Conference Papers
- P. Cappello, G. Davidson, A. Gersho, Ç. K. Koç,
and V. Somayazulu. A systolic vector quantization processor for real-time
speech coding. Proceedings of the IEEE International
Conference on Acoustic, Speech, and Signal Processing,
Vol. 3, pages 2143-2146, Tokyo, Japan, IEEE Press, New York,
New York, April 8-11, 1986.
pdf
- Ö. Eğecioğlu, Ç. K. Koç, and
A. J. Laub. Prefix algorithms for tridiagonal systems on hypercube
multiprocessors. Proceedings of the Third Conference
on Hypercube Concurrent Computers and Applications, Vol. 2,
pages 1539-1545, Pasadena, California, ACM Press, New York,
New York, January 19-20, 1988.
pdf
- Ö. Eğecioğlu and Ç. K. Koç.
Orthogonal polynomials and least-squares approximation
on the hypercube multiprocessor. Proceedings of the
Fourth Conference on Hypercube Concurrent Computers and
Applications, Vol. 1, pages 411-414, Monterey, California,
Golden Gate Enterprises, Los Altos, California, March 6-8, 1989.
pdf
- Ç. K. Koç and P. Cappello.
Systolic arrays for integer Chinese remaindering.
Proceedings, 9th Symposium on Computer Arithmetic,
M. D. Ercegovac and E. Swartzlander, editors,
pages 216-223, Santa Monica, California,
IEEE Computer Society Press, Los Alamitos, California,
September 6-8, 1989.
pdf
- Ç. K. Koç.
A fast algorithm for mixed-radix conversion in
residue arithmetic. Proceedings, 1989 IEEE
International Conference on Computer Design: VLSI in
Computers and Processors, pages 18-21, Cambridge,
Massachusetts, IEEE Computer Society Press, Los Alamitos, California,
October 2-4, 1989.
pdf
- Ö. Eğecioğlu and Ç. K. Koç.
Fast modular exponentiation.
Communication, Control, and Signal Processing: Proceedings
of 1990 Bilkent International Conference on New Trends in
Communication, Control, and Signal Processing,
E. Arikan, editor, Vol. 1, pages 188-194, Ankara, Turkey,
Elsevier, Amsterdam, Netherlands, July 2-5, 1990.
pdf
- Ç. K. Koç and R. M. Piedra.
A parallel algorithm for exact solution of linear
equations. Proceedings of International Conference
on Parallel Processing, Vol. III, pages 1-8, St. Charles,
Illinois, CRC Press, Boca Raton, Florida, August 12-16, 1991.
pdf
- Ç. K. Koç, A. Guvenc, and B. Bakkaloglu.
Exact solution of linear equations on distributed-memory multiprocessors.
Proceedings of the 14th IMACS World Congress on Computational
and Applied Mathematics, Vol. 3, pages 1339-1341, Atlanta,
Georgia, July 11-15, 1994.
pdf
- G. Chen and Ç. K. Koç.
A fast algorithm for matrix-valued Nevanlinna-Pick interpolation.
Conference on Approximation Theory VIII, Vol 1:
Approximation and Interpolation,
C. K. Chui and L. L. Schumaker, editors, pages 129-136,
World Scientific Publishing, 1995.
pdf
- Ç. K. Koç and B. Bakkaloglu.
Halley's method for the matrix sector function.
Proceedings of the 12th European Conference on Circuit
Theory and Design, Vol. 2, pages 901-904,
Istanbul, Turkey, August 27-31, 1995.
pdf
- B. Bakkaloglu and Ç. K. Koç.
Parallel matrix sign iterations.
Proceedings of the 33rd Annual Allerton Conference on
Communication, Control, and Computing, pages 440-446,
Urbana, Illinois, October 4-6, 1995.
pdf
- Ç. K. Koç and T. Acar.
Montgomery multiplication in GF(2^k).
Proceedings of Third Annual Workshop on Selected Areas
in Cryptography, pages 95-106, Queen's University, Kingston,
Ontario, Canada, August 15-16, 1996.
pdf
- C. K. Sandalcı, Ç. K. Koç, and S. M. Goodnick.
Three dimensional Monte Carlo device
simulation with parallel multigrid solver.
Proceedings of the Eight SIAM Conference on Parallel Processing
for Scientific Computing, 8 pages, CD-ROM Format,
Minneapolis, Minnesota, March 14-17, 1997.
pdf
- Ç. K. Koç and T. Acar.
