Research
Article |
Tosun, Tolun and Savaş, Erkay, (2024) “Zero-value filtering for accelerating non-profiled side-channel attack on incomplete NTT-based implementations of lattice-based cryptography”, IEEE Transactions on Information Forensics and Security, Vol.19, 3353-3365 (SCI) |
Özcan, Ali Şah and Ayduman, Can and Türkoğlu, Enes Recep and Savaş, Erkay, (2023) “Homomorphic encryption on GPU”, IEEE Access, Vol.11, 84168-84186 (SCI) |
Nowroozi, Ehsan and Mohammadi, Mohammadreza and Savaş, Erkay and Mekdad, Yassine and Conti, Mauro, (2023) “Employing deep ensemble learning for improving the security of computer networks against adversarial attacks”, IEEE Transactions on Network and Service Management, Vol.20, No.2, 2096-2105 (SCI) |
Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay, (2023) “Microarchitectural side-channel threats, weaknesses and mitigations: a systematic mapping study”, IEEE Access, Vol.11, 48945-48976 (SCI) |
Mert, Ahmet Can and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Aysu, Aydın, (2022) “An extensive study of flexible design methods for the number theoretic transform”, IEEE Transactions on Computers, Vol.71, No.11, 2829-2843 (SCI) |
Derya, Kemal and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, (2022) “CoHA-NTT: a configurable hardware accelerator for NTT-based polynomial multiplication”, Microprocessors and Microsystems, Vol.89 (SCI) |
Özerk, Özgün and Elgezen, Can and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, (2022) “Efficient number theoretic transform implementation on GPU for homomorphic encryption”, Journal of Supercomputing, Vol.78, No.2, 2840-2872 (SCI) |
Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, (2022) “Low-latency ASIC algorithms of modular squaring of large integers for VDF evaluation”, IEEE Transactions on Computers, Vol.71, No.1, 107-120 (SCI) |
Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay, (2021) “Detector+: an approach for detecting, isolating, and preventing timing attacks”, Computers and Security, Vol.110 (SCI) |
Tosun, Tolun and Savaş, Erkay, (2021) “FSDS: a practical and fully secure document similarity search over encrypted data with lightweight client”, Journal of Information Security and Applications, Vol.59 (SCI) |
Çetin, Gizem S. and Savaş, Erkay and Sunar, Berk, (2021) “Homomorphic sorting with better scalability”, IEEE Transactions on Parallel and Distributed Systems, Vol.32, No.4, 760-771 (SCI) |
Kjamilji, Artrim and Savaş, Erkay and Levi, Albert, (2021) “Efficient secure building blocks with application to privacy preserving machine learning algorithms”, IEEE Access, Vol.9, 8324-8353 (SCI) |
Akyıldız, Taha Atahan and Güzgeren, Can Berk and Yılmaz, Cemal and Savaş, Erkay, (2020) “MeltdownDetector: a runtime approach for detecting meltdown attacks”, Future Generation Computer Systems, Vol.112, 136-147 (SCI) |
Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, (2020) “FPGA implementation of a run-time configurable NTT-based polynomial multiplication hardware”, Microprocessors and Microsystems, Vol.78 (SCI) |
Karaçay, Leyli and Savaş, Erkay and Alptekin, Halit, (2020) “Intrusion detection over encrypted network data”, Computer Journal, Vol.63, No.4, 604-619 (SCI) |
Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, (2020) “Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.28, No.2, 353-362 (SCI) |
Külah, Yusuf and Dinçer, Berkay and Yılmaz, Cemal and Savaş, Erkay, (2019) “SpyDetector: an approach for detecting side-channel attacks at runtime”, International Journal of Information Security, Vol.18, No.4, 393-422 (SCI) |
Gür, Kamil D. and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Sajjadpour, Hadi and Savaş, Erkay, (2019) “Practical applications of improved Gaussian sampling for trapdoor lattices”, IEEE Transactions on Computers, Vol.68, No.4, 570-584 (SCI) |
Topcuoğlu, Cem and Kaya, Kamer and Savaş, Erkay, (2018) “A generic private information retrieval scheme with parallel multi-exponentiations on multicore processors”, Concurrency and Computation: Practice and Experience (SI), Vol.30, No.21 (SCI) |
