default search action
Çetin Kaya Koç
Person information
- affiliation: University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Junhao Huang, Alexandre Adomnicai, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 1-24 (2024) - [j57]Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie:
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 451-480 (2024) - [j56]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. IEEE Trans. Inf. Forensics Secur. 19: 3800-3813 (2024) - [c47]Pengzhou He, Ben Mongirdas, Çetin Kaya Koç, Jiafeng Xie:
LAMP: Efficient Implementation of Lightweight Accelerator for Polynomial MultiPlication, From Falcon to RBLWE-ENC. ACM Great Lakes Symposium on VLSI 2024: 210-215 - [c46]Mingshen Huang, Weiwei Yuan, Donghai Guan, Mengze Lu, Çetin Kaya Koç:
Guided Particle Adaptation PSO for Feature Selection on High-dimensional Classification. ICIC (1) 2024: 14-26 - [c45]Pengzhou He, Tianyou Bao, Çetin Kaya Koç, Jiafeng Xie:
HELP: Highly Efficient and Low-Latency Hardware Accelerator for Integer Polynomial Multiplication. ISVLSI 2024: 355-360 - [c44]Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç:
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519. USENIX Security Symposium 2024 - [i15]Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç:
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. IACR Cryptol. ePrint Arch. 2024: 1515 (2024) - [i14]Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, Wangchen Dai:
Efficient Key-Switching for Word-Type FHE and GPU Acceleration. IACR Cryptol. ePrint Arch. 2024: 1629 (2024) - 2023
- [j55]Pengzhou He, Yazheng Tu, Çetin Kaya Koç, Jiafeng Xie:
Hardware-Implemented Lightweight Accelerator for Large Integer Polynomial Multiplication. IEEE Comput. Archit. Lett. 22(1): 57-60 (2023) - [j54]Gaoyu Mao, Donglong Chen, Guangyan Li, Wangchen Dai, Abdurrashid Ibrahim Sanka, Çetin Kaya Koç, Ray C. C. Cheung:
High-performance and Configurable SW/HW Co-design of Post-quantum Signature CRYSTALS-Dilithium. ACM Trans. Reconfigurable Technol. Syst. 16(3): 44:1-44:28 (2023) - [j53]Yazheng Tu, Pengzhou He, Çetin Kaya Koç, Jiafeng Xie:
LEAP: Lightweight and Efficient Accelerator for Sparse Polynomial Multiplication of HQC. IEEE Trans. Very Large Scale Integr. Syst. 31(6): 892-896 (2023) - [c43]Chen Li, Suwen Song, Jing Tian, Zhongfeng Wang, Çetin Kaya Koç:
An Efficient Hardware Design for Fast Implementation of HQC. SOCC 2023: 1-6 - [p10]Çetin Kaya Koç, Funda Özdemir:
Development of Cryptography since Shannon. Handb. Formal Anal. Verification Cryptogr. 2023: 1-56 - [i13]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. CoRR abs/2306.11351 (2023) - [i12]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices. CoRR abs/2309.00440 (2023) - 2022
- [j52]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 614-636 (2022) - [c42]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 540-549 - [c41]Samira Carolina Oliva Madrigal, Gökay Saldamli, Chen Li, Yue Geng, Jing Tian, Zhongfeng Wang, Çetin Kaya Koç:
Reduction-Free Multiplication for Finite Fields and Polynomial Rings. WAIFI 2022: 53-78 - [i11]Funda Özdemir, Çetin Kaya Koç:
Development of Cryptography since Shannon. IACR Cryptol. ePrint Arch. 2022: 100 (2022) - [i10]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Cryptol. ePrint Arch. 2022: 956 (2022) - 2020
- [j51]Çetin Kaya Koç:
Algorithms for Inversion Mod psk. IEEE Trans. Computers 69(6): 907-913 (2020) - [c40]Çetin Kaya Koç:
Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning. ASHES@CCS 2020: 3 - [c39]Sam Green, Craig M. Vineyard, Ryan Helinski, Çetin Kaya Koç:
RAPDARTS: Resource-Aware Progressive Differentiable Architecture Search. IJCNN 2020: 1-7
2010 – 2019
- 2019
- [j50]Biagio Peccerillo, Sandro Bartolini, Çetin Kaya Koç:
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs. J. Cryptogr. Eng. 9(2): 159-171 (2019) - [c38]Craig M. Vineyard, Sam Green, William M. Severa, Çetin Kaya Koç:
Benchmarking Event-Driven Neuromorphic Architectures. ICONS 2019: 13:1-13:5 - [i9]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Distillation Strategies for Proximal Policy Optimization. CoRR abs/1901.08128 (2019) - [i8]Sam Green, Craig M. Vineyard, Ryan Helinski, Çetin Kaya Koç:
RAPDARTS: Resource-Aware Progressive Differentiable Architecture Search. CoRR abs/1911.05704 (2019) - 2018
- [j49]Erkay Savas, Çetin Kaya Koç:
Montgomery inversion. J. Cryptogr. Eng. 8(3): 201-210 (2018) - [j48]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections. IEEE Trans. Computers 67(9): 1301-1314 (2018) - [j47]Zhe Liu, Patrick Longa, Çetin Kaya Koç:
Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances. IEEE Trans. Computers 67(11): 1532-1534 (2018) - [c37]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Impacts of Mathematical Optimizations on Reinforcement Learning Policy Performance. IJCNN 2018: 1-8 - [p9]Sam Green, Craig M. Vineyard, Çetin Kaya Koç:
Mathematical Optimizations for Deep Learning. Cyber-Physical Systems Security 2018: 69-92 - [p8]Jieliang Luo, Sam Green, Peter Feghali, George Legrady, Çetin Kaya Koç:
Reinforcement Learning and Trustworthy Autonomy. Cyber-Physical Systems Security 2018: 191-217 - [e10]Çetin Kaya Koç:
Cyber-Physical Systems Security. Springer 2018, ISBN 978-3-319-98934-1 [contents] - [i7]Jieliang Luo, Sam Green, Peter Feghali, George Legrady, Çetin Kaya Koç:
Visual Diagnostics for Deep Reinforcement Learning Policy Development. CoRR abs/1809.06781 (2018) - 2017
- [j46]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication. IEEE Trans. Computers 66(3): 375-388 (2017) - [j45]Nicole Fern, Ismail San, Çetin Kaya Koç, Kwang-Ting (Tim) Cheng:
Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(9): 1435-1444 (2017) - [i6]Çetin Kaya Koç:
A New Algorithm for Inversion mod pk. IACR Cryptol. ePrint Arch. 2017: 411 (2017) - 2016
- [j44]Donald Donglong Chen, Gavin Xiaoxu Yao, Ray C. C. Cheung, Derek Chi-Wai Pao, Çetin Kaya Koç:
Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication. IEEE Trans. Computers 65(1): 147-160 (2016) - [j43]Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. IEEE Trans. Computers 65(11): 3239-3250 (2016) - [c36]Rone Kwei Lim, Linda R. Petzold, Çetin Kaya Koç:
Bitsliced High-Performance AES-ECB on GPUs. The New Codebreakers 2016: 125-133 - [c35]Nicole Fern, Ismail San, Çetin Kaya Koç, Kwang-Ting Cheng:
Hardware Trojans in incompletely specified on-chip bus systems. DATE 2016: 527-530 - [c34]Sam Green, Ihsan Çiçek, Çetin Kaya Koç:
Continuous-Time Computational Aspects of Cyber-Physical Security. FDTC 2016: 59-62 - [c33]Ismail San, Nicole Fern, Çetin Kaya Koç, Kwang-Ting Cheng:
Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams. FPL 2016: 1-4 - 2015
- [e9]Çetin Kaya Koç, Sihem Mesnager, Erkay Savas:
Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9061, Springer 2015, ISBN 978-3-319-16276-8 [contents] - [i5]Can Kizilkale, Ömer Egecioglu, Çetin Kaya Koç:
A Matrix Decomposition Method for Optimal Normal Basis Multiplication. IACR Cryptol. ePrint Arch. 2015: 742 (2015) - 2014
- [c32]Ömer Egecioglu, Çetin Kaya Koç:
Reducing the Complexity of Normal Basis Multiplication. WAIFI 2014: 61-80 - [p7]Çetin Kaya Koç:
About Open Problems. Open Problems in Mathematics and Computational Science 2014: 1-4 - [p6]Mario Stipcevic, Çetin Kaya Koç:
True Random Number Generators. Open Problems in Mathematics and Computational Science 2014: 275-315 - [e8]Çetin Kaya Koç:
Open Problems in Mathematics and Computational Science. Springer 2014, ISBN 978-3-319-10682-3 [contents] - [i4]Ömer Egecioglu, Çetin Kaya Koç:
Reducing the Complexity of Normal Basis Multiplication. IACR Cryptol. ePrint Arch. 2014: 687 (2014) - 2012
- [j42]Vladimir Trujillo-Olaya, Timothy Sherwood, Çetin Kaya Koç:
Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications. J. Cryptogr. Eng. 2(3): 179-188 (2012) - [c31]Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine, Ryan Kastner, Çetin Kaya Koç, Timothy E. Levin, Timothy Sherwood:
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors. Cryptography and Security 2012: 364-382 - [c30]Donald Donglong Chen, Gavin Xiaoxu Yao, Çetin Kaya Koç, Ray C. C. Cheung:
Low complexity and hardware-friendly spectral modular multiplication. FPT 2012: 368-375 - 2011
- [j41]Çetin Kaya Koç:
Introduction to the Journal of Cryptographic Engineering. J. Cryptogr. Eng. 1(1): 1-3 (2011) - [r4]Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 795-798 - [r3]Çetin Kaya Koç:
Montgomery Arithmetic. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 799-803 - 2010
- [c29]Gavin Xiaoxu Yao, Ray C. C. Cheung, Çetin Kaya Koç, Kim-Fung Man:
Reconfigurable Number Theoretic Transform architectures for cryptographic applications. FPT 2010: 308-311
2000 – 2009
- 2009
- [c28]Murat Cenk, Çetin Kaya Koç, Ferruh Özbudak:
Polynomial Multiplication over Finite Fields Using Field Extensions and Interpolation. IEEE Symposium on Computer Arithmetic 2009: 84-91 - [c27]Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor:
A High-Performance Hardware Architecture for Spectral Hash Algorithm. ASAP 2009: 215-218 - [p5]Çetin Kaya Koç:
About Cryptographic Engineering. Cryptographic Engineering 2009: 1-4 - [p4]Serdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç:
Fast Finite Field Multiplication. Cryptographic Engineering 2009: 75-104 - [p3]Erkay Savas, Çetin Kaya Koç:
Efficient Unified Arithmetic for Hardware Cryptography. Cryptographic Engineering 2009: 105-124 - [p2]Gökay Saldamli, Çetin Kaya Koç:
Spectral Modular Arithmetic for Cryptography. Cryptographic Engineering 2009: 125-169 - [p1]Onur Aciiçmez, Çetin Kaya Koç:
Microarchitectural Attacks and Countermeasures. Cryptographic Engineering 2009: 475-504 - [e7]Çetin Kaya Koç:
Cryptographic Engineering. Springer 2009, ISBN 978-0-387-71816-3 [contents] - 2008
- [j40]Min-Ho Kim, Çetin Kaya Koç:
Improving the Novikov and Kiselev User Authentication Scheme. Int. J. Netw. Secur. 6(3): 241-245 (2008) - [j39]Minho Kim, Çetin Kaya Koç:
A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography. J. Inf. Sci. Eng. 24(4): 1213-1227 (2008) - [c26]Ilker Yavuz, Siddika Berna Örs Yalçin, Çetin Kaya Koç:
FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m). ReConFig 2008: 397-402 - [e6]Joachim von zur Gathen, José Luis Imaña, Çetin Kaya Koç:
Arithmetic of Finite Fields, 2nd International Workshop, WAIFI 2008, Siena, Italy, July 6-9, 2008, Proceedings. Lecture Notes in Computer Science 5130, Springer 2008, ISBN 978-3-540-69498-4 [contents] - 2007