Fast software exponentiation in GF(2^k).
Proceedings, 13th Symposium on Computer Arithmetic,
T. Lang, J.-M. Muller, and N. Takagi, editors,
pages 225-231, Asilomar, California,
IEEE Computer Society Press, Los Alamitos, California, July 6-9, 1997.
pdf
- Ç. K. Koç and B. Sunar.
Low-complexity bit-parallel canonical and normal basis multipliers
for a class of finite fields.
Proceedings of 1998 IEEE International Symposium on
Information Theory, pages 294-294, MIT, Cambridge, Massachusetts,
August 16-21, 1998.
pdf
- M. Aydos, E. Savaş, and Ç. K. Koç.
Implementing network security protocols based on elliptic
curve cryptography.
Proceedings of the Fourth Symposium on Computer
Networks, S. Oktug, B. Orencik, and E. Harmanci,
editors, pages 130-139, Istanbul, Turkey, May 20-21, 1999.
pdf
- A. F. Tenca and Ç. K. Koç.
A scalable architecture for Montgomery multiplication.
Cryptographic Hardware and Embedded Systems,
Ç. K. Koç and C. Paar, editors,
First International Workshop, Worcester, MA, USA,
pages 94-108, Springer, LNCS Nr. 1717, August 12-13, 1999.
pdf
- A. Halbutoğulları and Ç. K. Koç.
Mastrovito multiplier for general irreducible polynomials.
Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, M. Fossorier, H. Imai, S. Lin, and A. Poli, editors,
13th International Symposium, Honolulu, Hawaii, USA, pages 498-507,
Springer, LNCS Nr. 1719, November 15-19, 1999.
pdf
- E. Savaş, A. F. Tenca, and Ç. K. Koç.
A scalable and unified multiplier architecture for finite fields
GF(p) and GF(2^m).
Cryptographic Hardware and Embedded Systems - CHES 2000,
Ç. K. Koç and C. Paar, editors,
Second International Workshop, Worcester, MA, USA,
pages 277-292, Springer, LNCS Nr. 1965, August 17-18, 2000.
pdf
- M. Aydos, T. Yanık, and Ç. K. Koç.
An high-speed ECC-based wireless authentication
protocol on an ARM microprocessor.
Proceedings, The 16th Annual Computer Security Applications
Conference, pages 401-409, New Orleans, Louisiana,
IEEE Computer Society Press, Los Alamitos, California,
December 11-15, 2000.
pdf
- E. Savaş, T. A. Schmidt, and Ç. K. Koç.
Generating elliptic curves of known order.
Cryptographic Hardware and Embedded Systems - CHES 2001,
Ç. K. Koç, D. Naccache, and C. Paar, editors,
Third International Workshop, Paris, France, pages 142-158,
Springer, LNCS Nr. 2162, May 14-16, 2001.
pdf
- A. F. Tenca, G. Todorov, and Ç. K. Koç.
High-radix design of a scalable modular multiplier.
Cryptographic Hardware and Embedded Systems - CHES 2001,
Ç. K. Koç, D. Naccache, and C. Paar, editors,
Third International Workshop, Paris, France, pages 185-201,
Springer, LNCS Nr. 2162, May 14-16, 2001.
pdf
- A. Levi and Ç. K. Koç.
Reducing certificate revocation cost using NPKI.
Trusted Information, The New Decade Challenge,
IFIP TC11 16th International Conference on Information Security,
pages 51-59, M. Dupuy and P. Paradinas, editors,
Kluwer Academic Publishers, Boston, MA,
June 11-13, 2001.
pdf
- A. Levi and Ç. K. Koç.
CONSEPP: Convenient and secure electronic payment
protocol based on X9.59.
Proceedings, The 17th Annual Computer Security Applications
Conference, pages 286-295, New Orleans, Louisiana,
IEEE Computer Society Press, Los Alamitos, California,
December 10-14, 2001.
pdf
- A. A. Gutub, A. F. Tenca, and Ç. K. Koç.
Scalable VLSI architecture for GF(p) Montgomery modular
inverse computation.