Ay, Atıl Utku and Mancillas-López, Cuauhtémoc and Öztürk, Erdinç and Rodríguez-Henríquez, Francisco and Savaş, Erkay, (2018) “Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level”, Microprocessors and Microsystems, Vol.62, 79-90 (SCI, CPCI-S) |
Savaş, Erkay and Koç, Çetin Kaya, (2018) “Montgomery inversion”, Journal of Cryptographic Engineering, Vol.8, No.3, 201-210 (ESCI) |
Rodríguez-Henríquez, Francisco and Savaş, Erkay, (2018) “Special issue in honor of Peter Lawrence Montgomery”, Journal of Cryptographic Engineering (SI), Vol.8, No.3, 185-187 (SCI) |
Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay, (2018) “Cache-timing attacks without a profiling phase”, Turkish Journal of Electrical Engineering and Computer Sciences, Vol.26, No.4, 1953-1966 (SCI) |
Dai, Wei and Doroz, Yarkın and Polyakov, Yuriy and Rohloff, Kurt and Sajjadpour, Hadi and Savaş, Erkay and Sunar, Berk, (2018) “Implementation and evaluation of a lattice-based key-policy ABE scheme”, IEEE Transactions on Information Forensics & Security, Vol.13, No.5, 1169-1184 (SCI) |
Tillem, Gamze and Savaş, Erkay and Kaya, Kamer, (2017) “A new method for computational private information retrieval”, Computer Journal, Vol.60, No.8, 1238-1250 (SCI) |
Öztürk, Erdinç and Doröz, Yarkın and Savaş, Erkay and Sunar, Berk, (2017) “A custom accelerator for homomorphic encryption applications”, IEEE Transactions on Computers, Vol.66, No.1, 3-16 (SCI) |
Karaoğlan Altop, Duygu and Bingöl, Muhammed Ali and Levi, Albert and Savaş, Erkay, (2017) “DKEM: secure and efficient distributed key establishment protocol for wireless mesh networks”, Ad Hoc Networks, Vol.54, 53-68 (SCI) |
Khayati, Leyli Javid and Örencik, Cengiz and Savaş, Erkay and Ustaoğlu, Berkant, (2016) “A practical privacy-preserving targeted advertising scheme for IPTV users”, International Journal of Information Security, Vol.15, No.4, 335-360 (SCI) |
Örencik, Cengiz and Selçuk, Ayşe and Savaş, Erkay and Kantarcıoğlu, Murat, (2016) “Multi-keyword search over encrypted data with scoring and search pattern obfuscation”, International Journal of Information Security, Vol.15, No.3, 251-269 (SCI) |
Ünal, Ecem and Savaş, Erkay, (2016) “On acceleration and scalability of number theoretic private information retrieval”, IEEE Transactions on Parallel & Distributed Systems, Vol.27, No.6, 1727-1741 (SCI) |
Alewiwi, Mahmoud Khaled and Örencik, Cengiz and Savaş, Erkay, (2016) “Efficient top-k similarity document search utilizing distributed file systems and cosine similarity”, Cluster Computing, Vol.19, No.1, 109-126 (SCI) |
Savaş, Erkay and Yılmaz, Cemal, (2015) “A generic method for the analysis of a class of cache attacks: a case study for AES”, Computer Journal, Vol.58, No.10, 2716-2737 (SCI) |
Yumbul, Kazım and Savaş, Erkay, (2015) “Enhancing an embedded processor core for efficient and isolated execution of cryptographic algorithms”, Computer Journal, Vol.58, No.10, 2368-2387 (SCI) |
Karabat, Çağatay and Kiraz, Mehmet Sabir and Erdoğan, Hakan and Savaş, Erkay, (2015) “THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system”, EURASIP Journal on Advances in Signal Processing (SCI) |
Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay, (2014) “On selection of modulus of quadratic codes for the protection of cryptographic operations against fault attacks”, IEEE Transactions on Computers, Vol.63, No.5, 1182-1196 (SCI) |
Örencik, Cengiz and Savaş, Erkay, (2014) “An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking”, Distributed and Parallel Databases, Vol.32, No.1, 119-160 (SCI) |
Yumbul, Kazım and Savaş, Erkay and Kocabaş, Övünç and Großschädl, Johann, (2014) “Design and implementation of a versatile cryptographic unit for RISC processors”, Security and Communication Networks, Vol.7, No.1, 36-52 (SCI) |
Durahim, Onur Ahmet and Savaş, Erkay, (2011) “A(2)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs”, Ad Hoc Networks, Vol.9, No.7, 1202-1220 (SCI) |
Ergun, Murat and Levi, Albert and Savaş, Erkay, (2011) “Increasing resiliency in multi-phase wireless sensor networks: generationwise key predistribution approach”, The Computer Journal, Vol.54, No.4, 602-616 (SCI) |
Yıldızlı, Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert, (2011) “Distributed privacy preserving clustering via homomorphic secret sharing and its application to (vertically) partitioned spatio-temporal data”, International Journal of Data Warehousing and Mining, Vol.7, No.1, 46-66 (SCI) |
Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel, (2010) “Discovering private trajectories using background information”, Data and Knowledge Engineering (Sp. Iss. SI), Vol.69, No.7, 723-736 (SCI) |
Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet, (2010) “Securing fuzzy vault schemes through biometric hashing”, Turkish Journal of Electrical Engineering &Computer Sciences, Vol.18, No.4, 515-539 (SCI) |
Savaş, Erkay and Koç, Çetin Kaya, (2010) “Finite field arithmetic for cryptography”, IEEE Circuits and Systems Magazine, Vol.10, No.2, 40-56 (SCI) |
Pedersen, Thomas Brochmann and Savaş, Erkay, (2009) “Impossibility of unconditionally secure scalar products”, Data and Knowledge Engineering, Vol.68, No.10, 1059-1070 (SCI) |
Durahim, Onur Ahmet and Savaş, Erkay and Sunar, Berk and Pedersen, Thomas Brochmann and Kocabaş, Övünç, (2009) “Transparent code authentication at the processor level”, IET Computers & Digital Techniques, Vol.3, No.4, 354-372 (SCI) |
Öztürk, Erdinç and Sunar, Berk and Savaş, Erkay, (2009) “A versatile montgomery multiplier architecture with characteristic three support”, Computers & Electrical Engineering, Vol.35, No.1, 71-85 (SCI) |
Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür, (2009) “Public key cryptography based privacy preserving multi-context RFID infrastructure”, Ad Hoc Networks, Vol.7, No.1, 136-152 (SCI) |
Kaplan, Emre and Pedersen, Thomas Brochmann and Savaş, Erkay and Saygın, Yücel, (2008) “Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties”, Knowledge-Based Intelligent Information and Engineering Systems, Vol.5178, 642-649 (SCI) |
Gaubatz, Gunnar and Savaş, Erkay and Sunar, Berk, (2008) “Sequential circuit design for embedded cryptographic applications resilient to adversarial faults”, IEEE Transactions on Computers, Vol.57, No.1, 126-138 (SCI) |
İnan, Ali and Kaya, Selim Volkan and Saygın, Yücel and Savaş, Erkay and Azgın Hintoğlu, Ayça and Levi, Albert, (2007) “Privacy preserving clustering on horizontally partitioned data”, Data & Knowledge Engineering, Vol.63, No.3, 646-666 (SCI) |
Savaş, Erkay, (2005) “A carry-free architecture for Montgomery inversion”, IEEE Transactions on Computers, Vol.54, No.12, 1508-1519 (SCI) |
Öniz, Çağıl Can and Savaş, Erkay and Levi, Albert, (2005) “A fair multimedia exchange protocol”, Lecture notes in computer science, Vol.3733, 342- 351 (SCI) |
Großschädl, Johann and Avanzi, Roberto M. and Savaş, Erkay and Tillich, Stefan, (2005) “Energy-efficient software implementation of long integer modular arithmetic”, Lecture Notes in Computer Science, Vol.3659, 75-90 (SCI) |
Savaş, Erkay and Naseer, Mansoor and Gutub, Adnan Abdül-Aziz and Koç, Çetin Kaya, (2005) “Efficient unified Montgomery inversion with multibit shifting”, IEE Proceedings – Computers and Digital Techniques, Vol.152, No.4, 489-498 (SCI) |
Grossschadl, Johann and Savaş, Erkay, (2004) “Instruction set extensions for fast arithmetic in finite fields GF(p) and GF(2(m))”, Lecture Notes in Computer Science (Cryptographic Hardware and Embedded Systems – CHES 2004, Proceedings), Vol.3156, 133-147 (CPCI-S, SCI) |
Tenca, A. F. and Savaş, Erkay and Koç, C. K., (2004) “A design framework for scalable and unified architectures that perform multiplication in GF(p) and GF(2^m)”, International Journal of Computer Research, Vol.13, No.1, 68-83 |
Savaş, Erkay and Tenca, A. F. and Çiftçibaşı, M. E. and Koç, Çetin Kaya, (2004) “Multiplier architectures for GF(p) and GF(2^k)”, IEE Proceedings – Computers and Digital Techniques, Vol.151, No.2, 147-160 (SCI) |
Sunar, Berk and Savaş, Erkay and Koç, Çetin Kaya, (2003) “Constructing composite field representations for efficient conversion”, IEEE Transactions on Computers, Vol.52, No.11, 1391-1398 (SCI) |
Chiappetta, Marco and Savaş, Erkay and Yılmaz, Cemal, () “Real time detection of cache-based side-channel attacks using hardware performance counters”, Applied Soft Computing (forthcoming) (SCI) |
Book |
“Arithmetic of finite fields: 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised selected papers, Koç, Çetin Kaya and Mesnager, Sihem and Savaş, Erkay (eds.), Switzerland: Springer 2015 |
Book Section / Chapter |
Nowroozi, Ehsan and Seyedshoari, Seyedsadra and Mekdad, Yassine and Savaş, Erkay and Conti, Mauro, Cryptocurrency wallets: assessment and security Blockchain for Cybersecurity in Cyber-Physical Systems, Maleh, Yassine and Alazab, Mamoun and Romdhani, Imed (eds.), Switzerland: Springer, April 2023, 1-19 |
Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay , Filipe, Joaquim and Obaidat, Mohammad S. (eds.), Berlin, Germany: Springer, November 2009, 180-198 |
Savaş, Erkay and Koç, Çetin Kaya, “Efficient unified arithmetic for hardware cryptography” Cryptographic Engineering, Koç, Çetin Kaya (ed.), Germany: Springer 2009, 105-124 |
Bonchi, Francesco and Saygın, Yücel and Verykios, Vassilis and Atzori, Maurizio and Goukalas, Aris and Kaya, Volkan and Savaş, Erkay, Privacy in spatiotemporal data mining Mobility, data mining, and privacy: geographic knowledge discovery, Giannotti, Fosca and Pedreschi, Dino (eds.), Berlin: Springer Heidelberg 2008, 297-333 |
Savaş, Erkay, Binary algorithms for multiplicative inversion Wireless Security and Cryptography: Specifications and Implementations, Oxford: Taylor & Francis, May 2007, 1-432 |
Papers in Conference Proceedings |
Can, Furkan and Üstün, Ali and Örs, Berna and Alaybeyoğlu, Ersin and Savaş, Erkay, ” Hardware implementation of K2RED and plantard modular multiplication algorithms in post-quantum cryptography “, Panhellenic Conference on Electronics & Telecommunications (PACET), Institute of Electrical and Electronics Engineers, March 2024 |
Mert, Ahmet Can and Yaman, Ferhat and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Aysu, Aydin, ” A survey of software implementations for the number theoretic transform “, Silvano, Cristina and Pilato, Christian and Reichenbach, Marc (eds.), 23rd International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2023, Springer Cham, November 2023, 328-344 |
Ayduman, Can and Koçer, Emre and Kırbıyık, Selim and Mert, Ahmet Can and Savaş, Erkay, ” Efficient design-time flexible hardware architecture for accelerating homomorphic encryption “, IFIP/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC), IEEE Computer Society, October 2023 |
Durmaz, Fatih and Kamadan, Nureddin and Öz, Melih Taha and Ünal, Musa Sadık and Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay, ” TimeInspector: a static analysis approach for detecting timing attacks “, IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Institute of Electrical and Electronics Engineers, July 2023, 296-303 |
Ünal, Musa Sadık and Javeed, Arsalan and Yılmaz, Cemal and Savaş, Erkay, ” HyperDetector: detecting, isolating, and mitigating timing attacks in virtualized environments “, Beresford, Alastair R. and Patra, Arpita and Bellini, Emanuele (eds.), 21st International Conference on Cryptology and Network Security (CANS 2022), Springer Cham, November 2022, 188-199 |
Türkoğlu, Enes Recep and Özcan, Ali Şah and Ayduman, Can and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, ” An accelerated GPU library for homomorphic encryption operations of BFV scheme “, IEEE International Symposium on Circuits and Systems (ISCAS), Institute of Electrical and Electronics Engineers, June 2022, 1155-1159 |
Kjamilji, Artrim and Levi, Albert and Savaş, Erkay and Güney, Osman Berke, ” Secure matrix operations for machine learning classifications over encrypted data in post quantum industrial IoT “, International Symposium on Networks, Computers and Communications (ISNCC), Institute of Electrical and Electronics Engineers, October 2021 |
Yaman, Ferhat and Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, ” A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme “, Design, Automation & Test in Europe Conference & Exhibition (DATE), Institute of Electrical and Electronics Engineers, February 2021, 1020-1025 |
Mert, Ahmet Can and Karabulut, Emre and Öztürk, Erdinç and Savaş, Erkay and Becchi, Michele and Aysu, Aydın, ” A flexible and scalable NTT hardware: applications from homomorphically encrypted deep learning to post-quantum cryptography “, Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE (Institute of Electrical and Electronics Engineers), June 2020, 346-351 |
Mert, Ahmet Can and Öztürk, Erdinç and Savaş, Erkay, ” Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture “, 22nd Euromicro Conference on Digital System Design (DSD), Institute of Electrical and Electronics Engineers, August 2019, 253-260 |
Alptekin, Halit and Yıldızlı, Can and Savaş, Erkay and Levi, Albert, ” TRAPDROID: bare-metal android malware behavior analysis framework “, 21st International Conference on Advanced Communication Technology (ICACT), IEEE (Institute of Electrical and Electronics Engineers), February 2019, 664-671 |
Gür, Kamil Doruk and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Savaş, Erkay, “Implementation and evaluation of improved Gaussian sampling for lattice trapdoors“, 6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018, ACM (Association for Computing Machinery), October 2018, 61-71 |
Cousins, David Bruce and Di Crescenzo, Giovanni and Gür, Kamil Doruk and King, Kevin and Polyakov, Yuriy and Rohloff, Kurt and Ryan, Gerard W. and Savaş, Erkay, “Implementing conjunction obfuscation under entropic ring LWE“, IEEE Symposium on Security and Privacy (SP 2018), IEEE (Institute of Electrical and Electronics Engineers), July 2018, 354-371 |
Ay, Atıl Utku and Öztürk, Erdinç and Henriquez, Francisco Rodriguez and Savaş, Erkay, ” Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography “, Athanas, P. and Cumplido, R. and Feregrino, C. and Sass, R. (eds.), International Conference on Reconfigurable Computing and FPGAs (ReConFig), IEEE (Institute of Electrical and Electronics Engineers), December 2016 |
Tillem, Gamze and Candan, Ömer Mert and Savaş, Erkay and Kaya, Kamer, ” Hiding access patterns in range queries using private information retrieval and ORAM “, Clark, Jeremy and Meiklejohn, Sarah and Ryan, Peter Y.A. and Wallach, Dan and Brenner, Michael and Rohloff, Kurt (eds.), International Workshops on Financial Cryptography and Data Security, Springer Berlin Heidelberg, August 2016, 253-270 |
Doröz, Yarkın and Öztürk, Erdinç and Savaş, Erkay and Sunar, Berk, “Accelerating LTV based homomorphic encryption in reconfigurable hardware“, Güneysu, Tim and Handschuh, Helena (eds.), 17th International Workshop – Cryptographic Hardware and Embedded Systems (CHES 2015), Berlin, Germany: Springer, September 2015, 185-204 |
Çetin, Gizem Selcan and Doröz, Yarkın and Sunar, Berk and Savaş, Erkay, “Depth optimized efficient homomorphic sorting“, Lauter, K. and RodriguezHenriquez, F. (eds.), 4th International Conference on Cryptology and Information Security in Latin America, Berlin, Germany: Springer, August 2015, 61-80 |
Örencik, Cengiz and Alewiwi, Mahmoud Khaled and Savaş, Erkay, ” Secure sketch search for document similarity “, IEEE Trustcom/BigDataSE/ISPA 2015, USA: IEEE (Institute of Electrical and Electronics Engineers), August 2015, 1102-1107 |
Selçuk, Ayşe and Örencik, Cengiz and Savaş, Erkay, “Private search over big data leveraging distributed file system and parallel processing“, Sixth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2015), Nice, France: IARIA (International Academy, Research and Industry Association), March 2015, 116-121 |
Savaş, Erkay, ” Attacks on implementations of cryptographic algorithms: side-channel and fault attacks “, 6th International Conference on Security of Information and Networks (SIN 2013), New York, NY, USA: ACM (Association for Computing Machinery), November 2013, 7-14 |
Örencik, Cengiz and Kantarcıoğlu, Murat and Savaş, Erkay, “A practical and secure multi-keyword search method over encrypted cloud data“, IEEE Sixth International Conference on Cloud Computing (CLOUD 2013), USA: IEEE Computer Society, June 2013, 390-397 |
Atıcı, Ali Can and Yılmaz, Cemal and Savaş, Erkay, ” An approach for isolating the sources of information leakage exploited in cache-based side-channel attacks “, IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C 2013), USA: IEEE (Institute of Electrical and Electronics Engineers), June 2013, 74-83 |
Merrill, Shawn and Başalp, Nilgün and Biskup, Joachim and Buchmann, Erik and Clifton, Chris and Kuijpers, Bart and Othman, Walied and Savaş, Erkay, “Privacy through uncertainty in location-based services“, IEEE 14th International Conference on Mobile Data Management (MDM 2013), Milan, Italy: IEEE Computer Society, June 2013, 67-72 |
Durahim, Onur Ahmet and Yıldırım, İsmail Fatih and Savaş, Erkay and Levi, Albert, “Performance evaluation of different CRL distribution schemes embedded in WMN authentication“, Gelenbe, Erol and Lent, Ricardo (eds.), 27th International Symposium on Computer and Information Sciences (ISCIS 2012), London: Springer London 2013, 333-342 |
Savaş, Erkay and Yılmaz, Cemal, ” Cache attacks: an information and complexity theoretic approach “, 5th International Conference on New Technologies, Mobility and Security (NTMS), USA: IEEE (Institute of Electrical and Electronics Engineers) 2012, 1-7 |
Doröz, Yarkın and Savaş, Erkay, “Constructing cluster of simple FPGA boards for cryptologic computations“, Choy, Oliver C. S. and Cheung, Ray C. C. and Athanas, Peter and Sano, Kentaro (eds.), 8th International Symposium (ARC 2012), Germany: Springer Berlin Heidelberg 2012, 320-328 |
Örencik, Cengiz and Savaş, Erkay, “Efficient and secure ranked multi-keyword search on encrypted cloud data“, 2012 Joint EDBT/ICDT Workshops, New York, USA: ACM (Association for Computing Machinery) 2012, 186-195 |
Baktır, Selçuk and Savaş, Erkay, ” Highly-parallel Montgomery multiplication for multi-core general-purpose microprocessors “, 27th International Symposium on Computer and Information Sciences (ISCIS 2012), Germany: Springer 2012 |
Javid Khayati, Leyli and Savaş, Erkay and Ustaoğlu, Berkant and Örencik, Cengiz, “Privacy-preserving targeted advertising scheme for IPTV using the cloud“, Samarati, Pierangela and Lou, Wenjing and Zhou, Jianying (eds.), International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy: SciTePress 2012, 74-83 |
Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay, ” On protecting cryptographic applications against fault attacks using residue codes “, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011), USA: IEEE (Institute of Electrical and Electronics Engineers), September 2011, 69 -79 |
Murat, Ertuğrul and Kardaş, Süleyman and Savaş, Erkay, ” Scalable and efficient FPGA implementation of Montgomery inversion “, Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec 2011), USA: IEEE (Institute of Electrical and Electronics Engineers), March 2011, 61-68 |
Alpcan, Tansu and Levi, Albert and Savaş, Erkay, ” Digital trust games: an experimental study “, Baras, John S. and Katz, Jonathan and Altman, Eitan (eds.), Second International Conference on Decision and Game Theory for Security (GameSec 2011), Berlin: Springer 2011, 182-200 |
Karaoğlan Altop, Duygu and Levi, Albert and Savaş, Erkay, “A distributed key establishment scheme for wireless mesh networks using identity-based cryptography“, 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet ’10), New York, NY, USA: ACM (Association for Computing Machinery), October 2010, 11-18 |
Yumbul, Kazım and Erdem, Serdar Süer and Savaş, Erkay, “Design and implementation of robust embedded processor for cryptographic applications“, 3rd International Conference on Security of Information and Networks (SIN ’10), New York, NY, USA: ACM (Association for Computing Machinery), September 2010, 178-185 |
Durahim, Onur Ahmet and Savaş, Erkay, “A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs“, Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), USA: IEEE Computer Society, May 2010, 54-59 |
