Volgen
Berk Sunar
Berk Sunar
Geverifieerd e-mailadres voor wpi.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Trojan detection using IC fingerprinting
D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar
2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007
10832007
A provably secure true random number generator with built-in tolerance to active attacks
B Sunar, WJ Martin, DR Stinson
IEEE Transactions on computers 56 (1), 109-119, 2006
7872006
Public key cryptography in sensor networks—revisited
G Gaubatz, JP Kaps, B Sunar
Security in Ad-hoc and Sensor Networks: First European Workshop, ESAS 2004 …, 2005
4892005
S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES
G Irazoqui, T Eisenbarth, B Sunar
36th IEEE Symposium on Security and Privacy (S & P), 2015
4492015
Wait a minute! A fast, Cross-VM attack on AES
G Irazoqui, MS Inci, T Eisenbarth, B Sunar
International Symposium on Research in Attacks, Intrusions and Defenses …, 2014
3582014
State of the art in ultra-low power public key cryptography for wireless sensor networks
G Gaubatz, JP Kaps, E Ozturk, B Sunar
Third IEEE International Conference on Pervasive Computing and …, 2005
3462005
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields
CK Koc, B Sunar
IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY 1 (1), 294-294, 1998
3291998
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
2952020
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2942019
Mastrovito multiplier for all trinomials
B Sunar, CK Koc
IEEE Transactions on Computers 48 (5), 522-527, 1999
2661999
An efficient optimal normal basis type II multiplier
B Sunar, CK Koç
IEEE Transactions on Computers 50 (1), 83-87, 2001
2372001
Cache Attacks Enable Bulk Key Recovery on the Cloud
MS Inci, G Irazoqui, B Gulmezoglu, T Eisenbarth, B Sunar
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1932016
Cross Processor Cache Attacks
G Irazoki, T Eisenbarth, B Sunar
AsiaCCS, 2016
167*2016
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth, B Sunar
IACR ePrint Archive, 2015
1652015
cuHE: A Homomorphic Encryption Accelerator Library
W Dai, Sunar, Berk
Cryptography and Information Security in the Balkans -- BalkanCryptSec, 2015
1642015
Memory leakage-resilient encryption based on physically unclonable functions
F Armknecht, R Maes, AR Sadeghi, B Sunar, P Tuyls
Towards Hardware-Intrinsic Security: Foundations and Practice, 135-164, 2010
1582010
Accelerating fully homomorphic encryption using GPU
W Wang, Y Hu, L Chen, X Huang, B Sunar
2012 IEEE conference on high performance extreme computing, 1-5, 2012
1542012
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47, 538-570, 2019
1502019
Towards robust low cost authentication for pervasive devices
E Ozturk, G Hammouri, B Sunar
Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008
1462008
Energy comparison of AES and SHA-1 for ubiquitous computing
JP Kaps, B Sunar
International Conference on Embedded and Ubiquitous Computing, 372-381, 2006
1402006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20