IEEE Computer Society Annual Symposium on VLSI,
pages 53-58, Pittsburgh, Pennsylvania,
IEEE Computer Society Press, Los Alamitos, California,
April 25-26, 2002.
pdf
- A. A.-A. Gutub, A. F. Tenca, E. Savaş, and
Ç. K. Koç. Scalable and unified hardware to compute
Montgomery inverse in GF(p) and GF(2^n).
Cryptographic Hardware and Embedded Systems - CHES 2002,
B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors,
4th International Workshop, Redwood Shores, CA, USA, pages 484-499,
Springer, LNCS Nr. 2523, August 13-15, 2002.
pdf
- E. Savaş and Ç. K. Koç.
Architectures for unified field inversion with applications
in elliptic curve cryptography.
The 9th IEEE International Conference on Electronics,
Circuits and Systems - ICECS 2002,
volume 3, pages 1155-1158, Dubrovnik, Croatia, September 15-18, 2002.
pdf
- C. van Dyke and Ç. K. Koç.
On ubiquitous network security and anomaly detection.
2003 Symposium on Applications and Internet -
Workshop on Security and Assurance in Ad hoc Networks,
pages 374-378, Orlando, Florida, January 27-31, 2003.
pdf
- F. Rodríguez-Henríquez and Ç. K. Koç.
On fully parallel Karatsuba multipliers for GF(2^m).
Proceedings of the International Conference on Computer
Science and Technology - CST 2003, pages 405-410,
Acta Press, Cancun, Mexico, May 19-21, 2003.
pdf
- S. S. Erdem and Ç. K. Koç.
A less recursive variant of Karatsuba-Ofman algorithm
for multiplying operands of size a power of two.
Proceedings, 16th IEEE Symposium on Computer Arithmetic,
J.-C. Bajard and M. Schulte, editors, pages 28-35, IEEE Computer
Society Press, Santiago de Compostela, Spain, June 15-18, 2003.
pdf
- E. Savaş, A. F. Tenca, and Ç. K. Koç.
Dual-field multiplier architecture for cryptographic applications.
Thirty-Seventh Asilomar Conference on Signals, Systems, and
Computers, pages 374-378, IEEE Press,
Pacific Grove, California, November 9-12, 2003.
pdf
- A. Levi, E. Cetintas, M. Aydos, Ç. K. Koç, and
M. U.Çağlayan. Relay attacks on Bluetooth
authentication and solutions.
Computer and Information Sciences - ISCIS 2004,
C. Aykanat et al, editors, 19th International Symposium,
Kemer-Antalya, Turkey, pages 278-288, Springer, LNCS Nr. 3280,
October 27-29, 2004.
pdf
- L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç.
A dual-field modular division algorithm and architecture for
application specific hardware.
Thirty-Eighth Asilomar Conference on Signals, Systems, and
Computers, pages 483-487, IEEE Press, Pacific Grove, California,
November 7-10, 2004.
pdf
- M. Cihan and Ç. K. Koç.
Setting initial secret keys in a mobile adhoc network.
1st International Symposium on Information Technologies - ISIT 2005,
Symposium Proceedings, pages 71-83, Girne, North Cyprus,
April 19-21, 2005.
pdf
- L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç.
An efficient hardware architecture of a scalable elliptic curve
crypto-processor over GF(2^m). Advanced Signal Processing
Algorithms, Architectures, and Implementations XV, Proceedings of
SPIE Conference,, F. T. Luk, editor, pages 216-226, Volume 5910,
San Diego, California, August 2-4, 2005.
pdf
- O. Acıiçmez, W. Schindler, and Ç. K. Koç.
Improving Brumley and Boneh timing attack on unprotected SSL
implementations. Proceedings of 12th ACM Conference on
Computer and Communications Security, C. Meadows and P. Syverson,
editors, pages 139-146, Alexandria, Virginia, November 7-11, 2005.
pdf
- O. Acıiçmez and Ç. K. Koç.
Trace-driven cache attacks on AES.
8th International Conference on Information and Communications
Security, ICISCS 2006, P. Ning, S. Qing, and N. Li, editors,
pages 112-121, Springer, LNCS Nr. 4307, Raleigh, North Carolina,
December 4-7, 2006.
pdf
- O. Acıiçmez, W. Schindler, and Ç. K. Koç.
Cache based remote timing attack on the AES.
Topics in Cryptology, The Cryptographers' Track at the RSA
Conference, CT-RSA 2007, M. Abe, editor, pages 271-286, Springer,
LNCS Nr. 4377, San Francisco, California, February 5-9, 2007.
pdf
- O. Acıiçmez, J. P. Seifert, and
Ç. K. Koç. Predicting secret keys via branch prediction.
