Berk Sunar

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Flattening NTRU for evaluation key free homomorphic encryption
Journal of Mathematical Cryptology
2020-06-24Paper
Homomorphic rank sort using surrogate polynomials
 
2020-03-02Paper
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
IEEE Transactions on Computers
2018-06-12Paper
Fully homomorphic encryption from the finite field isomorphism problem
 
2018-05-16Paper
Accelerating LTV based homomorphic encryption in reconfigurable hardware
 
2018-02-14Paper
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
IEEE Transactions on Computers
2017-11-10Paper
A Custom Accelerator for Homomorphic Encryption Applications
IEEE Transactions on Computers
2017-06-08Paper
Accelerating Fully Homomorphic Encryption in Hardware
IEEE Transactions on Computers
2017-05-16Paper
Homomorphic AES evaluation using the modified LTV scheme
Designs, Codes and Cryptography
2016-09-08Paper
cuHE: a homomorphic encryption accelerator library
Cryptography and Information Security in the Balkans
2016-04-26Paper
Depth optimized efficient homomorphic sorting
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes
Information Security and Cryptography
2013-07-09Paper
Resilient functions: just how resilient are they?
 
2011-05-31Paper
Memory leakage-resilient encryption based on physically unclonable functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
A versatile Montgomery multiplier architecture with characteristic three support
Computers and Electrical Engineering
2009-04-17Paper
Optimal Extension Field Inversion in the Frequency Domain
Arithmetic of Finite Fields
2008-08-19Paper
Optimal tower fields
IEEE Transactions on Computers
2007-01-09Paper
An efficient optimal normal basis type II multiplier
IEEE Transactions on Computers
2007-01-09Paper
Constructing composite field representations for efficient conversion
IEEE Transactions on Computers
2007-01-09Paper
A generalized method for constructing subquadratic complexity GF(2/sup k/) multipliers
IEEE Transactions on Computers
2007-01-09Paper
Low-complexity bit-parallel canonical and normal basis multipliers for a class of finite fields
IEEE Transactions on Computers
2007-01-09Paper
Mastrovito multiplier for all trinomials
IEEE Transactions on Computers
2007-01-09Paper
Achieving NTRU with montgomery multiplication
IEEE Transactions on Computers
2007-01-09Paper
An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations
IEEE Transactions on Computers
2007-01-09Paper
A Euclidean algorithm for normal bases
Acta Applicandae Mathematicae
2006-11-06Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Berk Sunar