Alpcan, Tansu and Örencik, Cengiz and Levi, Albert and Savaş, Erkay, “A game theoretic model for digital identity and trust in online communities“, 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), New York, NY, USA: ACM (Association for Computing Machinery), April 2010, 341-344 |
Akın, Abdulkadir and Aysu, Aydın and Ulusel, Onur Can and Savaş, Erkay, “Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing“, 3rd International Conference on Security of Information and Networks (SIN ’10), New York, NY, USA: ACM (Association for Computing Machinery) 2010, 168-177 |
Yumbul, Kazım and Savaş, Erkay, ” Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit “, 2nd International Conference on Security of Information and Networks, SIN 2009, New York, USA: ACM (Association for Computing Machinery), October 2009, 143-151 |
Ergun, Murat and Levi, Albert and Savaş, Erkay, “A resilient key predistribution scheme for multiphase wireless sensor networks“, 24th International Symposium on Computer and Information Sciences, 2009 (ISCIS 2009), USA: IEEE (Institute of Electrical and Electronics Engineers), September 2009, 375-380 |
Durahim, Onur Ahmet and Savaş, Erkay and Yumbul, Kazım, “Implementing a protected zone in a reconfigurable processor for isolated execution of cryptographic algorithms“, 2009 International Conference on ReConFigurable Computing and FPGAs (ReConFig09), USA: IEEE (Institute of Electrical and Electronics Engineers) 2009, 207-212 |
Karatop, Ayşe Gül and Savaş, Erkay, “An identity-based key infrastructure suitable for messaging and its application to e-mail“, Liu, Peng and Molva, Refik (eds.), 4th International Conference on Security and Privacy in Communication Networks, ACM Digital Library: ACM, September 2008 |
Örencik, Cengiz and Pedersen, Thomas Brochmann and Savaş, Erkay and Keskinöz, Mehmet, “Improved fuzzy vault scheme for fingerprint verification“, International Conference on Security and Cryptography, Porto, Portugal: INSTICC Press, July 2008, 37-43 |
Yılmaz, Ömer Zekvan and Levi, Albert and Savaş, Erkay, “Multiphase deployment models for fast self healing in wireless sensor networks“, International Conference on Security and Cryptography, SECRYPT 2008, Porto, Portugal: INSTICC Press, July 2008, 136-144 |
Kömürcü, Giray and Savaş, Erkay, “An Efficient hardware implementation of the tate pairing in characteristic three“, The Third International Conference on Systems, ICONS 2008, IEEE Digital Library: IEEE Computer Society, April 2008, 23-28 |
Doğanay, Mahir Can and Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay and Levi, Albert, “Distributed privacy preserving k-means clustering with additive secret sharing“, Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008,, ACM Digital Library: ACM, March 2008, 3-11 |
Karatop, Ayşe Gül and Savaş, Erkay, “An identity-based key infrastructure suitable for messaging applications“, Akyıldız, Ersan and Sağıroğlu, Şeref (eds.), 2. Uluslarası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı, Ankara: Cmsproject+, December 2007 |
Pedersen, Thomas Brochmann and Saygın, Yücel and Savaş, Erkay, “Secret charing vs. encryption-based techniques for privacy preserving data mining“, Joint UNECE/Eurostat Work Session on Statistical Disclosure Control, Manchester, UK: Eurostat, December 2007 |
Savaş, Erkay, “Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing“, PAKDD 2007, Berlin Heidelberg: Springer (forthcoming) |
Ünlü, Abdülhakim and Armağan, Önsel and Levi, Albert and Savaş, Erkay and Erçetin, Özgür, ” Key predistribution schemes for sensor networks for continuous deployment scenario “, Akyildiz, Ian F. and Sivakumar, Raghupathy and Ekici, Eylem and Cavalcante de Oliveira, Jaudelice and McNair, Janise (eds.), 6th International IFIP-TC6 Networking Conference, Germany: Springer 2007, 239-250 |
Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür, “Privacy-aware multi-context RFID infrastructure using public key cryptography“, Akyildiz, Ian F. and Sivakumar, Raghupathy and Ekici, Eylem and Cavalcante de Oliveira, Jaudelice and McNair, Janise (eds.), 6th International IFIP-TC6 Networking Conference, Germany: Springer 2007, 263-274 |
Öniz, Çağıl Can and Savaş, Erkay and Levi, Albert, “An optimistic fair e-commerce protocol for large e-goods“, Alagöz, F. (ed.), 7th International Symposium on Computer Networks (ISCN’ 06), USA: IEEE (Institute of Electrical and Electronics Engineers), June 2006, 214-219 |
Gutub, Adnan Abdül-Aziz and Savaş, Erkay and Kalganova, Tatiana, “Scalable VLSI design for fast GF(p) montgomery inverse computation“, IEEE International Conference on Computer & Communication Engineering (ICCCE ’06), Piscataway, NJ: IEEE, May 2006 |
İnan, Ali and Saygın, Yücel and Levi, Albert and Savaş, Erkay and Hintoğlu, Ayça Azgın, “Privacy preserving clustering on horizontally partitioned data“, 22nd International Conference on Data Engineering Workshops (ICDEW’06), New York: IEEE, April 2006, 95-95 |
Yanıkoğlu, Berrin and Levi, Albert and Savaş, Erkay and Kholmatov, Alisher Anatolyevich, “Secret sharing using biometric traits“, Biometric Technology For Human Identification, Orlando, FL, USA: SPIE, April 2006 |
Sunar, Berk and Savaş, Erkay, ” A practical and secure communication protocol in the bounded storage model “, 4th International Conference on Networking, ICN’05,, April 2005, 707-717 |
Öniz, Çağıl Can and Taşçı, Sinan Emre and Savaş, Erkay and Erçetin, Özgür and Levi, Albert, ” SeFER: secure, flexible and efficient routing protocol for distributed sensor networks “, Çayırcı, E. and Baydere, S. and Havinga, P. (eds.), 2nd European Workshop on Wireless Sensor Networks, USA: IEEE (Institute of Electrical and Electronics Engineers), February 2005, 246-255 |
Öztürk, Erdem and Sunar, Berk and Savaş, Erkay, “Low-power elliptic curve cryptography using scaled modular arithmetic“, Joye, Marc and Quisquater, Jean-Jacques (eds.), 6th Internatioanl Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Springer Verlag, August 2004, 92-106 |
Ocakoğlu, Özleyiş and Bayoğlu, Burak and Levi, Albert and Erçetin, Özgür and Savaş, Erkay, ” A probabilistic routing disruption attack on DSR and its analysis “, MEDHOCNET 2004,, June 2004, 300-306 |
Savaş, Erkay and Naseer, Mansoor, ” Hardware implementation of a novel inversion algorithm “, 46th IEEE International Midwest Symposium on Circuits and Systems, USA: IEEE (Institute of Electrical and Electronics Engineers), December 2003, 798-801 |
Ünal, Ecem and Savaş, Erkay, “Bandwidth-optimized parallel private information retrieval“, Proceedings of the 7th International Conference on Security of Information and Networks, SIN ’14, Glasgow, UK: ACM (forthcoming) |
Kocabaş, Övünç and Savaş, Erkay, “Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security“, 2008 International Conference on ReConFigurable Computing and FPGAs, IEEE Digital Library: IEEE Computer Society (forthcoming) |
Topçuoğlu, Cem and Kaya, Kamer and Savaş, Erkay, “Multi-exponentiations on multi-cores“, 5. Ulusal Yüksek Başarımlı Hesaplama Konferansı (BAŞARIM 2017), (forthcoming) |
Öksüzoğlu, Ersin and Savaş, Erkay, “Parametric, Secure and Compact Implementation of RSA on FPGA“, 2008 International Conference on ReConFigurable Computing and FPGAs, IEEE Digital Library: IEEE Computer Society (forthcoming) |
Grossschaedl, Johann and Savaş, Erkay and Yumbul, Kazım, “Realizing arbitrary-precision modular multiplication with a fixed-precision multiplier datapath“, 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig09, USA: IEEE (Institute of Electrical and Electronics Engineers) (forthcoming) |
Volumes Edited / Special Issues |
Mozaffari Kermani, Mehran and Savaş, Erkay and Upadhyaya, Shambhu J., Guest editorial: introduction to the special issue on emerging security trends for deeply-embedded computing systems, IEEE (Institute of Electrical and Electronics Engineers), September 2016 |
Levi, Albert and Savaş, Erkay and Yenigün, Hüsnü and Balcısoy, Selim and Saygın, Yücel, Proceedings of computer and information sciences – ISCIS 2006, Springer, November 2006 |
Levi, Albert and Savaş, Erkay and Yenigün, Hüsnü and Balcısoy, Selim and Saygın, Yücel, Computer and information sciences-ISCIS 2006, Heidelberg, Germany: Springer, October 2006, 1-1084 |