default search action
Erkay Savas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j53]Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. IEEE Access 12: 166814-166833 (2024) - [j52]Tolun Tosun, Erkay Savas:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography. IEEE Trans. Inf. Forensics Secur. 19: 3353-3365 (2024) - [i29]Tolun Tosun, Amir Moradi, Erkay Savas:
Exploiting the Central Reduction in Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2024: 66 (2024) - [i28]Ali Sah Özcan, Erkay Savas:
HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0. IACR Cryptol. ePrint Arch. 2024: 1543 (2024) - [i27]Emre Koçer, Selim Kirbiyik, Tolun Tosun, Ersin Alaybeyoglu, Erkay Savas:
IO-Optimized Design-Time Configurable Negacyclic Seven-Step NTT Architecture for FHE Applications. IACR Cryptol. ePrint Arch. 2024: 1889 (2024) - [i26]Tolun Tosun, Selim Kirbiyik, Emre Koçer, Erkay Savas, Ersin Alaybeyoglu:
Efficient Modular Multiplication Hardware for Number Theoretic Transform on FPGA. IACR Cryptol. ePrint Arch. 2024: 1890 (2024) - 2023
- [j51]Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study. IEEE Access 11: 48945-48976 (2023) - [j50]Ali Sah Özcan, Can Ayduman, Enes Recep Türkoglu, Erkay Savas:
Homomorphic Encryption on GPU. IEEE Access 11: 84168-84186 (2023) - [j49]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Yassine Mekdad, Mauro Conti:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. IEEE Trans. Netw. Serv. Manag. 20(2): 2096-2105 (2023) - [c64]Fatih Durmaz, Nureddin Kamadan, Melih Taha Öz, Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
TimeInspector: A Static Analysis Approach for Detecting Timing Attacks. EuroS&P Workshops 2023: 296-303 - [c63]Ahmet Can Mert, Ferhat Yaman, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Aydin Aysu:
A Survey of Software Implementations for the Number Theoretic Transform. SAMOS 2023: 328-344 - [c62]Can Ayduman, Emre Koçer, Selim Kirbiyik, Ahmet Can Mert, Erkay Savas:
Efficient Design-Time Flexible Hardware Architecture for Accelerating Homomorphic Encryption. VLSI-SoC 2023: 1-7 - [i25]Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas, Mauro Conti:
Cryptocurrency wallets: assessment and security. CoRR abs/2303.12940 (2023) - [i24]Tolun Tosun, Erkay Savas:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT based Implementations of Lattice-based Cryptography. IACR Cryptol. ePrint Arch. 2023: 1046 (2023) - [i23]Anes Abdennebi, Erkay Savas:
A Lattice-based Publish-Subscribe Communication Protocol using Accelerated Homomorphic Encryption Primitives. IACR Cryptol. ePrint Arch. 2023: 1309 (2023) - [i22]Ali Sah Özcan, Erkay Savas:
Two Algorithms for Fast GPU Implementation of NTT. IACR Cryptol. ePrint Arch. 2023: 1410 (2023) - 2022
- [j48]Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication. Microprocess. Microsystems 89: 104451 (2022) - [j47]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Evaluation. IEEE Trans. Computers 71(1): 107-120 (2022) - [j46]Ahmet Can Mert, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Aydin Aysu:
An Extensive Study of Flexible Design Methods for the Number Theoretic Transform. IEEE Trans. Computers 71(11): 2829-2843 (2022) - [j45]Özgün Özerk, Can Elgezen, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Efficient number theoretic transform implementation on GPU for homomorphic encryption. J. Supercomput. 78(2): 2840-2872 (2022) - [c61]Musa Sadik Unal, Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments. CANS 2022: 188-199 - [c60]Enes Recep Türkoglu, Ali Sah Özcan, Can Ayduman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
An Accelerated GPU Library for Homomorphic Encryption Operations of BFV Scheme. ISCAS 2022: 1155-1159 - [i21]Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti, Yassine Mekdad:
SPRITZ-1.5C: Employing Deep Ensemble Learning for Improving the Security of Computer Networks against Adversarial Attacks. CoRR abs/2209.12195 (2022) - [i20]Ali Sah Özcan, Can Ayduman, Enes Recep Türkoglu, Erkay Savas:
Homomorphic Encryption on GPU. IACR Cryptol. ePrint Arch. 2022: 1222 (2022) - 2021
- [j44]Artrim Kjamilji, Erkay Savas, Albert Levi:
Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms. IEEE Access 9: 8324-8353 (2021) - [j43]Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
Detector+: An approach for detecting, isolating, and preventing timing attacks. Comput. Secur. 110: 102454 (2021) - [j42]Tolun Tosun, Erkay Savas:
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client. J. Inf. Secur. Appl. 59: 102830 (2021) - [j41]Gizem S. Çetin, Erkay Savas, Berk Sunar:
Homomorphic Sorting With Better Scalability. IEEE Trans. Parallel Distributed Syst. 32(4): 760-771 (2021) - [c59]Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme. DATE 2021: 1020-1025 - [c58]Artrim Kjamilji, Albert Levi, Erkay Savas, Osman Berke Güney:
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT. ISNCC 2021: 1-8 - [i19]Seyma Selcan Magara, Ceren Yildirim, Ferhat Yaman, Berke Dilekoglu, Furkan Reha Tutas, Erdinç Öztürk, Kamer Kaya, Öznur Tastan, Erkay Savas:
ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies. CoRR abs/2110.11446 (2021) - [i18]Özgün Özerk, Can Elgezen, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2021: 124 (2021) - [i17]Ferhat Yaman, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme. IACR Cryptol. ePrint Arch. 2021: 485 (2021) - [i16]Arsalan Javeed, Cemal Yilmaz, Erkay Savas:
Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks. IACR Cryptol. ePrint Arch. 2021: 652 (2021) - [i15]Kemal Derya, Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
CoHA-NTT: A Configurable Hardware Accelerator for NTT-based Polynomial Multiplication. IACR Cryptol. ePrint Arch. 2021: 1527 (2021) - 2020
- [j40]Leyli Javid Khayati, Erkay Savas, Halit Alptekin:
Intrusion Detection Over Encrypted Network Data. Comput. J. 63(4): 604-619 (2020) - [j39]Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas:
MeltdownDetector: A runtime approach for detecting meltdown attacks. Future Gener. Comput. Syst. 112: 136-147 (2020) - [j38]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
FPGA implementation of a run-time configurable NTT-based polynomial multiplication hardware. Microprocess. Microsystems 78: 103219 (2020) - [j37]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme. IEEE Trans. Very Large Scale Integr. Syst. 28(2): 353-362 (2020) - [c57]Ahmet Can Mert, Emre Karabulut, Erdinç Öztürk, Erkay Savas, Michela Becchi, Aydin Aysu:
A Flexible and Scalable NTT Hardware : Applications from Homomorphically Encrypted Deep Learning to Post-Quantum Cryptography. DATE 2020: 346-351 - [i14]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Applications. IACR Cryptol. ePrint Arch. 2020: 480 (2020)
2010 – 2019
- 2019
- [j36]Yusuf Kulah, Berkay Dincer, Cemal Yilmaz, Erkay Savas:
SpyDetector: An approach for detecting side-channel attacks at runtime. Int. J. Inf. Sec. 18(4): 393-422 (2019) - [j35]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savas:
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices. IEEE Trans. Computers 68(4): 570-584 (2019) - [c56]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. DSD 2019: 253-260 - [c55]Halit Alptekin, Can Yildizli, Erkay Savas, Albert Levi:
TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework. ICACT 2019: 664-671 - [i13]Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. IACR Cryptol. ePrint Arch. 2019: 109 (2019) - [i12]Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas:
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks. IACR Cryptol. ePrint Arch. 2019: 613 (2019) - 2018
- [j34]Cem Topcuoglu, Kamer Kaya, Erkay Savas:
A generic Private Information Retrieval scheme with parallel multi-exponentiations on multicore processors. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j33]Ali Can Atici, Cemal Yilmaz, Erkay Savas:
Cache-timing attacks without a profiling phase. Turkish J. Electr. Eng. Comput. Sci. 26(4): 1953-1966 (2018) - [j32]Francisco Rodríguez-Henríquez, Erkay Savas:
Special issue in honor of Peter Lawrence Montgomery. J. Cryptogr. Eng. 8(3): 185-187 (2018) - [j31]Erkay Savas, Çetin Kaya Koç:
Montgomery inversion. J. Cryptogr. Eng. 8(3): 201-210 (2018) - [j30]Atil U. Ay, Cuauhtemoc Mancillas-López, Erdinç Öztürk, Francisco Rodríguez-Henríquez, Erkay Savas:
Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level. Microprocess. Microsystems 62: 79-90 (2018) - [j29]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IEEE Trans. Inf. Forensics Secur. 13(5): 1169-1184 (2018) - [c54]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. WAHC@CCS 2018: 61-71 - [c53]David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation Under Entropic Ring LWE. IEEE Symposium on Security and Privacy 2018: 354-371 - 2017
