Çetin Kaya Koç - Publications

 Home 
 Research 
 Publications 
 Teaching 
 Biography 

Conference Papers

  1. P. Cappello, G. Davidson, A. Gersho, Ç. K. Koç, and V. Somayazulu. A systolic vector quantization processor for real-time speech coding. Proceedings of the IEEE International Conference on Acoustic, Speech, and Signal Processing, Vol. 3, pages 2143-2146, Tokyo, Japan, IEEE Press, New York, New York, April 8-11, 1986.   pdf
  2. Ö. Eğecioğlu, Ç. K. Koç, and A. J. Laub. Prefix algorithms for tridiagonal systems on hypercube multiprocessors. Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, Vol. 2, pages 1539-1545, Pasadena, California, ACM Press, New York, New York, January 19-20, 1988.   pdf
  3. Ö. Eğecioğlu and Ç. K. Koç. Orthogonal polynomials and least-squares approximation on the hypercube multiprocessor. Proceedings of the Fourth Conference on Hypercube Concurrent Computers and Applications, Vol. 1, pages 411-414, Monterey, California, Golden Gate Enterprises, Los Altos, California, March 6-8, 1989.   pdf
  4. Ç. K. Koç and P. Cappello. Systolic arrays for integer Chinese remaindering. Proceedings, 9th Symposium on Computer Arithmetic, M. D. Ercegovac and E. Swartzlander, editors, pages 216-223, Santa Monica, California, IEEE Computer Society Press, Los Alamitos, California, September 6-8, 1989.   pdf
  5. Ç. K. Koç. A fast algorithm for mixed-radix conversion in residue arithmetic. Proceedings, 1989 IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 18-21, Cambridge, Massachusetts, IEEE Computer Society Press, Los Alamitos, California, October 2-4, 1989.   pdf
  6. Ö. Eğecioğlu and Ç. K. Koç. Fast modular exponentiation. Communication, Control, and Signal Processing: Proceedings of 1990 Bilkent International Conference on New Trends in Communication, Control, and Signal Processing, E. Arikan, editor, Vol. 1, pages 188-194, Ankara, Turkey, Elsevier, Amsterdam, Netherlands, July 2-5, 1990.   pdf
  7. Ç. K. Koç and R. M. Piedra. A parallel algorithm for exact solution of linear equations. Proceedings of International Conference on Parallel Processing, Vol. III, pages 1-8, St. Charles, Illinois, CRC Press, Boca Raton, Florida, August 12-16, 1991.   pdf
  8. Ç. K. Koç, A. Guvenc, and B. Bakkaloglu. Exact solution of linear equations on distributed-memory multiprocessors. Proceedings of the 14th IMACS World Congress on Computational and Applied Mathematics, Vol. 3, pages 1339-1341, Atlanta, Georgia, July 11-15, 1994.   pdf
  9. G. Chen and Ç. K. Koç. A fast algorithm for matrix-valued Nevanlinna-Pick interpolation. Conference on Approximation Theory VIII, Vol 1: Approximation and Interpolation, C. K. Chui and L. L. Schumaker, editors, pages 129-136, World Scientific Publishing, 1995.   pdf
  10. Ç. K. Koç and B. Bakkaloglu. Halley's method for the matrix sector function. Proceedings of the 12th European Conference on Circuit Theory and Design, Vol. 2, pages 901-904, Istanbul, Turkey, August 27-31, 1995.   pdf
  11. B. Bakkaloglu and Ç. K. Koç. Parallel matrix sign iterations. Proceedings of the 33rd Annual Allerton Conference on Communication, Control, and Computing, pages 440-446, Urbana, Illinois, October 4-6, 1995.   pdf
  12. Ç. K. Koç and T. Acar. Montgomery multiplication in GF(2^k). Proceedings of Third Annual Workshop on Selected Areas in Cryptography, pages 95-106, Queen's University, Kingston, Ontario, Canada, August 15-16, 1996.   pdf
  13. C. K. Sandalcı, Ç. K. Koç, and S. M. Goodnick. Three dimensional Monte Carlo device simulation with parallel multigrid solver. Proceedings of the Eight SIAM Conference on Parallel Processing for Scientific Computing, 8 pages, CD-ROM Format, Minneapolis, Minnesota, March 14-17, 1997.   pdf
