2008 |
40 | EE | Ghaith Hammouri,
Berk Sunar:
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
ACNS 2008: 346-365 |
39 | EE | Ghaith Hammouri,
Erdinç Öztürk,
Berk Birand,
Berk Sunar:
Unclonable Lightweight Authentication Scheme.
ICICS 2008: 33-48 |
38 | EE | Ghaith Hammouri,
Kahraman Akdemir,
Berk Sunar:
Novel PUF-Based Error Detection Methods in Finite State Machines.
ICISC 2008: 235-252 |
37 | EE | Erdinç Öztürk,
Ghaith Hammouri,
Berk Sunar:
Physical unclonable function with tristate buffers.
ISCAS 2008: 3194-3197 |
36 | EE | Erdinç Öztürk,
Ghaith Hammouri,
Berk Sunar:
Towards Robust Low Cost Authentication for Pervasive Devices.
PerCom 2008: 170-178 |
35 | EE | Yin Hu,
Ghaith Hammouri,
Berk Sunar:
A fast real-time memory authentication protocol.
STC 2008: 31-40 |
34 | EE | Selçuk Baktir,
Berk Sunar:
Optimal Extension Field Inversion in the Frequency Domain.
WAIFI 2008: 47-61 |
33 | EE | Berk Sunar,
Gunnar Gaubatz,
Erkay Savas:
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults.
IEEE Trans. Computers 57(1): 126-138 (2008) |
32 | EE | Ghaith Hammouri,
Erdinç Öztürk,
Berk Sunar:
A tamper-proof and lightweight authentication scheme.
Pervasive and Mobile Computing 4(6): 807-818 (2008) |
2007 |
31 | | Claude Carlet,
Berk Sunar:
Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings
Springer 2007 |
30 | EE | Erdinç Öztürk,
Gunnar Gaubatz,
Berk Sunar:
Tate Pairing with Strong Fault Resiliency.
FDTC 2007: 103-111 |
29 | EE | Dakshi Agrawal,
Selçuk Baktir,
Deniz Karakoyunlu,
Pankaj Rohatgi,
Berk Sunar:
Trojan Detection using IC Fingerprinting.
IEEE Symposium on Security and Privacy 2007: 296-310 |
28 | EE | Jens-Peter Kaps,
Gunnar Gaubatz,
Berk Sunar:
Cryptography on a Speck of Dust.
IEEE Computer 40(2): 38-44 (2007) |
27 | EE | Berk Sunar,
William J. Martin,
Douglas R. Stinson:
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks.
IEEE Trans. Computers 56(1): 109-119 (2007) |
26 | EE | Selçuk Baktir,
Sandeep Kumar,
Christof Paar,
Berk Sunar:
A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain.
MONET 12(4): 259-270 (2007) |
2006 |
25 | EE | Selçuk Baktir,
Berk Sunar:
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform.
ACM Southeast Regional Conference 2006: 549-554 |
24 | EE | Jens-Peter Kaps,
Berk Sunar:
Energy Comparison of AES and SHA-1 for Ubiquitous Computing.
EUC Workshops 2006: 372-381 |
23 | EE | Gunnar Gaubatz,
Berk Sunar,
Mark G. Karpovsky:
Non-linear Residue Codes for Robust Public-Key Arithmetic.
FDTC 2006: 173-184 |
22 | EE | Gunnar Gaubatz,
Berk Sunar:
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography.
FDTC 2006: 196-210 |
21 | EE | Selçuk Baktir,
Berk Sunar:
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography.
ISCIS 2006: 991-1001 |
2005 |
20 | | Josyula R. Rao,
Berk Sunar:
Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings
Springer 2005 |
19 | EE | Berk Sunar,
David Cyganski:
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings.
CHES 2005: 237-249 |
18 | EE | Erkay Savas,
Berk Sunar:
A Practical and Secure Communication Protocol in the Bounded Storage Model.
ICN (2) 2005: 707-717 |
17 | EE | Gunnar Gaubatz,
Berk Sunar:
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration.
NCA 2005: 235-238 |
16 | EE | Gunnar Gaubatz,
Jens-Peter Kaps,
Erdinç Öztürk,
Berk Sunar:
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks.
PerCom Workshops 2005: 146-150 |
15 | EE | Berk Sunar:
Binary Euclidean Algorithm.
Encyclopedia of Cryptography and Security 2005 |
14 | EE | Berk Sunar:
Euclidean Algorithm.
Encyclopedia of Cryptography and Security 2005 |
13 | EE | Berk Sunar:
Multiprecision Multiplication.
Encyclopedia of Cryptography and Security 2005 |
12 | EE | Berk Sunar:
Multiprecision Squaring.
Encyclopedia of Cryptography and Security 2005 |
11 | EE | Jens-Peter Kaps,
Kaan Yüksel,
Berk Sunar:
Energy Scalable Universal Hashing.
IEEE Trans. Computers 54(12): 1484-1495 (2005) |
10 | EE | Berk Sunar:
An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations.
IEEE Trans. Computers 54(8): 992-997 (2005) |
2004 |
9 | EE | Erdinç Öztürk,
Berk Sunar,
Erkay Savas:
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.
CHES 2004: 92-106 |
8 | EE | Gunnar Gaubatz,
Jens-Peter Kaps,
Berk Sunar:
Public Key Cryptography in Sensor Networks - Revisited.
ESAS 2004: 2-18 |
7 | EE | Selçuk Baktir,
Berk Sunar:
Optimal Tower Fields.
IEEE Trans. Computers 53(10): 1231-1243 (2004) |
6 | EE | Berk Sunar:
A Generalized Method for Constructing Subquadratic Complexity GF(2^k) Multipliers.
IEEE Trans. Computers 53(9): 1097-1105 (2004) |
2003 |
5 | EE | Berk Sunar,
Erkay Savas,
Çetin Kaya Koç:
Constructing Composite Field Representations for Efficient Conversion.
IEEE Trans. Computers 52(11): 1391-1398 (2003) |
4 | EE | Colleen O'Rourke,
Berk Sunar:
Achieving NTRU with Montgomery Multiplication.
IEEE Trans. Computers 52(4): 440-448 (2003) |
2001 |
3 | EE | Berk Sunar,
Çetin Kaya Koç:
An Efficient Optimal Normal Basis Type II Multiplier.
IEEE Trans. Computers 50(1): 83-87 (2001) |
1999 |
2 | | Berk Sunar,
Çetin Kaya Koç:
Mastrovito Multiplier for All Trinomials.
IEEE Trans. Computers 48(5): 522-527 (1999) |
1998 |
1 | | Çetin Kaya Koç,
Berk Sunar:
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields.
IEEE Trans. Computers 47(3): 353-356 (1998) |