|
Feb 2024 - IEEE TIFS
"Yet another Improvement of Plantard Arithmetic for Faster
Kyber on Low-end 32-bit IoT Devices", IEEE Transactions
Information Forensics & Security,
to appear, 2024. PDF
|
|
Feb 2024 - The 33rd USENIX
"Faster TLS 1.3 handshake using optimized X25519 and Ed25519",
The 33rd USENIX Symposium, to appear, August 14-16, 2024.
PDF
|
|
Jan 2024 - IACR Transactions on CHES
"Revisiting Keccak and Dilithium Implementations on ARMv7-M",
IACR Transactions on CHES, Volume 2024, No. 2,
to appear, 2024.
URL
and PDF
|
|
Jan 2024 - IACR Transactions on CHES
"CASA: A Compact and Scalable Accelerator for Approximate
Homomorphic Encryption", IACR Transactions on CHES,
Volume 2024, No. 2, to appear, 2024.
URL
and PDF
|
|
Nov 2023 - Journal of Cryptographic Engineering 13/4
JCEN is the premier forum for algorithms, hardware and
software development in cryptography. Koç is the founding
editor-in-chief of the journal, established in 2011.
URL
|
|
Sep 2023 - Handbook of Cryptography
"Development of Cryptography since Shannon",
Handbook of Formal Analysis and Verification in
Cryptography, CRC Press, September 2023.
URL and PDF
|
|
Sep 2023 - 36th IEEE SOCC
"An efficient hardware design for fast implementation
of HQC", 36th IEEE International System-On-Chip
Conference (SOCC), Santa Clara, California,
pages 1-6, September 5-8, 2023.
PDF
|
|
Jun 2023 - IEEE TVLSI Systems
"LEAP: Lightweight and efficient accelerator for sparse polynomial
multiplication of HQC", IEEE Transactions on VLSI Systems,
31(6):892-896, 2023. PDF
|
|
Continued in →
news.html
|
|
|
Research Areas
|
Cryptographic Engineering
provides techniques, mechanisms, and tools for designing algorithms,
architectures, hardware and software that support private and
authenticated communication, allowing secure and authenticated
transactions over communication networks.
Finite Field Arithmetic
studies mathematical properties of finite rings and fields in
order to discover novel representations of the elements and
fast algorithms for arithmetic operations for designing efficient
software and hardware for cryptography and error-correcting codes.
Random Number Generators
are used for supplying secret keys, private keys, and ephemeral
and initializing variables in cryptographic systems. Its
foundations are based on cryptographic randomness, in terms of
its entropy under the different measures and its complexity
as methods of representation and underlying mathematical functions.
Homomorphic Encryption
is a form of encryption that allows computations to be performed
on encrypted data without decrypting it. Homomorphic
encryption is used for privacy-preserving outsourced storage and
computation. This allows data to be encrypted and out-sourced to
commercial cloud environments for processing,
while remain encrypted.
Machine Learning
is a field of study in artificial intelligence concerned with the
development and study of algorithms that can learn from data and
generalize, and thus perform tasks without explicit instructions.
Machine learning approaches have been applied to many fields
including large language models, computer vision, speech
recognition, agriculture, and medicine.
|
|