  14. Ç. K. Koç and T. Acar. Fast software exponentiation in GF(2^k). Proceedings, 13th Symposium on Computer Arithmetic, T. Lang, J.-M. Muller, and N. Takagi, editors, pages 225-231, Asilomar, California, IEEE Computer Society Press, Los Alamitos, California, July 6-9, 1997.   pdf
  15. Ç. K. Koç and B. Sunar. Low-complexity bit-parallel canonical and normal basis multipliers for a class of finite fields. Proceedings of 1998 IEEE International Symposium on Information Theory, pages 294-294, MIT, Cambridge, Massachusetts, August 16-21, 1998.   pdf
  16. M. Aydos, E. Savaş, and Ç. K. Koç. Implementing network security protocols based on elliptic curve cryptography. Proceedings of the Fourth Symposium on Computer Networks, S. Oktug, B. Orencik, and E. Harmanci, editors, pages 130-139, Istanbul, Turkey, May 20-21, 1999.   pdf
  17. A. F. Tenca and Ç. K. Koç. A scalable architecture for Montgomery multiplication. Cryptographic Hardware and Embedded Systems, Ç. K. Koç and C. Paar, editors, First International Workshop, Worcester, MA, USA, pages 94-108, Springer, LNCS Nr. 1717, August 12-13, 1999.   pdf
  18. A. Halbutoğulları and Ç. K. Koç. Mastrovito multiplier for general irreducible polynomials. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, 13th International Symposium, Honolulu, Hawaii, USA, pages 498-507, Springer, LNCS Nr. 1719, November 15-19, 1999.   pdf
  19. E. Savaş, A. F. Tenca, and Ç. K. Koç. A scalable and unified multiplier architecture for finite fields GF(p) and GF(2^m). Cryptographic Hardware and Embedded Systems - CHES 2000, Ç. K. Koç and C. Paar, editors, Second International Workshop, Worcester, MA, USA, pages 277-292, Springer, LNCS Nr. 1965, August 17-18, 2000.   pdf
  20. M. Aydos, T. Yanık, and Ç. K. Koç. An high-speed ECC-based wireless authentication protocol on an ARM microprocessor. Proceedings, The 16th Annual Computer Security Applications Conference, pages 401-409, New Orleans, Louisiana, IEEE Computer Society Press, Los Alamitos, California, December 11-15, 2000.   pdf
  21. E. Savaş, T. A. Schmidt, and Ç. K. Koç. Generating elliptic curves of known order. Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. K. Koç, D. Naccache, and C. Paar, editors, Third International Workshop, Paris, France, pages 142-158, Springer, LNCS Nr. 2162, May 14-16, 2001.   pdf
  22. A. F. Tenca, G. Todorov, and Ç. K. Koç. High-radix design of a scalable modular multiplier. Cryptographic Hardware and Embedded Systems - CHES 2001, Ç. K. Koç, D. Naccache, and C. Paar, editors, Third International Workshop, Paris, France, pages 185-201, Springer, LNCS Nr. 2162, May 14-16, 2001.   pdf
  23. A. Levi and Ç. K. Koç. Reducing certificate revocation cost using NPKI. Trusted Information, The New Decade Challenge, IFIP TC11 16th International Conference on Information Security, pages 51-59, M. Dupuy and P. Paradinas, editors, Kluwer Academic Publishers, Boston, MA, June 11-13, 2001.   pdf
  24. A. Levi and Ç. K. Koç. CONSEPP: Convenient and secure electronic payment protocol based on X9.59. Proceedings, The 17th Annual Computer Security Applications Conference, pages 286-295, New Orleans, Louisiana, IEEE Computer Society Press, Los Alamitos, California, December 10-14, 2001.   pdf
  25. A. A. Gutub, A. F. Tenca, and Ç. K. Koç. Scalable VLSI architecture for GF(p) Montgomery modular inverse computation. IEEE Computer Society Annual Symposium on VLSI, pages 53-58, Pittsburgh, Pennsylvania, IEEE Computer Society Press, Los Alamitos, California, April 25-26, 2002.   pdf
  26. A. A.-A. Gutub, A. F. Tenca, E. Savaş, and Ç. K. Koç. Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2^n). Cryptographic Hardware and Embedded Systems - CHES 2002, B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, 4th International Workshop, Redwood Shores, CA, USA, pages 484-499, Springer, LNCS Nr. 2523, August 13-15, 2002.   pdf
  27. E. Savaş and Ç. K. Koç. Architectures for unified field inversion with applications in elliptic curve cryptography. The 9th IEEE International Conference on Electronics, Circuits and Systems - ICECS 2002, volume 3, pages 1155-1158, Dubrovnik, Croatia, September 15-18, 2002.   pdf
  28. C. van Dyke and Ç. K. Koç. On ubiquitous network security and anomaly detection. 2003 Symposium on Applications and Internet - Workshop on Security and Assurance in Ad hoc Networks, pages 374-378, Orlando, Florida, January 27-31, 2003.   pdf
  29. F. Rodríguez-Henríquez and Ç. K. Koç. On fully parallel Karatsuba multipliers for GF(2^m). Proceedings of the International Conference on Computer Science and Technology - CST 2003, pages 405-410, Acta Press, Cancun, Mexico, May 19-21, 2003.   pdf
  30. S. S. Erdem and Ç. K. Koç. A less recursive variant of Karatsuba-Ofman algorithm for multiplying operands of size a power of two. Proceedings, 16th IEEE Symposium on Computer Arithmetic, J.-C. Bajard and M. Schulte, editors, pages 28-35, IEEE Computer Society Press, Santiago de Compostela, Spain, June 15-18, 2003.   pdf
  31. E. Savaş, A. F. Tenca, and Ç. K. Koç. Dual-field multiplier architecture for cryptographic applications. Thirty-Seventh Asilomar Conference on Signals, Systems, and Computers, pages 374-378, IEEE Press, Pacific Grove, California, November 9-12, 2003.   pdf
  32. A. Levi, E. Cetintas, M. Aydos, Ç. K. Koç, and M. U.Çağlayan. Relay attacks on Bluetooth authentication and solutions. Computer and Information Sciences - ISCIS 2004, C. Aykanat et al, editors, 19th International Symposium, Kemer-Antalya, Turkey, pages 278-288, Springer, LNCS Nr. 3280, October 27-29, 2004.   pdf
  33. L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç. A dual-field modular division algorithm and architecture for application specific hardware. Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers, pages 483-487, IEEE Press, Pacific Grove, California, November 7-10, 2004.   pdf
  34. M. Cihan and Ç. K. Koç. Setting initial secret keys in a mobile adhoc network. 1st International Symposium on Information Technologies - ISIT 2005, Symposium Proceedings, pages 71-83, Girne, North Cyprus, April 19-21, 2005.   pdf
  35. L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç. An efficient hardware architecture of a scalable elliptic curve crypto-processor over GF(2^m). Advanced Signal Processing Algorithms, Architectures, and Implementations XV, Proceedings of SPIE Conference,, F. T. Luk, editor, pages 216-226, Volume 5910, San Diego, California, August 2-4, 2005.   pdf
  36. O. Acıiçmez, W. Schindler, and Ç. K. Koç. Improving Brumley and Boneh timing attack on unprotected SSL implementations. Proceedings of 12th ACM Conference on Computer and Communications Security, C. Meadows and P. Syverson, editors, pages 139-146, Alexandria, Virginia, November 7-11, 2005.   pdf
  37. O. Acıiçmez and Ç. K. Koç. Trace-driven cache attacks on AES. 8th International Conference on Information and Communications Security, ICISCS 2006, P. Ning, S. Qing, and N. Li, editors, pages 112-121, Springer, LNCS Nr. 4307, Raleigh, North Carolina, December 4-7, 2006.   pdf
  38. O. Acıiçmez, W. Schindler, and Ç. K. Koç. Cache based remote timing attack on the AES. Topics in Cryptology, The Cryptographers' Track at the RSA Conference, CT-RSA 2007, M. Abe, editor, pages 271-286, Springer, LNCS Nr. 4377, San Francisco, California, February 5-9, 2007.   pdf
  39. O. Acıiçmez, J. P. Seifert, and Ç. K. Koç. Predicting secret keys via branch prediction. Topics in Cryptology, The Cryptographers' Track at the RSA Conference, CT-RSA 2007, M. Abe, editor, pages 225-242, Springer, LNCS Nr. 4377, San Francisco, California, February 5-9, 2007.   pdf
  40. O. Acıiçmez, Ç. K. Koç, and J. P. Seifert. On the power of simple branch prediction analysis. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, R. Deng and P. Samarati, editors, pages 312-320, Singapore, March 20-22, 2007.   pdf
  41. G. Saldamlı and Ç. K. Koç. Spectral modular exponentiation. Proceedings, 18th IEEE Symposium on Computer Arithmetic, P. Kornerup and J.-M. Muller, editors, pages 123-130, IEEE Computer Society Press, Montpellier, France, June 25-27, 2007.   pdf
  42. I. Yavuz, S. B. O. Yalcin, and Ç. K. Koç. FPGA implementation of an elliptic curve cryptosystem over GF(3^m). 2008 International Conference on ReConFigurable Computing and FPGAs, pages 397-402, IEEE Computer Society Press, Cancun, Mexico, December 3-5, 2008.   pdf
  43. G. Saldamlı, C. Demirkiran, M. Maguire, C. Minden, J. Topper, A. Troesch, C. Walker, and Ç. K. Koç. Spectral hash. The First SHA-3 Candidate Conference, Katholieke Universiteit, Leuven, Belgium, February 25-28, 2009.   pdf
  44. M. Cenk, Ç. K. Koç, and F. Özbudak. Polynomial multiplication over finite fields using field extensions and interpolation. Proceedings, 19th IEEE Symposium on Computer Arithmetic, pages 84-91, IEEE Computer Society Press, Portland, Oregon, June 8-10, 2009.   pdf
  45. R. C. C. Cheung, Ç. K. Koç, and J. D. Villasenor. An efficient hardware architecture for Spectral Hash algorithm. Proceedings, 20th IEEE International Conference on Application-specific Systems, Architectures and Processors, pages 215-218, IEEE Press, Boston, MA, July 7-9, 2009.   pdf
  46. L.-W. Kim, J. D. Villasenor, and Ç. K. Koç. A Trojan-resistant system-on-chip bus architecture. Proceedings of Military Communications Conference (MILCOM), pages 1-6, Boston, MA, October 18-21, 2009.   pdf
  47. G. X. Yao, R. C. C. Cheung, Ç. K. Koç, and K. F. Man. Reconfigurable number theoretic transform architectures for cryptographic applications. The 2010 International Conference on Field-Programmable Technology (FPT), pages 308-311, Beijing, China, December 8-10, 2010.   pdf
  48. G. Saldamlı, Y.-J. Baek, and Ç. K. Koç. Spectral modular arithmetic for binary extension fields. The International Conference on Information and Computer Networks (ICICN), pages 323-328, Guiyang, China, January 26-28, 2011.   pdf
  49. J. Valamehr, T. Huffmire, C. Irvine, R. Kastner, Ç. K. Koç, T. Levin, and T. Sherwood. A qualitative security analysis of a new class of 3-D integrated crypto co-processors. Festschrift Jean-Jacques Quisquater, pages 364-382, D. Naccache, editor, LNCS Nr. 6805, Springer, 2012.   pdf
  50. D. D. Chen, G. X. Yao, Ç. K. Koç, and R. C. C. Cheung. Low complexity and hardware-friendly spectral modular multiplication. The 2012 International Conference on Field-Programmable Technology (FPT), pages 368-375, Seoul, Korea, December 10-12, 2012.   pdf
  51. Ö. Eğecioğlu and Ç. K. Koç. Reducing the complexity of normal basis multiplication. International Workshop on Arithmetic of Finite Fields (WAIFI), Gebze, Turkey. Springer, LNCS Nr. 9061, pages 61-80, September 26-28, 2014.   pdf
  52. N. Fern, İ. San, Ç. K. Koç, and K.-T. Cheng. Hardware Trojans in incompletely specified on-chip bus systems. Design, Automation and Test in Europe (DATE), pages 527-530, Dresden, Germany, March 14-18, 2016.   pdf
  53. S. Green, İ. Çiçek, and Ç. K. Koç. Continuous-time computational aspects of cyber-physical security. Workshop on Fault Diagnosis and Tolerance in Cryptography, pages 59-62, Santa Barbara, CA, August 16, 2016.   pdf
  54. İ. San, N. Fern, Ç. K. Koç, and K.-T. Cheng. Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams. 26th International Conference on Field-Programmable Logic and Applications (FPL), pages 334-337, Lausanne, Switzerland, August 29 - September 2, 2016.   pdf
  55. S. Green, C. M. Vineyard, and Ç. K. Koç. Impacts of mathematical optimizations on reinforcement learning policy performance. International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, July 8-13, 2018.   pdf
  56. J. Luo, S. Green, P. Feghali, G. Legrady, and Ç. K. Koç. Visual diagnostics for deep reinforcement learning policy development. NVIDIA GPU Technology Conference (GTC), San Jose, California, March 18-21, 2019.   pdf
  57. S. Green, C. M. Vineyard, W. M. Severa, and Ç. K. Koç. Benchmarking event-driven neuromorphic architectures. International Conference on Neuromorphic Systems (ICONS), Knoxville, Tennessee, July 23-25, 2019.   pdf
  58. S. Green, C. M. Vineyard, R. Helsinki, and Ç. K. Koç. RAPDARTS: Resource-aware progressive differentiable architecture search. International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, July 19-24, 2020.   pdf
  59. Ç. K. Koç. Formidable challenges in hardware implementations of fully homomorphic encryption functions for applications in machine learning. Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES), page 3, November 13, 2020.   pdf
  60. S. C. Oliva Madrigal, G. Saldamlı, C. Li, Y. Geng, T. Jing, Z. Wang, and Ç. K. Koç. Reduction-free multiplication for finite fields and polynomial rings. International Workshop on Arithmetic of Finite Fields (WAIFI), Chengdu, China, Springer LNCS 13638, pages 53-78, August 29 - September 2, 2022.   pdf
  61. Y. Xin, G. Tang, D. Chen, R. Zhang, T. Liang, R. C. C. Cheung, and Ç. K. Koç. A versatility-performance balanced hardware architecture for scene text detection. IEEE International Conference on Ubiquitous Intelligence and Computing, Hainan, China, pages 540-549, December 15-18, 2022.   pdf   → IEEE Outstanding Paper Award
  62. C. Li, S. Song, J. Tian, Z. Wang, and Ç. K. Koç. An efficient hardware design for fast implementation of HQC. IEEE 36th International System-on-Chip Conference (SOCC), Santa Clara, California, pages 1-6, September 5-8, 2023.   pdf
  63. J. Xie, P. He, S. C. O. Madrigal, and Ç. K. Koç. SMALL: Scalable Matrix OriginAted Large Integer PoLynomial Multiplication Accelerator for Lattice-based Post-Quantum Cryptography. International Workshop on Arithmetic of Finite Fields (WAIFI), Ottawa, Canada, to appear, June 10-12, 2024.   pdf
  64. P. He, B. Mongirdas, Ç. K. Koç, and J. Xie. LAMP: Efficient Implementation of Lightweight Accelerator for Polynomial Multiplication, from Falcon to RBLWE-ENC. Proceedings of the Great Lakes Symposium on VLSI (GSVLSI), Tampa Bay Area, Florida, pages 210-215, June 12-14, 2024.   pdf
  65. M. Huang, W. Yuan, D. Guan, M. Lu, and Ç. K. Koç. Guided particle adaptation PSO for feature selection on high-dimensional classification. Advanced Intelligent Computing Technology and Applications, 20th International Conference, ICIC 2024, Tianjin, China, pages 14-26, Proceedings, Part I, LNCS 14862, August 5–8, 2024.   pdf
  66. J. Zhang, J. Huang, L. Zhao, D. Chen, and Ç. K. Koç. ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519. The 33rd USENIX Symposium, Philadelphia, Pensylvania, to appear, August 14-16, 2024.   pdf   → USENIX Security Distinguished Paper Award