fri, 08 May 2015 15:30:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2007,
  editor    = {Masayuki Abe},
  title     = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4377},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11967668},
  doi       = {10.1007/11967668},
  isbn      = {3-540-69327-0},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icics/2006,
  editor    = {Peng Ning and
               Sihan Qing and
               Ninghui Li},
  title     = {Information and Communications Security, 8th International Conference,
               {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4307},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935308},
  doi       = {10.1007/11935308},
  isbn      = {3-540-49496-0},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icics/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor    = {Vijay Atluri and
               Catherine A. Meadows and
               Ari Juels},
  title     = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-226-7},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2005,
  editor    = {Henk C. A. van Tilborg},
  title     = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  isbn      = {978-0-387-23473-1},
  timestamp = {Fri, 25 Nov 2011 17:44:27 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iscis/2004,
  editor    = {Cevdet Aykanat and
               Tugrul Dayar and
               Ibrahim Korpeoglu},
  title     = {Computer and Information Sciences - {ISCIS} 2004, 19th International
               Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3280},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b101749},
  doi       = {10.1007/b101749},
  isbn      = {3-540-23526-4},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscis/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/arith/2003,
  title     = {16th {IEEE} Symposium on Computer Arithmetic (Arith-16 2003), 15-18
               June 2003, Santiago de Compostela, Spain},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8582},
  isbn      = {0-7695-1894-X},
  timestamp = {Fri, 08 May 2015 15:30:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/saint/2003w,
  title     = {2003 Symposium on Applications and the Internet Workshops {(SAINT}
               2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8594},
  isbn      = {0-7695-1873-7},
  timestamp = {Thu, 19 May 2016 14:17:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/saint/2003w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor    = {Burton S. Kaliski Jr. and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2523},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36400-5},
  doi       = {10.1007/3-540-36400-5},
  isbn      = {3-540-00409-2},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isvlsi/2002,
  title     = {2002 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI}
               2002), 25-26 April 2002, Pittsburgh, PA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7933},
  isbn      = {0-7695-1486-3},
  timestamp = {Mon, 23 May 2016 12:12:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isvlsi/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2001,
  title     = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
               11-14 December 2001, New Orleans, Louisiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7785},
  isbn      = {0-7695-1405-7},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               David Naccache and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
               Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2162},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44709-1},
  doi       = {10.1007/3-540-44709-1},
  isbn      = {3-540-42521-7},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sec/2001,
  editor    = {Michel Dupuy and
               Pierre Paradinas},
  title     = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
               Annual Working Conference on Information Security (IFIP/Sec'01), June
               11-13, 2001, Paris, France},
  series    = {{IFIP} Conference Proceedings},
  volume    = {193},
  publisher = {Kluwer},
  year      = {2001},
  isbn      = {0-7923-7389-8},
  timestamp = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sec/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2000,
  title     = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7224},
  isbn      = {0-7695-0859-6},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8},
  doi       = {10.1007/3-540-44499-8},
  isbn      = {3-540-41455-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/aaecc/1999,
  editor    = {Marc P. C. Fossorier and
               Hideki Imai and
               Shu Lin and
               Alain Poli},
  title     = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November
               15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1719},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-46796-3},
  doi       = {10.1007/3-540-46796-3},
  isbn      = {3-540-66723-7},
  timestamp = {Wed, 24 May 2017 15:40:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/aaecc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5},
  doi       = {10.1007/3-540-48059-5},
  isbn      = {3-540-66646-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ches/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/arith/1997,
  title     = {13th Symposium on Computer Arithmetic {(ARITH-13} '97), 6-9 July 1997,
               Asilomar, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4854},
  isbn      = {0-8186-7846-1},
  timestamp = {Fri, 08 May 2015 15:30:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icpp/1991-3,
  title     = {Proceedings of the International Conference on Parallel Processing,
               {ICPP} '91, Austin, Texas, USA, August 1991. Volume {III:} Algorithms
               and Applications},
  publisher = {{CRC} Press},
  year      = {1991},
  timestamp = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icpp/1991-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/arith/1989,
  title     = {9th Symposium on Computer Arithmetic, {ARITH} 1989, Santa Monica,
               CA, USA, September 6-8, 1989},
  publisher = {{IEEE}},
  year      = {1989},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=480},
  isbn      = {0-8186-8963-3},
  timestamp = {Wed, 29 Mar 2017 16:45:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/arith/1989},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier