Volgen
Erkay Savas
Erkay Savas
Geverifieerd e-mailadres voor sabanciuniv.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Real time detection of cache-based side-channel attacks using hardware performance counters
M Chiappetta, E Savas, C Yilmaz
Applied Soft Computing 49, 1162-1174, 2016
2442016
A scalable and unified multiplier architecture for finite fields GF (p) and GF (2^ m)
E Savas, AF Tenca, CK Koç
CHES, 277-292, 2000
2222000
Privacy preserving clustering on horizontally partitioned data
A Inan, SV Kaya, Y Saygın, E Savaş, AA Hintoğlu, A Levi
Data & Knowledge Engineering 63 (3), 646-666, 2007
1852007
The Montgomery modular inverse-revisited
E Savas, CK Koç
IEEE transactions on computers 49 (7), 763-766, 2000
1832000
Low-power elliptic curve cryptography using scaled modular arithmetic
E Öztürk, B Sunar, E Savaş
International Workshop on Cryptographic Hardware and Embedded Systems, 92-106, 2004
1012004
A practical and secure multi-keyword search method over encrypted cloud data
C Orencik, M Kantarcioglu, E Savas
2013 IEEE Sixth International Conference on Cloud Computing, 390-397, 2013
982013
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )
J Großschädl, E Savaş
International Workshop on Cryptographic Hardware and Embedded Systems, 133-147, 2004
902004
Distributed privacy preserving k-means clustering with additive secret sharing
MC Doganay, TB Pedersen, Y Saygin, E Savaş, A Levi
Proceedings of the 2008 international workshop on Privacy and anonymity in …, 2008
892008
Incomplete reduction in modular arithmetic
T Yanık, E Savaş, ÇK Koç
IEE Proceedings-Computers and Digital Techniques 149 (2), 46-52, 2002
842002
Energy-efficient software implementation of long integer modular arithmetic
J Großschädl, RM Avanzi, E Savaş, S Tillich
International Workshop on Cryptographic Hardware and Embedded Systems, 75-90, 2005
772005
Efficient and secure ranked multi-keyword search on encrypted cloud data
C Örencik, E Savaş
Proceedings of the 2012 Joint EDBT/ICDT Workshops, 186-195, 2012
722012
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n)
A Abdul-Aziz Gutub, AF Tenca, E Savaş, RCCK Koç
International Workshop on Cryptographic Hardware and Embedded Systems, 484-499, 2002
662002
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
C Örencik, E Savaş
Distributed and Parallel Databases 32 (1), 119-160, 2014
612014
Finite field arithmetic for cryptography
E Savaş, ÇK Koç
IEEE Circuits and Systems Magazine 10 (2), 40-56, 2010
602010
Public key cryptography based privacy preserving multi-context RFID infrastructure
SV Kaya, E Savaş, A Levi, Ö Erçetin
Ad Hoc Networks 7 (1), 136-152, 2009
592009
Constructing composite field representations for efficient conversion
B Sunar, E Savas, CK Koç
IEEE Transactions on computers 52 (11), 1391-1398, 2003
582003
Multiplier architectures for GF (p) and GF (2n)
E Savas, AF Tenca, ME Ciftcibasi, CK Koc
IEE Proceedings-Computers and Digital Techniques 151 (2), 147-160, 2004
562004
Secret charing vs. encryption-based techniques for privacy preserving data mining
TB Pedersen, Y Saygın, E Savaş
Eurostat, 2007
552007
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing
A Akin, A Aysu, OC Ulusel, E Savaş
Proceedings of the 3rd International Conference on Security of Information …, 2010
542010
Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme
AC Mert, E Öztürk, E Savaş
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (2), 353-362, 2019
512019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20