What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Erkay Savas
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography.
Tolun Tosun
Elisabeth Oswald
Erkay Savas
2024
journals/tifs
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography.
Tolun Tosun
Erkay Savas
2023
conf/eurosp
TimeInspector: A Static Analysis Approach for Detecting Timing Attacks.
Fatih Durmaz
Nureddin Kamadan
Melih Taha Öz
Musa Sadik Unal
Arsalan Javeed
Cemal Yilmaz
Erkay Savas
2022
conf/cans
HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments.
Musa Sadik Unal
Arsalan Javeed
Cemal Yilmaz
Erkay Savas
2021
journals/compsec
Detector+: An approach for detecting, isolating, and preventing timing attacks.
Arsalan Javeed
Cemal Yilmaz
Erkay Savas
2021
journals/istr
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client.
Tolun Tosun
Erkay Savas
2018
journals/tifs
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
Wei Dai
Yarkin Doröz
Yuriy Polyakov
Kurt Rohloff
Hadi Sajjadpour
Erkay Savas
Berk Sunar
2018
conf/ccs
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors.
Kamil Doruk Gür
Yuriy Polyakov
Kurt Rohloff
Gerard W. Ryan
Erkay Savas
2018
conf/sp
Implementing Conjunction Obfuscation Under Entropic Ring LWE.
David Bruce Cousins
Giovanni Di Crescenzo
Kamil Doruk Gür
Kevin King
Yuriy Polyakov
Kurt Rohloff
Gerard W. Ryan
Erkay Savas
2016
conf/fc
Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM.
Gamze Tillem
Ömer Mert Candan
Erkay Savas
Kamer Kaya
2015
conf/latincrypt
Depth Optimized Efficient Homomorphic Sorting.
Gizem S. Çetin
Yarkin Doröz
Berk Sunar
Erkay Savas
2015
conf/ches
Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware.
Yarkin Doröz
Erdinç Öztürk
Erkay Savas
Berk Sunar
2011
conf/fdtc
On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes.
Kazim Yumbul
Serdar Süer Erdem
Erkay Savas
2010
conf/ccs
A game theoretic model for digital identity and trust in online communities.
Tansu Alpcan
Cengiz Örencik
Albert Levi
Erkay Savas
2005
conf/ches
Energy-Efficient Software Implementation of Long Integer Modular Arithmetic.
Johann Großschädl
Roberto Maria Avanzi
Erkay Savas
Stefan Tillich
2004
conf/ches
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic.
Erdinç Öztürk
Berk Sunar
Erkay Savas
2004
conf/ches
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2<sup>m</sup>).
Johann Großschädl
Erkay Savas
2002
conf/ches
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2).
Adnan Abdul-Aziz Gutub
Alexandre F. Tenca
Erkay Savas
Çetin Kaya Koç
2001
conf/ches
Generating Elliptic Curves of Prime Order.
Erkay Savas
Thomas A. Schmidt
Çetin Kaya Koç
2000
conf/ches
) and GF(2<sup>m</sup>).
Erkay Savas
Alexandre F. Tenca
Çetin Kaya Koç
Coauthors
Adnan Abdul-Aziz Gutub
(1)
Albert Levi
(1)
Alexandre F. Tenca
(2)
Arsalan Javeed
(3)
Berk Sunar
(4)
Cemal Yilmaz
(3)
Cengiz Örencik
(1)
Çetin Kaya Koç
(3)
David Bruce Cousins
(1)
Elisabeth Oswald
(1)
Erdinç Öztürk
(2)
Erkay Savas
(20)
Fatih Durmaz
(1)
Gamze Tillem
(1)
Gerard W. Ryan
(2)
Giovanni Di Crescenzo
(1)
Gizem S. Çetin
(1)
Hadi Sajjadpour
(1)
Johann Großschädl
(2)
Kamer Kaya
(1)
Kamil Doruk Gür
(2)
Kazim Yumbul
(1)
Kevin King
(1)
Kurt Rohloff
(3)
Melih Taha Öz
(1)
Musa Sadik Unal
(2)
Nureddin Kamadan
(1)
Ömer Mert Candan
(1)
Roberto Maria Avanzi
(1)
Serdar Süer Erdem
(1)
Stefan Tillich
(1)
Tansu Alpcan
(1)
Thomas A. Schmidt
(1)
Tolun Tosun
(3)
Wei Dai
(1)
Yarkin Doröz
(3)
Yuriy Polyakov
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to