Follow
Tolga Acar
Tolga Acar
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Analyzing and comparing Montgomery multiplication algorithms
CK Koc, T Acar, BS Kaliski
IEEE micro 16 (3), 26-33, 1996
8311996
Montgomery multiplication in GF (2k)
CK Koc, T Acar
Designs, Codes and Cryptography 14, 57-69, 1998
4131998
Anonymous principals for policy languages
M Belinkiy, T Acar, T Roeder, J Mackay, B LaMachia
US Patent 8,955,035, 2015
1172015
Cryptographic agility and its relation to circular encryption
T Acar, M Belenkiy, M Bellare, D Cash
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
892010
Single password authentication
T Acar, M Belenkiy, A Küpçü
Computer Networks 57 (13), 2597-2614, 2013
832013
Securing passwords against dictionary attacks
M Belenkiy, T Acar, HNJ Morales, A Kupcu
US Patent 9,015,489, 2015
802015
Role-based distributed key management
T Acar, HN Jerez, LD Nguyen, TM Roeder
US Patent 9,008,316, 2015
792015
Key management using trusted platform modules
T Acar, B LaMacchia, HJ Morales, LD Nguyen, D Robinson, TB Tariq
US Patent 9,026,805, 2015
582015
Revocation for delegatable anonymous credentials
T Acar, L Nguyen
International Workshop on Public Key Cryptography, 423-440, 2011
532011
Minimal disclosure credential verification and revocation
T Acar, C Paquin, DL Nguyen, M Chase
US Patent 9,768,962, 2017
502017
Cryptographically strong key derivation using password, audio-visual and mental means
T Dutta, S Kadam, T Acar
US Patent App. 11/788,687, 2008
472008
Managing group keys
T Acar, J Benaloh, NT Ferguson, CM Ellison, M Belenkiy, DL Nguyen
US Patent 8,325,924, 2012
342012
Fast software exponentiation in GF (2/sup k/)
CK Koc, T Acar
Proceedings 13th IEEE Sympsoium on Computer Arithmetic, 225-231, 1997
341997
Trusted platform module (TPM) protected device
T Acar, M Pisut, D Barlow, M Stark, T Byfield, A McKelvey, M Pearson
US Patent 10,009,179, 2018
322018
Accumulators and U-prove revocation
T Acar, SSM Chow, L Nguyen
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
322013
Managing system and active-content integrity
JR Michener, T Acar
Computer 33 (7), 108-110, 2000
292000
Affine pairings on ARM
T Acar, K Lauter, M Naehrig, D Shumow
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
282013
Weighted entropy pool service
T Acar, DB Shumow, AS Tucker, CM Ellison
US Patent 7,930,332, 2011
252011
Modular reduction without pre-computation for special moduli
T Acar, D Shumow
Microsoft Research, Redmond, WA, USA 2, 2010
242010
Secure identification of computing device and secure identification methods
S Dandu, P Ciskowski, T Acar, JLG Raza
222017
The system can't perform the operation now. Try again later.
Articles 1–20