- [j28]Duygu Karaoglan Altop, Muhammed Ali Bingöl, Albert Levi, Erkay Savas:
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks. Ad Hoc Networks 54: 53-68 (2017) - [j27]Gamze Tillem, Erkay Savas, Kamer Kaya:
A New Method for Computational Private Information Retrieval. Comput. J. 60(8): 1238-1250 (2017) - [j26]Erdinç Öztürk, Yarkin Doröz, Erkay Savas, Berk Sunar:
A Custom Accelerator for Homomorphic Encryption Applications. IEEE Trans. Computers 66(1): 3-16 (2017) - [i11]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. IACR Cryptol. ePrint Arch. 2017: 285 (2017) - [i10]Cengiz Örencik, Erkay Savas, Mahmoud Alewiwi:
A Unified Framework for Secure Search Over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2017: 472 (2017) - [i9]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IACR Cryptol. ePrint Arch. 2017: 601 (2017) - [i8]David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation under Entropic Ring LWE. IACR Cryptol. ePrint Arch. 2017: 844 (2017) - [i7]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savas:
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices. IACR Cryptol. ePrint Arch. 2017: 1254 (2017) - 2016
- [j25]Marco Chiappetta, Erkay Savas, Cemal Yilmaz:
Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. 49: 1162-1174 (2016) - [j24]Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas:
Efficient top-k similarity document search utilizing distributed file systems and cosine similarity. Clust. Comput. 19(1): 109-126 (2016) - [j23]Cengiz Örencik, Ayse Selcuk, Erkay Savas, Murat Kantarcioglu:
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Sec. 15(3): 251-269 (2016) - [j22]Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu:
A practical privacy-preserving targeted advertising scheme for IPTV users. Int. J. Inf. Sec. 15(4): 335-360 (2016) - [j21]Mehran Mozaffari Kermani, Erkay Savas, Shambhu J. Upadhyaya:
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems. IEEE Trans. Emerg. Top. Comput. 4(3): 318-320 (2016) - [j20]Ecem Ünal, Erkay Savas:
On Acceleration and Scalability of Number Theoretic Private Information Retrieval. IEEE Trans. Parallel Distributed Syst. 27(6): 1727-1741 (2016) - [c52]Gamze Tillem, Ömer Mert Candan, Erkay Savas, Kamer Kaya:
Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM. Financial Cryptography Workshops 2016: 253-270 - [c51]Atil U. Ay, Erdinç Öztürk, Francisco Rodríguez-Henríquez, Erkay Savas:
Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography. ReConFig 2016: 1-8 - [i6]Ali Can Atici, Cemal Yilmaz, Erkay Savas:
Remote Cache-Timing Attack without Learning Phase. IACR Cryptol. ePrint Arch. 2016: 2 (2016) - 2015
- [j19]Kazim Yumbul, Erkay Savas:
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms . Comput. J. 58(10): 2368-2387 (2015) - [j18]Erkay Savas, Cemal Yilmaz:
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES. Comput. J. 58(10): 2716-2737 (2015) - [j17]Cagatay Karabat, Mehmet S. Kiraz, Hakan Erdogan, Erkay Savas:
THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J. Adv. Signal Process. 2015: 71 (2015) - [c50]Yarkin Doröz, Erdinç Öztürk, Erkay Savas, Berk Sunar:
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware. CHES 2015: 185-204 - [c49]Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Depth Optimized Efficient Homomorphic Sorting. LATINCRYPT 2015: 61-80 - [c48]Cengiz Örencik, Mahmoud Alewiwi, Erkay Savas:
Secure Sketch Search for Document Similarity. TrustCom/BigDataSE/ISPA (1) 2015: 1102-1107 - [e2]Çetin Kaya Koç, Sihem Mesnager, Erkay Savas:
Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9061, Springer 2015, ISBN 978-3-319-16276-8 [contents] - [i5]Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Low Depth Circuits for Efficient Homomorphic Sorting. IACR Cryptol. ePrint Arch. 2015: 274 (2015) - [i4]Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:
Accelerating Somewhat Homomorphic Evaluation using FPGAs. IACR Cryptol. ePrint Arch. 2015: 294 (2015) - [i3]Marco Chiappetta, Erkay Savas, Cemal Yilmaz:
Real time detection of cache-based side-channel attacks using Hardware Performance Counters. IACR Cryptol. ePrint Arch. 2015: 1034 (2015) - 2014
- [j16]Cengiz Örencik, Erkay Savas:
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distributed Parallel Databases 32(1): 119-160 (2014) - [j15]Kazim Yumbul, Erkay Savas, Övünç Kocabas, Johann Großschädl:
Design and implementation of a versatile cryptographic unit for RISC processors. Secur. Commun. Networks 7(1): 36-52 (2014) - [j14]Kazim Yumbul, Serdar Süer Erdem, Erkay Savas:
On Selection of Modulus of Quadratic Codes for the Protection of Cryptographic Operations against Fault Attacks. IEEE Trans. Computers 63(5): 1182-1196 (2014) - [c47]Ecem Ünal, Erkay Savas:
Bandwidth-Optimized Parallel Private Information Retrieval. SIN 2014: 197 - [i2]Cagatay Karabat, Mehmet Sabir Kiraz, Hakan Erdogan, Erkay Savas:
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system. CoRR abs/1409.8212 (2014) - 2013
- [c46]Cengiz Örencik, Murat Kantarcioglu, Erkay Savas:
A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data. IEEE CLOUD 2013: 390-397 - [c45]Shawn Merrill, Nilgun Basalp, Joachim Biskup, Erik Buchmann, Chris Clifton, Bart Kuijpers, Walied Othman, Erkay Savas:
Privacy through Uncertainty in Location-Based Services. MDM (2) 2013: 67-72 - [c44]Erkay Savas:
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. SIN 2013: 7-14 - [c43]Ali Can Atici, Cemal Yilmaz, Erkay Savas:
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks. SERE (Companion) 2013: 74-83 - 2012
- [c42]Yarkin Doröz, Erkay Savas:
Constructing Cluster of Simple FPGA Boards for Cryptologic Computations. ARC 2012: 320-328 - [c41]Cengiz Örencik, Erkay Savas:
Efficient and secure ranked multi-keyword search on encrypted cloud data. EDBT/ICDT Workshops 2012: 186-195 - [c40]Ahmet Onur Durahim, Ismail Fatih Yildirim, Erkay Savas, Albert Levi:
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication. ISCIS 2012: 333-342 - [c39]Selçuk Baktir, Erkay Savas:
Highly-Parallel Montgomery Multiplication for Multi-Core General-Purpose Microprocessors. ISCIS 2012: 467-476 - [c38]Erkay Savas, Cemal Yilmaz:
Cache Attacks: An Information and Complexity Theoretic Approach. NTMS 2012: 1-7 - [c37]Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik:
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. SECRYPT 2012: 74-83 - [i1]Selçuk Baktir, Erkay Savas:
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors. IACR Cryptol. ePrint Arch. 2012: 140 (2012) - 2011
- [j13]Ahmet Onur Durahim, Erkay Savas:
A2-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Networks 9(7): 1202-1220 (2011) - [j12]Murat Ergun, Albert Levi, Erkay Savas:
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach. Comput. J. 54(4): 602-616 (2011) - [j11]Can Yildizli, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi:
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data. Int. J. Data Warehous. Min. 7(1): 46-66 (2011) - [c36]Kazim Yumbul, Serdar Süer Erdem, Erkay Savas:
On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes. FDTC 2011: 69-79 - [c35]Tansu Alpcan, Albert Levi, Erkay Savas:
Digital Trust Games: An Experimental Study. GameSec 2011: 182-200 - 2010
- [j10]Emre Kaplan, Thomas Brochmann Pedersen, Erkay Savas, Yücel Saygin:
Discovering private trajectories using background information. Data Knowl. Eng. 69(7): 723-736 (2010) - [c34]Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas:
A game theoretic model for digital identity and trust in online communities. AsiaCCS 2010: 341-344 - [c33]Duygu Karaoglan, Albert Levi, Erkay Savas:
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. Q2SWinet 2010: 11-18 - [c32]Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas:
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. SIN 2010: 168-177 - [c31]Kazim Yumbul, Serdar Süer Erdem, Erkay Savas:
Design and implementation of robust embedded processor for cryptographic applications. SIN 2010: 178-185
2000 – 2009
- 2009
- [j9]Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin:
Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks 7(1): 136-152 (2009) - [j8]Erdinç Öztürk, Berk Sunar, Erkay Savas:
A versatile Montgomery multiplier architecture with characteristic three support. Comput. Electr. Eng. 35(1): 71-85 (2009) - [j7]Thomas Brochmann Pedersen, Erkay Savas:
Impossibility of unconditionally secure scalar products. Data Knowl. Eng. 68(10): 1059-1070 (2009) - [j6]Ahmet Onur Durahim, Erkay Savas, Berk Sunar, Thomas Brochmann Pedersen, Övünç Kocabas:
Transparent code authentication at the processor level. IET Comput. Digit. Tech. 3(4): 354-372 (2009) - [c30]Murat Ergun, Albert Levi, Erkay Savas:
A resilient key predistribution scheme for multiphase wireless sensor networks. ISCIS 2009: 375-380 - [c29]