What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Çetin Kaya Koç
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}.
Jipeng Zhang
Yuxing Yan
Junhao Huang
Çetin Kaya Koç
2025
journals/istr
Privacy-preserving word vectors learning using partially homomorphic encryption.
Shang Ci
Sen Hu
Donghai Guan
Çetin Kaya Koç
2024
journals/tches
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption.
Pengzhou He
Samira Carolina Oliva Madrigal
Çetin Kaya Koç
Tianyou Bao
Jiafeng Xie
2024
journals/tches
Revisiting Keccak and Dilithium Implementations on ARMv7-M.
Junhao Huang
Alexandre Adomnicai
Jipeng Zhang
Wangchen Dai
Yao Liu
Ray C. C. Cheung
Çetin Kaya Koç
Donglong Chen
2024
journals/tifs
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices.
Junhao Huang
Haosong Zhao
Jipeng Zhang
Wangchen Dai
Lu Zhou
Ray C. C. Cheung
Çetin Kaya Koç
Donglong Chen
2024
conf/uss
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519.
Jipeng Zhang
Junhao Huang
Lirui Zhao
Donglong Chen
Çetin Kaya Koç
2022
journals/tches
Improved Plantard Arithmetic for Lattice-based Cryptography.
Junhao Huang
Jipeng Zhang
Haosong Zhao
Zhe Liu
Ray C. C. Cheung
Çetin Kaya Koç
Donglong Chen
2020
conf/ccs
Formidable Challenges in Hardware Implementations of Fully Homomorphic Encryption Functions for Applications in Machine Learning.
Çetin Kaya Koç
2016
conf/fdtc
Continuous-Time Computational Aspects of Cyber-Physical Security.
Sam Green
Ihsan Çiçek
Çetin Kaya Koç
2007
conf/ctrsa
Cache Based Remote Timing Attack on the AES.
Onur Aciiçmez
Werner Schindler
Çetin Kaya Koç
2007
conf/ctrsa
Predicting Secret Keys Via Branch Prediction.
Onur Aciiçmez
Çetin Kaya Koç
Jean-Pierre Seifert
2006
conf/icics
Trace-Driven Cache Attacks on AES (Short Paper).
Onur Aciiçmez
Çetin Kaya Koç
2005
conf/ccs
Improving Brumley and Boneh timing attack on unprotected SSL implementations.
Onur Aciiçmez
Werner Schindler
Çetin Kaya Koç
2002
conf/ches
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).
Adnan Abdul-Aziz Gutub
Alexandre F. Tenca
Erkay Savas
Çetin Kaya Koç
2001
conf/sec
Reducing Certificate Revocating Cost using NPKI.
Albert Levi
Çetin Kaya Koç
2001
conf/ches
Generating Elliptic Curves of Prime Order.
Erkay Savas
Thomas A. Schmidt
Çetin Kaya Koç
2001
conf/ches
High-Radix Design of a Scalable Modular Multiplier.
Alexandre F. Tenca
Georgi Todorov
Çetin Kaya Koç
2001
conf/acsac
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59.
Albert Levi
Çetin Kaya Koç
2000
conf/ches
) and GF(2<sup>m</sup>).
Erkay Savas
Alexandre F. Tenca
Çetin Kaya Koç
2000
conf/acsac
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor.
Murat Aydos
Tugrul Yanik
Çetin Kaya Koç
1999
conf/ches
A Scalable Architecture for Montgomery Multiplication.
Alexandre F. Tenca
Çetin Kaya Koç
Coauthors
Adnan Abdul-Aziz Gutub
(1)
Albert Levi
(2)
Alexandre Adomnicai
(1)
Alexandre F. Tenca
(4)
Çetin Kaya Koç
(21)
Donghai Guan
(1)
Donglong Chen
(4)
Erkay Savas
(3)
Georgi Todorov
(1)
Haosong Zhao
(2)
Ihsan Çiçek
(1)
Jean-Pierre Seifert
(1)
Jiafeng Xie
(1)
Jipeng Zhang
(5)
Junhao Huang
(5)
Lirui Zhao
(1)
Lu Zhou
(1)
Murat Aydos
(1)
Onur Aciiçmez
(4)
Pengzhou He
(1)
Ray C. C. Cheung
(3)
Sam Green
(1)
Samira Carolina Oliva Madrigal
(1)
Sen Hu
(1)
Shang Ci
(1)
Thomas A. Schmidt
(1)
Tianyou Bao
(1)
Tugrul Yanik
(1)
Wangchen Dai
(2)
Werner Schindler
(2)
Yao Liu
(1)
Yuxing Yan
(1)
Zhe Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to