A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) E Savaš, AF Tenca, CK Koç International Workshop on Cryptographic Hardware and Embedded Systems, 277-292, 2000 | 231 | 2000 |
Real time detection of cache-based side-channel attacks using hardware performance counters M Chiappetta, E Savas, C Yilmaz Applied Soft Computing 49, 1162-1174, 2016 | 175 | 2016 |
The Montgomery modular inverse-revisited E Savas, CK Koç IEEE transactions on computers 49 (7), 763-766, 2000 | 174 | 2000 |
Privacy preserving clustering on horizontally partitioned data A Inan, SV Kaya, Y Saygın, E Savaş, AA Hintoğlu, A Levi Data & Knowledge Engineering 63 (3), 646-666, 2007 | 167 | 2007 |
Low-power elliptic curve cryptography using scaled modular arithmetic E Öztürk, B Sunar, E Savaş International Workshop on Cryptographic Hardware and Embedded Systems, 92-106, 2004 | 97 | 2004 |
A practical and secure multi-keyword search method over encrypted cloud data C Orencik, M Kantarcioglu, E Savas 2013 IEEE Sixth International Conference on Cloud Computing, 390-397, 2013 | 89 | 2013 |
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ) J Großschädl, E Savaş International Workshop on Cryptographic Hardware and Embedded Systems, 133-147, 2004 | 89 | 2004 |
Incomplete reduction in modular arithmetic T Yanık, E Savaş, ÇK Koç IEE Proceedings-Computers and Digital Techniques 149 (2), 46-52, 2002 | 80 | 2002 |
Energy-efficient software implementation of long integer modular arithmetic J Großschädl, RM Avanzi, E Savaş, S Tillich International Workshop on Cryptographic Hardware and Embedded Systems, 75-90, 2005 | 72 | 2005 |
Distributed privacy preserving k-means clustering with additive secret sharing MC Doganay, TB Pedersen, Y Saygin, E Savaş, A Levi Proceedings of the 2008 international workshop on Privacy and anonymity in …, 2008 | 71 | 2008 |
Efficient and secure ranked multi-keyword search on encrypted cloud data C Örencik, E Savaş Proceedings of the 2012 Joint EDBT/ICDT Workshops, 186-195, 2012 | 67 | 2012 |
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n) AAA Gutub, AF Tenca, E Savaş, RCCK Koç International Workshop on Cryptographic Hardware and Embedded Systems, 484-499, 2002 | 67 | 2002 |
Public key cryptography based privacy preserving multi-context RFID infrastructure SV Kaya, E Savaş, A Levi, Ö Erçetin Ad Hoc Networks 7 (1), 136-152, 2009 | 58 | 2009 |
Multiplier architectures for GF (p) and GF (2n) E Savas, AF Tenca, ME Ciftcibasi, CK Koc IEE Proceedings-Computers and Digital Techniques 151 (2), 147-160, 2004 | 55 | 2004 |
Constructing composite field representations for efficient conversion B Sunar, E Savas, CK Koç IEEE Transactions on computers 52 (11), 1391-1398, 2003 | 54 | 2003 |
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking C Örencik, E Savaş Distributed and Parallel Databases 32 (1), 119-160, 2014 | 50 | 2014 |
Finite field arithmetic for cryptography E Savaş, ÇK Koç IEEE Circuits and Systems Magazine 10 (2), 40-56, 2010 | 48 | 2010 |
Architectures for unified field inversion with applications in elliptic curve cryptography E Savas, CK Koc 9th International Conference on Electronics, Circuits and Systems 3, 1155-1158, 2002 | 46 | 2002 |
Performance evaluation of public-key cryptosystem operations in WTLS protocol A Levi, E Savas Proceedings of the eighth IEEE symposium on computers and communications …, 2003 | 45 | 2003 |
Secret charing vs. encryption-based techniques for privacy preserving data mining TB Pedersen, Y Saygın, E Savaş Eurostat, 2007 | 44 | 2007 |