Topics in Cryptology, The Cryptographers' Track at the RSA
Conference, CT-RSA 2007, M. Abe, editor, pages 225-242, Springer,
LNCS Nr. 4377, San Francisco, California, February 5-9, 2007.
pdf
- O. Acıiçmez, Ç. K. Koç, and
J. P. Seifert. On the power of simple branch prediction analysis.
ACM Symposium on Information, Computer and Communications
Security, ASIACCS 2007, R. Deng and P. Samarati, editors,
pages 312-320, Singapore, March 20-22, 2007.
pdf
- G. Saldamlı and Ç. K. Koç.
Spectral modular exponentiation.
Proceedings, 18th IEEE Symposium on Computer Arithmetic,
P. Kornerup and J.-M. Muller, editors, pages 123-130, IEEE Computer
Society Press, Montpellier, France, June 25-27, 2007.
pdf
- I. Yavuz, S. B. O. Yalcin, and Ç. K. Koç.
FPGA implementation of an elliptic curve cryptosystem over GF(3^m).
2008 International Conference on ReConFigurable Computing and
FPGAs, pages 397-402, IEEE Computer Society Press, Cancun, Mexico,
December 3-5, 2008. pdf
- G. Saldamlı, C. Demirkiran, M. Maguire, C. Minden,
J. Topper, A. Troesch, C. Walker, and Ç. K. Koç.
Spectral hash. The First SHA-3 Candidate Conference,
Katholieke Universiteit, Leuven, Belgium,
February 25-28, 2009. pdf
- M. Cenk, Ç. K. Koç, and F. Özbudak.
Polynomial multiplication over finite fields using field
extensions and interpolation.
Proceedings, 19th IEEE Symposium on Computer Arithmetic,
pages 84-91, IEEE Computer Society Press, Portland, Oregon,
June 8-10, 2009. pdf
- R. C. C. Cheung, Ç. K. Koç, and J. D. Villasenor.
An efficient hardware architecture for Spectral Hash algorithm.
Proceedings, 20th IEEE International Conference on
Application-specific Systems, Architectures and Processors,
pages 215-218, IEEE Press, Boston, MA, July 7-9, 2009.
pdf
- L.-W. Kim, J. D. Villasenor, and Ç. K. Koç.
A Trojan-resistant system-on-chip bus architecture.
Proceedings of Military Communications Conference (MILCOM),
pages 1-6, Boston, MA, October 18-21, 2009.
pdf
- G. X. Yao, R. C. C. Cheung, Ç. K. Koç, and K. F. Man.
Reconfigurable number theoretic transform architectures for
cryptographic applications.
The 2010 International Conference on Field-Programmable
Technology (FPT), pages 308-311, Beijing, China,
December 8-10, 2010.
pdf
- G. Saldamlı, Y.-J. Baek, and Ç. K. Koç.
Spectral modular arithmetic for binary extension fields.
The International Conference on Information
and Computer Networks (ICICN), pages 323-328,
Guiyang, China, January 26-28, 2011.
pdf
- J. Valamehr, T. Huffmire, C. Irvine, R. Kastner,
Ç. K. Koç, T. Levin, and T. Sherwood.
A qualitative security analysis of a new class of
3-D integrated crypto co-processors.
Festschrift Jean-Jacques Quisquater,
pages 364-382, D. Naccache, editor, LNCS Nr. 6805, Springer, 2012.
pdf
- D. D. Chen, G. X. Yao, Ç. K. Koç, and R. C. C. Cheung.
Low complexity and hardware-friendly spectral modular multiplication.
The 2012 International Conference on Field-Programmable
Technology (FPT), pages 368-375, Seoul, Korea, December 10-12, 2012.
pdf
- Ö. Eğecioğlu and Ç. K. Koç.
Reducing the complexity of normal basis multiplication.
International Workshop on Arithmetic of Finite Fields (WAIFI),
Gebze, Turkey. Springer, LNCS Nr. 9061, pages 61-80, September 26-28, 2014.
pdf
- N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng.
Hardware Trojans in incompletely specified on-chip bus systems.
Design, Automation and Test in Europe (DATE), pages 527-530,
Dresden, Germany, March 14-18, 2016.
pdf
- S. Green, İ. Çiçek, and Ç. K. Koç.
Continuous-time computational aspects of cyber-physical security.
Workshop on Fault Diagnosis and Tolerance in Cryptography,
pages 59-62, Santa Barbara, CA, August 16, 2016.
pdf
- İ. San, N. Fern, Ç. K. Koç, and K.-T. Cheng.
Trojans modifying soft-processor instruction sequences embedded in
FPGA bitstreams. 26th International Conference on
Field-Programmable Logic and Applications (FPL), pages 334-337,
Lausanne, Switzerland, August 29 - September 2, 2016.
pdf
- S. Green, C. M. Vineyard, and Ç. K. Koç.
Impacts of mathematical optimizations on reinforcement learning
policy performance.
International Joint Conference on Neural Networks (IJCNN),
Rio de Janeiro, Brazil, July 8-13, 2018.
pdf
- J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç.
Visual diagnostics for deep reinforcement learning policy development.
NVIDIA GPU Technology Conference (GTC),
San Jose, California, March 18-21, 2019.
pdf
- S. Green, C. M. Vineyard, W. M. Severa, and Ç. K. Koç.
Benchmarking event-driven neuromorphic architectures.
International Conference on Neuromorphic Systems (ICONS),
Knoxville, Tennessee, July 23-25, 2019.
pdf
- S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç.
RAPDARTS: Resource-aware progressive differentiable architecture search.
International Joint Conference on Neural Networks (IJCNN),
Glasgow, UK, July 19-24, 2020.
pdf
- Ç. K. Koç. Formidable challenges in hardware
implementations of fully homomorphic encryption functions for
applications in machine learning. Proceedings of the 4th ACM
Workshop on Attacks and Solutions in Hardware Security (ASHES),
page 3, November 13, 2020.
pdf
- S. C. Oliva Madrigal, G. Saldamlı, C. Li, Y. Geng,
T. Jing, Z. Wang, and Ç. K. Koç. Reduction-free
multiplication for finite fields and polynomial rings.
International Workshop on Arithmetic of Finite Fields (WAIFI),
Chengdu, China, Springer LNCS 13638, pages 53-78,
August 29 - September 2, 2022. pdf
- Y. Xin, G. Tang, D. Chen, R. Zhang, T. Liang,
R. C. C. Cheung, and Ç. K. Koç.
A versatility-performance balanced hardware architecture
for scene text detection.
IEEE International Conference on Ubiquitous Intelligence
and Computing, Hainan, China, pages 540-549,
December 15-18, 2022. pdf
→ IEEE Outstanding Paper Award
- C. Li, S. Song, J. Tian, Z. Wang,
and Ç. K. Koç.
An efficient hardware design for fast implementation of HQC.
IEEE 36th International System-on-Chip Conference (SOCC),
Santa Clara, California, pages 1-6, September 5-8, 2023.
pdf
- J. Xie, P. He, S. C. O. Madrigal, and Ç. K. Koç.
SMALL: Scalable Matrix OriginAted Large Integer PoLynomial
Multiplication Accelerator for Lattice-based Post-Quantum
Cryptography. International Workshop on Arithmetic of
Finite Fields (WAIFI), Ottawa, Canada, to appear,
June 10-12, 2024. pdf
- P. He, B. Mongirdas, Ç. K. Koç, and J. Xie.
LAMP: Efficient Implementation of Lightweight Accelerator for
Polynomial Multiplication, from Falcon to RBLWE-ENC.
Proceedings of the Great Lakes Symposium on VLSI (GSVLSI),
Tampa Bay Area, Florida, pages 210-215, June 12-14, 2024.
pdf
- M. Huang, W. Yuan, D. Guan, M. Lu, and Ç. K. Koç.
Guided particle adaptation PSO for feature selection on
high-dimensional classification.
Advanced Intelligent Computing Technology and Applications,
20th International Conference, ICIC 2024, Tianjin, China,
pages 14-26, Proceedings, Part I, LNCS 14862, August 5–8, 2024.
pdf
- J. Zhang, J. Huang, L. Zhao, D. Chen, and Ç. K. Koç.
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and
Ed25519. The 33rd USENIX Symposium, Philadelphia,
Pensylvania, to appear, August 14-16, 2024.
pdf
→ USENIX Security
Distinguished Paper Award
|