Items where Author is "Savaş, Erkay"

Group by: Item Type | No Grouping
Number of items: 132.

Article

Tosun, Tolun and Savaş, Erkay (2024) Zero-value filtering for accelerating non-profiled side-channel attack on incomplete NTT-based implementations of lattice-based cryptography. IEEE Transactions on Information Forensics and Security, 19 . pp. 3353-3365. ISSN 1556-6013 (Print) 1556-6021 (Online)

Özcan, Ali Şah and Ayduman, Can and Türkoğlu, Enes Recep and Savaş, Erkay (2023) Homomorphic encryption on GPU. IEEE Access, 11 . pp. 84168-84186. ISSN 2169-3536

Nowroozi, Ehsan and Mohammadi, Mohammadreza and Savaş, Erkay and Mekdad, Yassine and Conti, Mauro (2023) Employing deep ensemble learning for improving the security of computer networks against adversarial attacks. IEEE Transactions on Network and Service Management, 20 (2). pp. 2096-2105. ISSN 1932-4537

Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay (2023) Microarchitectural side-channel threats, weaknesses and mitigations: a systematic mapping study. IEEE Access, 11 . pp. 48945-48976. ISSN 2169-3536

Mert, Ahmet Can and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Aysu, Aydın (2022) An extensive study of flexible design methods for the number theoretic transform. IEEE Transactions on Computers, 71 (11). pp. 2829-2843. ISSN 0018-9340 (Print) 1557-9956 (Online)

Derya, Kemal and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2022) CoHA-NTT: a configurable hardware accelerator for NTT-based polynomial multiplication. Microprocessors and Microsystems, 89 . ISSN 0141-9331 (Print) 1872-9436 (Online)

Özerk, Özgün and Elgezen, Can and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2022) Efficient number theoretic transform implementation on GPU for homomorphic encryption. Journal of Supercomputing, 78 (2). pp. 2840-2872. ISSN 0920-8542 (Print) 1573-0484 (Online)

Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2022) Low-latency ASIC algorithms of modular squaring of large integers for VDF evaluation. IEEE Transactions on Computers, 71 (1). pp. 107-120. ISSN 0018-9340 (Print) 1557-9956 (Online)

Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay (2021) Detector+: an approach for detecting, isolating, and preventing timing attacks. Computers and Security, 110 . ISSN 0167-4048 (Print) 1872-6208 (Online)

Tosun, Tolun and Savaş, Erkay (2021) FSDS: a practical and fully secure document similarity search over encrypted data with lightweight client. Journal of Information Security and Applications, 59 . ISSN 2214-2134 (Print) 2214-2126 (Online)

Çetin, Gizem S. and Savaş, Erkay and Sunar, Berk (2021) Homomorphic sorting with better scalability. IEEE Transactions on Parallel and Distributed Systems, 32 (4). pp. 760-771. ISSN 1045-9219 (Print) 1558-2183 (Online)

Kjamilji, Artrim and Savaş, Erkay and Levi, Albert (2021) Efficient secure building blocks with application to privacy preserving machine learning algorithms. IEEE Access, 9 . pp. 8324-8353. ISSN 2169-3536

Akyıldız, Taha Atahan and Güzgeren, Can Berk and Yılmaz, Cemal and Savaş, Erkay (2020) MeltdownDetector: a runtime approach for detecting meltdown attacks. Future Generation Computer Systems, 112 . pp. 136-147. ISSN 0167-739X (Print) 1872-7115 (Online)

Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2020) FPGA implementation of a run-time configurable NTT-based polynomial multiplication hardware. Microprocessors and Microsystems, 78 . ISSN 0141-9331 (Print) 1872-9436 (Online)

Karaçay, Leyli and Savaş, Erkay and Alptekin, Halit (2020) Intrusion detection over encrypted network data. Computer Journal, 63 (4). pp. 604-619. ISSN 0010-4620 (Print) 1460-2067 (Online)

Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2020) Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 28 (2). pp. 353-362. ISSN 1063-8210 (Print) 1557-9999 (Online)

Külah, Yusuf and Dinçer, Berkay and Yılmaz, Cemal and Savaş, Erkay (2019) SpyDetector: an approach for detecting side-channel attacks at runtime. International Journal of Information Security, 18 (4). pp. 393-422. ISSN 1615-5262 (Print) 1615-5270 (Online)

Gür, Kamil D. and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Sajjadpour, Hadi and Savaş, Erkay (2019) Practical applications of improved Gaussian sampling for trapdoor lattices. IEEE Transactions on Computers, 68 (4). pp. 570-584. ISSN 0018-9340 (Print) 1557-9956 (Online)

Topcuoğlu, Cem and Kaya, Kamer and Savaş, Erkay (2018) A generic private information retrieval scheme with parallel multi-exponentiations on multicore processors. Concurrency and Computation: Practice and Experience (SI), 30 (21). ISSN 1532-0626 (Print) 1532-0634 (Online)

Ay, Atıl Utku and Mancillas-López, Cuauhtémoc and Öztürk, Erdinç and Rodríguez-Henríquez, Francisco and Savaş, Erkay (2018) Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level. Microprocessors and Microsystems, 62 . pp. 79-90. ISSN 0141-9331 (Print) 1872-9436 (Online)

Savaş, Erkay and Koç, Çetin Kaya (2018) Montgomery inversion. Journal of Cryptographic Engineering, 8 (3). pp. 201-210. ISSN 2190-8508 (Print) 2190-8516 (Online)

Rodríguez-Henríquez, Francisco and Savaş, Erkay (2018) Special issue in honor of Peter Lawrence Montgomery. Journal of Cryptographic Engineering (SI), 8 (3). pp. 185-187. ISSN 2190-8508 (Print) 2190-8516 (Online)

Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay (2018) Cache-timing attacks without a profiling phase. Turkish Journal of Electrical Engineering and Computer Sciences, 26 (4). pp. 1953-1966. ISSN 1300-0632 (Print) 1303-6203 (Online)

Dai, Wei and Doroz, Yarkın and Polyakov, Yuriy and Rohloff, Kurt and Sajjadpour, Hadi and Savaş, Erkay and Sunar, Berk (2018) Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Transactions on Information Forensics & Security, 13 (5). pp. 1169-1184. ISSN 1556-6013 (Print) 1556-6021 (Online)

Tillem, Gamze and Savaş, Erkay and Kaya, Kamer (2017) A new method for computational private information retrieval. Computer Journal, 60 (8). pp. 1238-1250. ISSN 0010-4620 (Print) 1460-2067 (Online)

Karaoğlan Altop, Duygu and Bingöl, Muhammed Ali and Levi, Albert and Savaş, Erkay (2017) DKEM: secure and efficient distributed key establishment protocol for wireless mesh networks. Ad Hoc Networks, 54 . pp. 53-68. ISSN 1570-8705 (Print) 1570-8713 (Online)

Öztürk, Erdinç and Doröz, Yarkın and Savaş, Erkay and Sunar, Berk (2017) A custom accelerator for homomorphic encryption applications. IEEE Transactions on Computers, 66 (1). pp. 3-16. ISSN 0018-9340 (Print) 1557-9956 (Online)

Chiappetta, Marco and Savaş, Erkay and Yılmaz, Cemal (2016) Real time detection of cache-based side-channel attacks using hardware performance counters. (Accepted)

Khayati, Leyli Javid and Örencik, Cengiz and Savaş, Erkay and Ustaoğlu, Berkant (2016) A practical privacy-preserving targeted advertising scheme for IPTV users. International Journal of Information Security, 15 (4). pp. 335-360. ISSN 1615-5262 (Print) 1615-5270 (Online)

Ünal, Ecem and Savaş, Erkay (2016) On acceleration and scalability of number theoretic private information retrieval. IEEE Transactions on Parallel & Distributed Systems, 27 (6). pp. 1727-1741. ISSN 1045-9219 (Print) 1558-2183 (Online)

Örencik, Cengiz and Selçuk, Ayşe and Savaş, Erkay and Kantarcıoğlu, Murat (2016) Multi-keyword search over encrypted data with scoring and search pattern obfuscation. International Journal of Information Security, 15 (3). pp. 251-269. ISSN 1615-5262 (Print) 1615-5270 (Online)

Alewiwi, Mahmoud Khaled and Örencik, Cengiz and Savaş, Erkay (2016) Efficient top-k similarity document search utilizing distributed file systems and cosine similarity. Cluster Computing, 19 (1). pp. 109-126. ISSN 1386-7857 (Print) 1573-7543 (Online)

Savaş, Erkay and Yılmaz, Cemal (2015) A generic method for the analysis of a class of cache attacks: a case study for AES. Computer Journal, 58 (10). pp. 2716-2737. ISSN 0010-4620 (Print) 1460-2067 (Online)

Yumbul, Kazım and Savaş, Erkay (2015) Enhancing an embedded processor core for efficient and isolated execution of cryptographic algorithms. Computer Journal, 58 (10). pp. 2368-2387. ISSN 0010-4620 (Print) 1460-2067 (Online)

Karabat, Çağatay and Kiraz, Mehmet Sabir and Erdoğan, Hakan and Savaş, Erkay (2015) THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP Journal on Advances in Signal Processing . ISSN 1687-6172 (Print) 1687-6180 (Online)

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2014) On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks. IEEE Transactions on Computers, 63 (5). pp. 1182-1196. ISSN 0018-9340 (Print) 1557-9956 (Online)

Örencik, Cengiz and Savaş, Erkay (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distributed and Parallel Databases, 32 (1). pp. 119-160. ISSN 0926-8782 (Print) 1573-7578 (Online)

Yumbul, Kazım and Savaş, Erkay and Kocabaş, Övünç and Großschädl, Johann (2014) Design and implementation of a versatile cryptographic unit for RISC processors. Security and Communication Networks, 7 (1). pp. 36-52. ISSN 1939-0114 (Print) 1939-0122 (Online)

Durahim, Onur Ahmet and Savaş, Erkay (2011) A(2)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Networks, 9 (7). pp. 1202-1220. ISSN 1570-8705

Ergun, Murat and Levi, Albert and Savaş, Erkay (2011) Increasing resiliency in multi-phase wireless sensor networks: generationwise key predistribution approach. The Computer Journal, 54 (4). pp. 602-616. ISSN 0010-4620

Yıldızlı, Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2011) Distributed privacy preserving clustering via homomorphic secret sharing and its application to (vertically) partitioned spatio-temporal data. International Journal of Data Warehousing and Mining, 7 (1). pp. 46-66. ISSN 1548-3924 (Print) 1548-3932 (Online)

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2010) Securing fuzzy vault schemes through biometric hashing. Turkish Journal of Electrical Engineering &Computer Sciences, 18 (4). pp. 515-539. ISSN 1300-0632

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2010) Discovering private trajectories using background information. Data and Knowledge Engineering (Sp. Iss. SI), 69 (7). pp. 723-736. ISSN 0169-023X

Savaş, Erkay and Koç, Çetin Kaya (2010) Finite field arithmetic for cryptography. IEEE Circuits and Systems Magazine, 10 (2). pp. 40-56. ISSN 1531-636X

Pedersen, Thomas Brochmann and Savaş, Erkay (2009) Impossibility of unconditionally secure scalar products. Data and Knowledge Engineering, 68 (10). pp. 1059-1070. ISSN 0169-023X

Durahim, Onur Ahmet and Savaş, Erkay and Sunar, Berk and Pedersen, Thomas Brochmann and Kocabaş, Övünç (2009) Transparent code authentication at the processor level. IET Computers & Digital Techniques, 3 (4). pp. 354-372. ISSN 1751-8601

Öztürk, Erdinç and Sunar, Berk and Savaş, Erkay (2009) A versatile montgomery multiplier architecture with characteristic three support. Computers & Electrical Engineering, 35 (1). pp. 71-85. ISSN 0018-9340

Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks, 7 (1). pp. 136-152. ISSN 1570-8705

Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel (2008) Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties. Knowledge-Based Intelligent Information and Engineering Systems, 5178 . pp. 642-649. ISSN 0302-9743 (Print) 1611-3349 (Online)

Gaubatz, Gunnar and Savaş, Erkay and Sunar, Berk (2008) Sequential circuit design for embedded cryptographic applications resilient to adversarial faults. IEEE Transactions on Computers, 57 (1). pp. 126-138. ISSN 0018-9340

İnan, Ali and Kaya, Selim Volkan and Saygın, Yücel and Savaş, Erkay and Azgın Hintoğlu, Ayça and Levi, Albert (2007) Privacy preserving clustering on horizontally partitioned data. Data & Knowledge Engineering, 63 (3). pp. 646-666. ISSN 0169023X

Savaş, Erkay (2005) A carry-free architecture for Montgomery inversion. IEEE Transactions on Computers, 54 (12). pp. 1508-1519. ISSN 0018-9340

Öniz, Çağıl Can and Savaş, Erkay and Levi, Albert (2005) A fair multimedia exchange protocol. Lecture notes in computer science, 3733 . 342- 351. ISSN 0302-9743 (Print) 1611-3349 (Online)

Großschädl, Johann and Avanzi, Roberto M. and Savaş, Erkay and Tillich, Stefan (2005) Energy-efficient software implementation of long integer modular arithmetic. Lecture Notes in Computer Science, 3659 . pp. 75-90. ISSN 0302-9743 (Print) 1611-3349 (Online)

Savaş, Erkay and Naseer, Mansoor and Gutub, Adnan Abdül-Aziz and Koç, Çetin Kaya (2005) Efficient unified Montgomery inversion with multibit shifting. IEE Proceedings - Computers and Digital Techniques, 152 (4). pp. 489-498. ISSN 1350-2387

Grossschadl, Johann and Savaş, Erkay (2004) Instruction set extensions for fast arithmetic in finite fields GF(p) and GF(2(m)). Lecture Notes in Computer Science (Cryptographic Hardware and Embedded Systems - CHES 2004, Proceedings), 3156 . pp. 133-147. ISSN 0302-9743 (Print) 1611-3349 (Online)

Tenca, A. F. and Savaş, Erkay and Koç, C. K. (2004) A design framework for scalable and unified architectures that perform multiplication in GF(p) and GF(2^m). International Journal of Computer Research, 13 (1). pp. 68-83. ISSN 1535-6698

Savaş, Erkay and Tenca, A. F. and Çiftçibaşı, M. E. and Koç, Çetin Kaya (2004) Multiplier architectures for GF(p) and GF(2^k). IEE Proceedings - Computers and Digital Techniques, 151 (2). pp. 147-160. ISSN 1350-2387

Sunar, Berk and Savaş, Erkay and Koç, Çetin Kaya (2003) Constructing composite field representations for efficient conversion. IEEE Transactions on Computers, 52 (11). pp. 1391-1398. ISSN 0018-9340

Papers in Conference Proceedings

Can, Furkan and Üstün, Ali and Örs, Berna and Alaybeyoğlu, Ersin and Savaş, Erkay (2024) Hardware implementation of K2RED and plantard modular multiplication algorithms in post-quantum cryptography. In: Panhellenic Conference on Electronics & Telecommunications (PACET), Thessaloniki, Greece

Mert, Ahmet Can and Yaman, Ferhat and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Aysu, Aydin (2023) A survey of software implementations for the number theoretic transform. In: 23rd International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2023, Samos

Ayduman, Can and Koçer, Emre and Kırbıyık, Selim and Mert, Ahmet Can and Savaş, Erkay (2023) Efficient design-time flexible hardware architecture for accelerating homomorphic encryption. In: IFIP/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC), Dubai, United Arab Emirates

Durmaz, Fatih and Kamadan, Nureddin and Öz, Melih Taha and Ünal, Musa Sadık and Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay (2023) TimeInspector: a static analysis approach for detecting timing attacks. In: IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Delft, Netherlands

Ünal, Musa Sadık and Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay (2022) HyperDetector: detecting, isolating, and mitigating timing attacks in virtualized environments. In: 21st International Conference on Cryptology and Network Security (CANS 2022), Abu Dhabi, United Arab Emirates

Türkoğlu, Enes Recep and Özcan, Ali Şah and Ayduman, Can and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2022) An accelerated GPU library for homomorphic encryption operations of BFV scheme. In: IEEE International Symposium on Circuits and Systems (ISCAS), Austin, TX, USA

Kjamilji, Artrim and Levi, Albert and Savaş, Erkay and Güney, Osman Berke (2021) Secure matrix operations for machine learning classifications over encrypted data in post quantum industrial IoT. In: International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates

Yaman, Ferhat and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2021) A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France

Mert, Ahmet Can and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Becchi, Michele and Aysu, Aydın (2020) A flexible and scalable NTT hardware: applications from homomorphically encrypted deep learning to post-quantum cryptography. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France

Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay (2019) Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture. In: 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, Greece

Alptekin, Halit and Yıldızlı, Can and Savaş, Erkay and Levi, Albert (2019) TRAPDROID: bare-metal android malware behavior analysis framework. In: 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, South Korea

Gür, Kamil Doruk and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Savaş, Erkay (2018) Implementation and evaluation of improved Gaussian sampling for lattice trapdoors. In: 6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018, Toronto, Canada

Cousins, David Bruce and Di Crescenzo, Giovanni and Gür, Kamil Doruk and King, Kevin and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Savaş, Erkay (2018) Implementing conjunction obfuscation under entropic ring LWE. In: IEEE Symposium on Security and Privacy (SP 2018), San Francisco, California, USA

Topçuoğlu, Cem and Kaya, Kamer and Savaş, Erkay (2017) Multi-exponentiations on multi-cores. In: 5. Ulusal Yüksek Başarımlı Hesaplama Konferansı (BAŞARIM 2017), İstanbul, Türkiye (Accepted)

Ay, Atıl Utku and Öztürk, Erdinç and Henriquez, Francisco Rodriguez and Savaş, Erkay (2016) Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography. In: International Conference on Reconfigurable Computing and FPGAs (ReConFig), Cancun, Mexico

Tillem, Gamze and Candan, Ömer Mert and Savaş, Erkay and Kaya, Kamer (2016) Hiding access patterns in range queries using private information retrieval and ORAM. In: International Workshops on Financial Cryptography and Data Security, Christ Church, Barbados

Doröz, Yarkın and Öztürk, Erdinç and Savaş, Erkay and Sunar, Berk (2015) Accelerating LTV based homomorphic encryption in reconfigurable hardware. In: 17th International Workshop - Cryptographic Hardware and Embedded Systems (CHES 2015), Saint-Malo, France

Örencik, Cengiz and Alewiwi, Mahmoud Khaled and Savaş, Erkay (2015) Secure sketch search for document similarity. In: IEEE Trustcom/BigDataSE/ISPA 2015, Helsinki

Çetin, Gizem Selcan and Doröz, Yarkın and Sunar, Berk and Savaş, Erkay (2015) Depth optimized efficient homomorphic sorting. In: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico

Selçuk, Ayşe and Örencik, Cengiz and Savaş, Erkay (2015) Private search over big data leveraging distributed file system and parallel processing. In: Sixth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2015), Nice, France

Ünal, Ecem and Savaş, Erkay (2014) Bandwidth-optimized parallel private information retrieval. In: Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, Glasgow, UK (Accepted)

Savaş, Erkay (2013) Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. In: 6th International Conference on Security of Information and Networks (SIN 2013), Aksaray, Turkey

Örencik, Cengiz and Kantarcıoğlu, Murat and Savaş, Erkay (2013) A practical and secure multi-keyword search method over encrypted cloud data. In: IEEE Sixth International Conference on Cloud Computing (CLOUD 2013), Santa Clara, CA

Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay (2013) An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks. In: IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C 2013), Gaithersburg, MD

Merrill, Shawn and Başalp, Nilgün and Biskup, Joachim and Buchmann, Erik and Clifton, Chris and Kuijpers, Bart and Othman, Walied and Savaş, Erkay (2013) Privacy through uncertainty in location-based services. In: IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy

Durahim, Onur Ahmet and Yıldırım, İsmail Fatih and Savaş, Erkay and Levi, Albert (2013) Performance evaluation of different CRL distribution schemes embedded in WMN authentication. In: 27th International Symposium on Computer and Information Sciences (ISCIS 2012), Paris, France

Savaş, Erkay and Yılmaz, Cemal (2012) Cache attacks: an information and complexity theoretic approach. In: 5th International Conference on New Technologies, Mobility and Security (NTMS), Istanbul, Turkey

Doröz, Yarkın and Savaş, Erkay (2012) Constructing cluster of simple FPGA boards for cryptologic computations. In: 8th International Symposium (ARC 2012), Hong Kong, China

Örencik, Cengiz and Savaş, Erkay (2012) Efficient and secure ranked multi-keyword search on encrypted cloud data. In: 2012 Joint EDBT/ICDT Workshops, Berlin, Germany

Baktır, Selçuk and Savaş, Erkay (2012) Highly-parallel Montgomery multiplication for multi-core general-purpose microprocessors. In: 27th International Symposium on Computer and Information Sciences (ISCIS 2012), Paris, France

Javid Khayati, Leyli and Savaş, Erkay and Ustaoğlu, Berkant and Örencik, Cengiz (2012) Privacy-preserving targeted advertising scheme for IPTV using the cloud. In: International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2011) On protecting cryptographic applications against fault attacks using residue codes. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011), Nara, Japan

Murat, Ertuğrul and Kardaş, Süleyman and Savaş, Erkay (2011) Scalable and efficient FPGA implementation of Montgomery inversion. In: Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec 2011), Istanbul, Turkey

Alpcan, Tansu and Levi, Albert and Savaş, Erkay (2011) Digital trust games: an experimental study. In: Second International Conference on Decision and Game Theory for Security (GameSec 2011), College Park, Maryland, USA

Karaoğlan Altop, Duygu and Levi, Albert and Savaş, Erkay (2010) A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. In: 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet '10), Bodrum, Turkey

Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay (2010) Design and implementation of robust embedded processor for cryptographic applications. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

Durahim, Onur Ahmet and Savaş, Erkay (2010) A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs. In: Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), Barcelona, Spain

Alpcan, Tansu and Örencik, Cengiz and Levi, Albert and Savaş, Erkay (2010) A game theoretic model for digital identity and trust in online communities. In: 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China

Akın, Abdulkadir and Aysu, Aydın and Ulusel, Onur Can and Savaş, Erkay (2010) Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. In: 3rd International Conference on Security of Information and Networks (SIN '10), Taganrog, Russia

Yumbul, Kazım and Savaş, Erkay (2009) Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. In: 2nd International Conference on Security of Information and Networks, SIN 2009, North Cyprus, Turkey

Grossschaedl, Johann and Savaş, Erkay and Yumbul, Kazım (2009) Realizing arbitrary-precision modular multiplication with a fixed-precision multiplier datapath. In: 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig09, Cancun, Mexico (Accepted)

Ergun, Murat and Levi, Albert and Savaş, Erkay (2009) A resilient key predistribution scheme for multiphase wireless sensor networks. In: 24th International Symposium on Computer and Information Sciences, 2009 (ISCIS 2009), Güzelyurt, North Cyprus

Durahim, Onur Ahmet and Savaş, Erkay and Yumbul, Kazım (2009) Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms. In: 2009 International Conference on ReConFigurable Computing and FPGAs (ReConFig09), Cancun, Mexico

Karatop, Ayşe Gül and Savaş, Erkay (2008) An identity-based key infrastructure suitable for messaging and its application to e-mail. In: 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey

Kocabaş, Övünç and Savaş, Erkay (2008) Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security. In: 2008 International Conference on ReConFigurable Computing and FPGAs, (Accepted)

Öksüzoğlu, Ersin and Savaş, Erkay (2008) Parametric, Secure and Compact Implementation of RSA on FPGA. In: 2008 International Conference on ReConFigurable Computing and FPGAs, (Accepted)

Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet (2008) Improved fuzzy vault scheme for fingerprint verification. In: International Conference on Security and Cryptography, Porto, Portugal

Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay (2008) Multiphase deployment models for fast self healing in wireless sensor networks. In: International Conference on Security and Cryptography, SECRYPT 2008, Porto, Portugal

Kömürcü, Giray and Savaş, Erkay (2008) An Efficient hardware implementation of the tate pairing in characteristic three. In: The Third International Conference on Systems, ICONS 2008, Cancun, Mexico

Doğanay, Mahir Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert (2008) Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008,, Nantes, France

Karatop, Ayşe Gül and Savaş, Erkay (2007) An identity-based key infrastructure suitable for messaging applications. In: 2. Uluslarası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, Ankara

Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay (2007) Secret charing vs. encryption-based techniques for privacy preserving data mining. In: Joint UNECE/Eurostat Work Session on Statistical Disclosure Control,

Savaş, Erkay (2007) Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing. In: PAKDD 2007, (Accepted)

Ünlü, Abdülhakim and Armağan, Önsel and Levi, Albert and Savaş, Erkay and Erçetin, Özgür (2007) Key predistribution schemes for sensor networks for continuous deployment scenario. In: 6th International IFIP-TC6 Networking Conference, Atlanta GA USA

Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür (2007) Privacy-aware multi-context RFID infrastructure using public key cryptography. In: 6th International IFIP-TC6 Networking Conference, Atlanta GA USA

Öniz, Çağıl Can and Savaş, Erkay and Levi, Albert (2006) An optimistic fair e-commerce protocol for large e-goods. In: 7th International Symposium on Computer Networks (ISCN' 06), Istanbul, Turkey

Gutub, Adnan Abdül-Aziz and Savaş, Erkay and Kalganova, Tatiana (2006) Scalable VLSI design for fast GF(p) montgomery inverse computation. In: IEEE International Conference on Computer & Communication Engineering (ICCCE '06), Malaysia

İnan, Ali and Saygın, Yücel and Levi, Albert and Savaş, Erkay and Hintoğlu, Ayça Azgın (2006) Privacy preserving clustering on horizontally partitioned data. In: 22nd International Conference on Data Engineering Workshops (ICDEW'06), Atlanta, Georgia

Yanıkoğlu, Berrin and Levi, Albert and Savaş, Erkay and Kholmatov, Alisher Anatolyevich (2006) Secret sharing using biometric traits. In: Biometric Technology For Human Identification, Orlando, FL, USA

Sunar, Berk and Savaş, Erkay (2005) A practical and secure communication protocol in the bounded storage model. In: 4th International Conference on Networking, ICN'05, Reunion Islands, France

Öniz, Çağıl Can and Taşçı, Sinan Emre and Savaş, Erkay and Erçetin, Özgür and Levi, Albert (2005) SeFER: secure, flexible and efficient routing protocol for distributed sensor networks. In: 2nd European Workshop on Wireless Sensor Networks, İstanbul, Turkey

Öztürk, Erdem and Sunar, Berk and Savaş, Erkay (2004) Low-power elliptic curve cryptography using scaled modular arithmetic. In: 6th Internatioanl Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Cambridge, MA

Ocakoğlu, Özleyiş and Bayoğlu, Burak and Levi, Albert and Erçetin, Özgür and Savaş, Erkay (2004) A probabilistic routing disruption attack on DSR and its analysis. In: MEDHOCNET 2004, Bodrum, Turkey

Savaş, Erkay and Naseer, Mansoor (2003) Hardware implementation of a novel inversion algorithm. In: 46th IEEE International Midwest Symposium on Circuits and Systems, Cairo, Egypt

Book

Koç, Çetin Kaya and Mesnager, Sihem and Savaş, Erkay (2015) Arithmetic of finite fields: 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised selected papers. Lecture Notes in Computer Science, 9061. Springer, Switzerland. ISBN 978-3-319-16276-8 (Print) 978-3-319-16277-5 (Online)

Book Section / Chapter

Nowroozi, Ehsan and Seyedshoari, Seyedsadra and Mekdad, Yassine and Savaş, Erkay and Conti, Mauro (2023) Cryptocurrency wallets: assessment and security. In: Maleh, Yassine and Alazab, Mamoun and Romdhani, Imed, (eds.) Blockchain for Cybersecurity in Cyber-Physical Systems. Advances in Information Security, 102. Springer, Switzerland, pp. 1-19. ISBN 978-3-031-25505-2 (Print) 978-3-031-25506-9 (Online)

Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay (2009) Achieving fast self healing in wireless sensor networks using multi-generation deployment schemes. In: Filipe, Joaquim and Obaidat, Mohammad S., (eds.) UNSPECIFIED Communications in Computer and Information Science, 48. Springer, Berlin, Germany, pp. 180-198. ISBN 978-3-642-05196-8 (Print) 978-3-642-05197-5 (Online)

Savaş, Erkay and Koç, Çetin Kaya (2009) Efficient unified arithmetic for hardware cryptography. In: Koç, Çetin Kaya, (ed.) Cryptographic Engineering. Springer, Germany, pp. 105-124. ISBN 978-0-387-71816-3

Bonchi, Francesco and Saygın, Yücel and Verykios, Vassilis and Atzori, Maurizio and Goukalas, Aris and Kaya, Volkan and Savaş, Erkay (2008) Privacy in spatiotemporal data mining. In: Giannotti, Fosca and Pedreschi, Dino, (eds.) Mobility, data mining, and privacy: geographic knowledge discovery. Springer Heidelberg, Berlin, pp. 297-333. ISBN 9783540751762

Savaş, Erkay (2007) Binary algorithms for multiplicative inversion. Wireless Security and Cryptography: Specifications and Implementations. Taylor & Francis, Oxford, pp. 1-432. ISBN 084938771X

Volumes Edited / Special Issues

Mozaffari Kermani, Mehran and Savaş, Erkay and Upadhyaya, Shambhu J. (2016) Guest editorial: introduction to the special issue on emerging security trends for deeply-embedded computing systems. [Volumes Edited / Special Issues]

Levi, Albert and Savaş, Erkay and Yenigün, Hüsnü and Balcısoy, Selim and Saygın, Yücel (2006) Proceedings of computer and information sciences - ISCIS 2006. [Volumes Edited / Special Issues]

Levi, Albert and Savaş, Erkay and Yenigün, Hüsnü and Balcısoy, Selim and Saygın, Yücel (2006) Computer and information sciences-ISCIS 2006. [Volumes Edited / Special Issues]

This list was generated on Tue Dec 31 02:02:54 2024 +03.