- [j38]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Micro-Architectural Cryptanalysis. IEEE Secur. Priv. 5(4): 62-64 (2007) - [j37]Minho Kim, Çetin Kaya Koç:
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme. Int. J. Netw. Secur. 4(2): 235-239 (2007) - [c25]Gökay Saldamli, Çetin Kaya Koç:
Spectral Modular Exponentiation. IEEE Symposium on Computer Arithmetic 2007: 123-132 - [c24]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
Predicting Secret Keys Via Branch Prediction. CT-RSA 2007: 225-242 - [c23]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Cache Based Remote Timing Attack on the AES. CT-RSA 2007: 271-286 - 2006
- [c22]Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES (Short Paper). ICICS 2006: 112-121 - [i3]Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. IACR Cryptol. ePrint Arch. 2006: 138 (2006) - [i2]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. IACR Cryptol. ePrint Arch. 2006: 288 (2006) - [i1]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 351 (2006) - 2005
- [j36]Minho Kim, Çetin Kaya Koç:
A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme. Int. J. Netw. Secur. 1(2): 77-80 (2005) - [c21]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Improving Brumley and Boneh timing attack on unprotected SSL implementations. CCS 2005: 139-146 - [r2]Scott Contini, Çetin Kaya Koç, Colin D. Walter:
Modular Arithmetic. Encyclopedia of Cryptography and Security 2005 - [r1]Çetin Kaya Koç, Colin D. Walter:
Montgomery Arithmetic. Encyclopedia of Cryptography and Security 2005 - 2004
- [j35]Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç:
Elliptic and hyperelliptic curves on embedded µP. ACM Trans. Embed. Comput. Syst. 3(3): 509-533 (2004) - [j34]Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst. Secur. 7(1): 21-59 (2004) - [c20]Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan:
Relay Attacks on Bluetooth Authentication and Solutions. ISCIS 2004: 278-288 - 2003
- [j33]Çetin Kaya Koç, Christof Paar:
Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems. IEEE Trans. Computers 52(4): 401-402 (2003) - [j32]Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm. IEEE Trans. Computers 52(9): 1215-1221 (2003) - [j31]Berk Sunar, Erkay Savas, Çetin Kaya Koç:
Constructing Composite Field Representations for Efficient Conversion. IEEE Trans. Computers 52(11): 1391-1398 (2003) - [j30]Francisco Rodríguez-Henríquez, Çetin Kaya Koç:
Parallel Multipliers Based on Special Irreducible Pentanomials. IEEE Trans. Computers 52(12): 1535-1542 (2003) - [c19]Serdar Süer Erdem, Çetin Kaya Koç:
A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two. IEEE Symposium on Computer Arithmetic 2003: 28- - [c18]Colin Van Dyke, Çetin Kaya Koç:
On Ubiquitous Network Security and Anomaly Detection. SAINT Workshops 2003: 374-378 - [e5]Burton S. Kaliski Jr., Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Lecture Notes in Computer Science 2523, Springer 2003, ISBN 3-540-00409-2 [contents] - [e4]Colin D. Walter, Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2779, Springer 2003, ISBN 3-540-40833-9 [contents] - 2002
- [c17]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Erkay Savas, Çetin Kaya Koç:
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2). CHES 2002: 484-499 - [c16]Erkay Savas, Çetin Kaya Koç:
Architectures for unified field inversion with applications in elliptic curve cryptography. ICECS 2002: 1155-1158 - [c15]Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, Çetin Kaya Koç:
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. ISVLSI 2002: 53-58 - 2001
- [j29]Albert Levi, Çetin Kaya Koç:
Risks in email security. Commun. ACM 44(8): 112 (2001) - [j28]Berk Sunar, Çetin Kaya Koç:
An Efficient Optimal Normal Basis Type II Multiplier. IEEE Trans. Computers 50(1): 83-87 (2001) - [c14]Albert Levi, Çetin Kaya Koç:
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. ACSAC 2001: 286-295 - [c13]Erkay Savas, Thomas A. Schmidt, Çetin Kaya Koç:
Generating Elliptic Curves of Prime Order. CHES 2001: 142-158 - [c12]Alexandre F. Tenca, Georgi Todorov, Çetin Kaya Koç:
High-Radix Design of a Scalable Modular Multiplier. CHES 2001: 185-201 - [c11]Albert Levi, Çetin Kaya Koç:
Reducing Certificate Revocating Cost using NPKI. SEC 2001: 51-60 - [e3]Çetin Kaya Koç, David Naccache, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Lecture Notes in Computer Science 2162, Springer 2001, ISBN 3-540-42521-7 [contents] - 2000
- [j27]Alper Halbutogullari, Çetin Kaya Koç:
Parallel Multiplication in using Polynomial Residue Arithmetic. Des. Codes Cryptogr. 20(2): 155-173 (2000) - [j26]Alper Halbutogullari, Çetin Kaya Koç:
Mastrovito Multiplier for General Irreducible Polynomials. IEEE Trans. Computers 49(5): 503-518 (2000) - [j25]Erkay Savas, Çetin Kaya Koç:
The Montgomery Modular Inverse-Revisited. IEEE Trans. Computers 49(7): 763-766 (2000) - [c10]Murat Aydos, Tugrul Yanik, Çetin Kaya Koç:
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. ACSAC 2000: 401-410 - [c9]Erkay Savas, Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m). CHES 2000: 277-292 - [e2]Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Lecture Notes in Computer Science 1965, Springer 2000, ISBN 3-540-41455-X [contents]
1990 – 1999
- 1999
- [j24]Berk Sunar, Çetin Kaya Koç:
Mastrovito Multiplier for All Trinomials. IEEE Trans. Computers 48(5): 522-527 (1999) - [c8]Alper Halbutogullari, Çetin Kaya Koç:
Mastrovito Multiplier for General Irreducible Polynomials. AAECC 1999: 498-507 - [c7]Alexandre F. Tenca, Çetin Kaya Koç:
A Scalable Architecture for Montgomery Multiplication. CHES 1999: 94-108 - [e1]Çetin Kaya Koç, Christof Paar:
Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings. Lecture Notes in Computer Science 1717, Springer 1999, ISBN 3-540-66646-X [contents] - 1998
- [j23]Çetin Kaya Koç, Tolga Acar:
Montgomery Multplication in GF(2k). Des. Codes Cryptogr. 14(1): 57-69 (1998) - [j22]Çetin Kaya Koç, Berk Sunar:
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. IEEE Trans. Computers 47(3): 353-356 (1998) - [j21]Subramaniam Pennathur, Can K. Sandalci, Çetin Kaya Koç, Stephen M. Goodnick:
3D Parallel Monte Carlo Simulation of GaAs MESFETs. VLSI Design 6(1-4): 273-276 (1998) - 1997
- [j20]Çetin Kaya Koç, Mustafa Murat Inceoglu:
A Parallel algorithm for principal nth roots of matrices. Autom. 33(9): 1735-1738 (1997) - [j19]Bertan Bakkaloglu, Kayhan Erciyes, Çetin Kaya Koç:
A Parllelization of Parlett's Algorithm for Functions of Triangular Matrices. Parallel Algorithms Appl. 11(1-2): 61-69 (1997) - [j18]Çetin Kaya Koç:
Parallel p-Adic Method for Solving Linear Systems of Equations. Parallel Comput. 23(13): 2067-2074 (1997) - [c6]Çetin Kaya Koç, Tolga Acar:
Fast Software Exponentiation in GF(2^k). IEEE Symposium on Computer Arithmetic 1997: 225- - 1996
- [j17]Çetin Kaya Koç, Tolga Acar, Burton S. Kaliski Jr.:
Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3): 26-33 (1996) - 1995
