Items where Author is "Sunar, Berk"

Group by: Item Type | No Grouping
Number of items: 11.

Çetin, Gizem S. and Savaş, Erkay and Sunar, Berk (2021) Homomorphic sorting with better scalability. IEEE Transactions on Parallel and Distributed Systems, 32 (4). pp. 760-771. ISSN 1045-9219 (Print) 1558-2183 (Online)

Dai, Wei and Doroz, Yarkın and Polyakov, Yuriy and Rohloff, Kurt and Sajjadpour, Hadi and Savaş, Erkay and Sunar, Berk (2018) Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Transactions on Information Forensics & Security, 13 (5). pp. 1169-1184. ISSN 1556-6013 (Print) 1556-6021 (Online)

Öztürk, Erdinç and Doröz, Yarkın and Savaş, Erkay and Sunar, Berk (2017) A custom accelerator for homomorphic encryption applications. IEEE Transactions on Computers, 66 (1). pp. 3-16. ISSN 0018-9340 (Print) 1557-9956 (Online)

Doröz, Yarkın and Öztürk, Erdinç and Savaş, Erkay and Sunar, Berk (2015) Accelerating LTV based homomorphic encryption in reconfigurable hardware. In: 17th International Workshop - Cryptographic Hardware and Embedded Systems (CHES 2015), Saint-Malo, France

Çetin, Gizem Selcan and Doröz, Yarkın and Sunar, Berk and Savaş, Erkay (2015) Depth optimized efficient homomorphic sorting. In: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico

Durahim, Onur Ahmet and Savaş, Erkay and Sunar, Berk and Pedersen, Thomas Brochmann and Kocabaş, Övünç (2009) Transparent code authentication at the processor level. IET Computers & Digital Techniques, 3 (4). pp. 354-372. ISSN 1751-8601

Öztürk, Erdinç and Sunar, Berk and Savaş, Erkay (2009) A versatile montgomery multiplier architecture with characteristic three support. Computers & Electrical Engineering, 35 (1). pp. 71-85. ISSN 0018-9340

Gaubatz, Gunnar and Savaş, Erkay and Sunar, Berk (2008) Sequential circuit design for embedded cryptographic applications resilient to adversarial faults. IEEE Transactions on Computers, 57 (1). pp. 126-138. ISSN 0018-9340

Sunar, Berk and Savaş, Erkay (2005) A practical and secure communication protocol in the bounded storage model. In: 4th International Conference on Networking, ICN'05, Reunion Islands, France

Öztürk, Erdem and Sunar, Berk and Savaş, Erkay (2004) Low-power elliptic curve cryptography using scaled modular arithmetic. In: 6th Internatioanl Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Cambridge, MA

Sunar, Berk and Savaş, Erkay and Koç, Çetin Kaya (2003) Constructing composite field representations for efficient conversion. IEEE Transactions on Computers, 52 (11). pp. 1391-1398. ISSN 0018-9340

This list was generated on Sun May 5 02:46:40 2024 +03.