Erkay Savas
Erkay Savas
Verified email at
Cited by
Cited by
Real time detection of cache-based side-channel attacks using hardware performance counters
M Chiappetta, E Savas, C Yilmaz
Applied Soft Computing 49, 1162-1174, 2016
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
E Savaš, AF Tenca, CK Koç
Cryptographic Hardware and Embedded Systems—CHES 2000: Second International …, 2000
Privacy preserving clustering on horizontally partitioned data
A Inan, SV Kaya, Y Saygın, E Savaş, AA Hintoğlu, A Levi
Data & Knowledge Engineering 63 (3), 646-666, 2007
The Montgomery modular inverse-revisited
E Savas, CK Koç
IEEE Transactions on Computers 49 (7), 763-766, 2000
Distributed privacy preserving k-means clustering with additive secret sharing
MC Doganay, TB Pedersen, Y Saygin, E Savaş, A Levi
Proceedings of the 2008 international workshop on Privacy and anonymity in …, 2008
A practical and secure multi-keyword search method over encrypted cloud data
C Orencik, M Kantarcioglu, E Savas
2013 IEEE Sixth International Conference on Cloud Computing, 390-397, 2013
Low-power elliptic curve cryptography using scaled modular arithmetic
E Öztürk, B Sunar, E Savaş
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme
AC Mert, E Öztürk, E Savaş
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (2), 353-362, 2019
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )
J Großschädl, E Savaş
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
Incomplete reduction in modular arithmetic
T Yanık, E Savaş, ÇK Koç
IEE Proceedings-Computers and Digital Techniques 149 (2), 46-52, 2002
Energy-efficient software implementation of long integer modular arithmetic
J Großschädl, RM Avanzi, E Savaş, S Tillich
International Workshop on Cryptographic Hardware and Embedded Systems, 75-90, 2005
Efficient and secure ranked multi-keyword search on encrypted cloud data
C Örencik, E Savaş
Proceedings of the 2012 Joint EDBT/ICDT Workshops, 186-195, 2012
A custom accelerator for homomorphic encryption applications
E Öztürk, Y Doröz, E Savaş, B Sunar
IEEE Transactions on Computers 66 (1), 3-16, 2016
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n)
A Abdul-Aziz Gutub, AF Tenca, E Savaş, RCCK Koç
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme
F Yaman, AC Mert, E Öztürk, E Savaş
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2021
Implementation and evaluation of a lattice-based key-policy ABE scheme
W Dai, Y Doröz, Y Polyakov, K Rohloff, H Sajjadpour, E Savaş, B Sunar
IEEE Transactions on Information Forensics and Security 13 (5), 1169-1184, 2017
Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture
AC Mert, E Öztürk, E Savaş
2019 22nd Euromicro Conference on Digital System Design (DSD), 253-260, 2019
An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking
C Örencik, E Savaş
Distributed and Parallel Databases 32, 119-160, 2014
An extensive study of flexible design methods for the number theoretic transform
AC Mert, E Karabulut, E Öztürk, E Savaş, A Aysu
IEEE Transactions on Computers 71 (11), 2829-2843, 2020
Efficient number theoretic transform implementation on GPU for homomorphic encryption
Ö Özerk, C Elgezen, AC Mert, E Öztürk, E Savaş
The Journal of Supercomputing 78 (2), 2840-2872, 2022
The system can't perform the operation now. Try again later.
Articles 1–20