- [j16]Çetin Kaya Koç, Bertan Bakkaloglu:
Halley's method for the matrix sector function. IEEE Trans. Autom. Control. 40(5): 944-949 (1995) - 1994
- [j15]Çetin Kaya Koç, A. Güvenç, Bertan Bakkaloglu:
Exact Solution of Linear Equations on Distributed-memory Multiprocessors. Parallel Algorithms Appl. 3(1-2): 135-143 (1994) - [j14]Çetin Kaya Koç, Bertan Bakkaloglu, Leang-San Shieh:
Computation of the matrix sign function using continued fraction expansion. IEEE Trans. Autom. Control. 39(8): 1644-1647 (1994) - [j13]Ömer Egecioglu, Çetin Kaya Koç:
Exponentiation Using Canonical Recoding. Theor. Comput. Sci. 129(2): 407-417 (1994) - 1993
- [j12]Çetin Kaya Koç, Peter R. Cappello:
Systolic Arrays for Integer Chinese Remaindering. Parallel Comput. 19(11): 1303-1311 (1993) - 1992
- [j11]Ömer Egecioglu, Çetin Kaya Koç:
A parallel algorithm for generating discrete orthogonal polynomials. Parallel Comput. 18(6): 649-659 (1992) - 1991
- [j10]Çetin Kaya Koç, Peter R. Cappello, Efstratios Gallopoulos:
Decomposing polynomial interpolation for systolic arrays. Int. J. Comput. Math. 38(3-4): 291-239 (1991) - [j9]Çetin Kaya Koç, Guanrong Chen:
Parallel algorithms for nevanlinna-pick interpolation: the scalar case. Int. J. Comput. Math. 40(1-2): 99-115 (1991) - [j8]Çetin Kaya Koç:
High-radix and bit recoding techniques for modular exponentiation. Int. J. Comput. Math. 40(3-4): 139-156 (1991) - [j7]Çetin Kaya Koç, Sarath N. Arachchige:
A Fast Algorithm for Gaussian Elimination over GF(2) and Its Implementation on the GAPP. J. Parallel Distributed Comput. 13(1): 118-122 (1991) - [j6]Çetin Kaya Koç, Po Rong Chang, C. S. G. Lee:
Comments on 'Residue arithmetic VLSI array architecture for manipulator pseudo-inverse Jacobian computation' [with reply]. IEEE Trans. Robotics Autom. 7(5): 715-717 (1991) - [j5]Çetin Kaya Koç, Ching Yu Hung:
Bit-level systolic arrays for modular multiplication. J. VLSI Signal Process. 3(3): 215-223 (1991) - [c5]Çetin Kaya Koç, Rose Marie Piedra:
A Parallel Algorithm for Exact Solution of Linear Equations. ICPP (3) 1991: 1-8 - 1990
- [j4]Peter R. Cappello, Efstratios Gallopoulos, Çetin Kaya Koç:
Systolic computation of interpolating polynomials. Computing 45(2): 95-117 (1990)
1980 – 1989
- 1989
- [j3]Ömer Egecioglu, Efstratios Gallopoulos, Çetin Kaya Koç:
Parallel Hermite interpolation: An algebraic approach. Computing 42(4): 291-307 (1989) - [j2]Ömer Egecioglu, Efstratios Gallopoulos, Çetin Kaya Koç:
Fast computation of divided differences and parallel hermite interpolation. J. Complex. 5(4): 417-437 (1989) - [j1]Çetin Kaya Koç, P. F. Ordung:
Schwarz-Christoffel transformation for the simulation of two-dimensional capacitance [VLSI circuits]. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 8(9): 1025-1027 (1989) - [c4]Çetin Kaya Koç, Peter R. Cappello:
Systolic arrays for integer Chinese remaindering. IEEE Symposium on Computer Arithmetic 1989: 216-223 - [c3]Çetin Kaya Koç:
A fast algorithm for mixed-radix conversion in residue arithmetic. ICCD 1989: 18-21 - 1988
- [c2]Ömer Egecioglu, Çetin Kaya Koç, Alan J. Laub:
Prefix algorithms for tridiagonal systems on hypercube multiprocessors. C³P 1988: 1539-1545 - 1986
- [c1]Peter R. Cappello, Grant A. Davidson, Allen Gersho, Çetin Kaya Koç, V. Srinivasa Somayazulu:
A systolic vector quantization processor for real-time speech coding. ICASSP 1986: 2143-2146
Coauthor Index
aka: Donglong Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint