Search results for: Erkay Savaş
Concurrency and Computation: Practice and Experience > 30 > 21 > n/a - n/a
Microprocessors and Microsystems > 2018 > 62 > C > 79-90
International Journal of Information Security > 2019 > 18 > 4 > 393-422
Journal of Cryptographic Engineering > 2018 > 8 > 3 > 201-210
IEEE Transactions on Computers > 2017 > 66 > 1 > 3 - 16
Ad Hoc Networks > 2017 > 54 > C > 53-68
Applied Soft Computing > 2016 > 49 > C > 1162-1174
Lecture Notes in Computer Science > Scientific and Statistical Database Management > Privacy > 79-94
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Arithmetic Architectures > 277-292
IEEE Transactions on Emerging Topics in Computing > 2016 > 4 > 3 > 318 - 320
IEEE Transactions on Parallel and Distributed Systems > 2016 > 27 > 6 > 1727 - 1741
Lecture Notes in Computer Science > Decision and Game Theory for Security > Security and Trust in Social Networks > 182-200
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Finite Field and Modular Arithmetic II > 484-499
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Elliptic Curve Algorithms > 142-158
Lecture Notes in Computer Science > Computer and Information Sciences - ISCIS 2005 > E-Commerce and Web Services > 342-351
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Implementation Aspects > 133-147
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Low Resources > 75-90
Lecture Notes in Computer Science