Publications & Works

Published journal articles indexed by SCI, SSCI, and AHCI

Faster NTRU on ARM Cortex-M4 With TMVP-Based Multiplication

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, vol.69, no.10, pp.4083-4092, 2022 (SCI-Expanded) identifier identifier

Plgakd: A puf-based lightweight group authentication and key distribution protocol

IEEE Internet of Things Journal, vol.8, no.7, pp.5682-5696, 2021 (SCI-Expanded) identifier identifier

Faster Residue Multiplication Modulo 521-bit Mersenne Prime and an Application to ECC

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, vol.65, no.8, pp.2477-2490, 2018 (SCI-Expanded) identifier identifier

New Efficient Algorithms for Multiplication Over Fields of Characteristic Three

JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, vol.90, no.3, pp.285-294, 2018 (SCI-Expanded) identifier identifier

On the arithmetic complexity of Strassen-like matrix multiplications

JOURNAL OF SYMBOLIC COMPUTATION, vol.80, pp.484-501, 2017 (SCI-Expanded) Creative Commons License identifier identifier

A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials


On the Polynomial Multiplication in Chebyshev Form

IEEE TRANSACTIONS ON COMPUTERS, vol.61, no.4, pp.584-587, 2012 (SCI-Expanded) identifier identifier

Efficient multiplications in F(5)5n and F(7)7n

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, vol.236, no.2, pp.177-183, 2011 (SCI-Expanded) identifier identifier

Multiplication of polynomials modulo x(n)

THEORETICAL COMPUTER SCIENCE, vol.412, no.29, pp.3451-3462, 2011 (SCI-Expanded) identifier identifier

On multiplication in finite fields

JOURNAL OF COMPLEXITY, vol.26, no.2, pp.172-186, 2010 (SCI-Expanded) identifier identifier

Improved Polynomial Multiplication Formulas over F-2 Using Chinese Remainder Theorem

IEEE TRANSACTIONS ON COMPUTERS, vol.58, no.4, pp.572-576, 2009 (SCI-Expanded) identifier identifier

Articles Published in Other Journals

Cortex-M4 optimizations for {R, M} LWE schemes

IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2020, no.3, pp.336-357, 2020 (Peer-Reviewed Journal)

Karatsuba-like formulae and their associated techniques

JOURNAL OF CRYPTOGRAPHIC ENGINEERING, vol.8, no.3, pp.259-269, 2018 (ESCI) identifier identifier

Efficient Big Integer Multiplication in Cryptography

journal of information security, 2017 (Peer-Reviewed Journal)

Some new results on binary polynomial multiplication

JOURNAL OF CRYPTOGRAPHIC ENGINEERING, vol.5, no.4, pp.289-303, 2015 (ESCI) Creative Commons License identifier identifier

Refereed Congress / Symposium Publications in Proceedings

Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime

14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, Virtual, Online, 25 - 26 November 2021, vol.13195 LNCS, pp.125-144 identifier

An Improved Range Proof with Base-3 Construction

14th International Conference on Security of Information and Networks, SIN 2021, Virtual, Online, United Kingdom, 15 - 17 December 2021 identifier identifier

TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography

13th International Conference on Information Security and Cryptology, ISCTURKEY 2020, Virtual, Ankara, Turkey, 3 - 04 December 2020, pp.80-87 identifier identifier

Efficient GeMSS Based Ring Signature Scheme

The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Algeria, 18 - 19 June 2019

Compact and Simple RLWE Based Key Encapsulation Mechanism

6th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), Santiago de Cuba, Cuba, 2 - 04 October 2019, vol.11774, pp.237-256 identifier identifier

Data sharing under confidentiality

Ninth IFC Conference , Basel, Switzerland, 30 - 31 August 2018, pp.1057-1072

GUI Based Ring Signature Scheme

18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakia, 6 - 08 June 2018, pp.1-3

Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication

5th Workshop on Cryptography and Security in Computing Systems (CS2), Manchester, United Kingdom, 24 January 2018, pp.1-6 identifier identifier

A New Algorithm for Residue Multiplication Modulo 2(521)-1

19th International Conference on Information Security and Cryptology (ICISC), Seoul, South Korea, 30 November - 02 December 2016, vol.10157, pp.181-193 identifier identifier

Improved three-way split formulas for binary polynomial multiplication

18th International Conference on Selected Areas in Cryptography, SAC 2011, Toronto, Canada, 11 - 12 August 2011, pp.384-398 Creative Commons License identifier

Faster Montgomery modular multiplication without pre-computational phase for some classes of finite fields

25th International Symposium on Computer and Information Sciences, ISCIS 2010, London, United Kingdom, 22 - 24 September 2010, pp.405-408 identifier

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation

19th IEEE Symposium on Computer Arithmetic (ARITH 2009), Oregon, United States Of America, 8 - 10 June 2009, pp.84-85 identifier identifier

Efficient multiplication in double-struck F sign3ℓm, m ≥ 1 and 5 ≤ ℓ ≤ 18

1st International Conference on Cryptology in Africa, AFRICACRYPT 2008, Casablanca, Morocco, 11 - 14 June 2008, pp.406-414 identifier identifier

Efficient multiplication in F-3lm, m >= 1 and 5 <= l <= 18

1st International Conference on Cryptology in Africa, Casablanca, Morocco, 11 - 14 June 2008, vol.5023, pp.406-409 identifier

Ayrık Logaritma Problemini Kullanan E İmza

Ulusal Elektronik İmza Sempozyumu, Turkey, 7 - 08 December 2006, pp.381-386