Publications & Works

Published journal articles indexed by SCI, SSCI, and AHCI

Faster NTRU on ARM Cortex-M4 With TMVP-Based Multiplication

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022 (Peer-Reviewed Journal) identifier identifier

Plgakd: A puf-based lightweight group authentication and key distribution protocol

IEEE Internet of Things Journal, vol.8, no.7, pp.5682-5696, 2021 (Peer-Reviewed Journal) identifier identifier

Faster Residue Multiplication Modulo 521-bit Mersenne Prime and an Application to ECC

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, vol.65, no.8, pp.2477-2490, 2018 (Peer-Reviewed Journal) identifier identifier

New Efficient Algorithms for Multiplication Over Fields of Characteristic Three

JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, vol.90, no.3, pp.285-294, 2018 (Peer-Reviewed Journal) identifier identifier

On the arithmetic complexity of Strassen-like matrix multiplications

JOURNAL OF SYMBOLIC COMPUTATION, vol.80, pp.484-501, 2017 (Peer-Reviewed Journal) Creative Commons License identifier identifier

A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, no.10, pp.2016-2024, 2013 (Peer-Reviewed Journal) identifier identifier

Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products

IEEE TRANSACTIONS ON COMPUTERS, vol.62, no.7, pp.1345-1361, 2013 (Peer-Reviewed Journal) identifier identifier

On the Polynomial Multiplication in Chebyshev Form

IEEE TRANSACTIONS ON COMPUTERS, vol.61, no.4, pp.584-587, 2012 (Peer-Reviewed Journal) identifier identifier

Efficient multiplications in F(5)5n and F(7)7n

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, vol.236, no.2, pp.177-183, 2011 (Peer-Reviewed Journal) identifier identifier

Multiplication of polynomials modulo x(n)

THEORETICAL COMPUTER SCIENCE, vol.412, no.29, pp.3451-3462, 2011 (Peer-Reviewed Journal) identifier identifier

On multiplication in finite fields

JOURNAL OF COMPLEXITY, vol.26, no.2, pp.172-186, 2010 (Peer-Reviewed Journal) identifier identifier

Improved Polynomial Multiplication Formulas over F-2 Using Chinese Remainder Theorem

IEEE TRANSACTIONS ON COMPUTERS, vol.58, no.4, pp.572-576, 2009 (Peer-Reviewed Journal) identifier identifier

Articles Published in Other Journals

Cortex-M4 optimizations for {R, M} LWE schemes

IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2020, no.3, pp.336-357, 2020 (Peer-Reviewed Journal)

Karatsuba-like formulae and their associated techniques

JOURNAL OF CRYPTOGRAPHIC ENGINEERING, vol.8, no.3, pp.259-269, 2018 (Peer-Reviewed Journal) identifier identifier

Efficient Big Integer Multiplication in Cryptography

journal of information security, 2017 (Peer-Reviewed Journal)

Some new results on binary polynomial multiplication

JOURNAL OF CRYPTOGRAPHIC ENGINEERING, vol.5, no.4, pp.289-303, 2015 (Peer-Reviewed Journal) Creative Commons License identifier identifier

Refereed Congress / Symposium Publications in Proceedings

An Improved Range Proof with Base-3 Construction

14th International Conference on Security of Information and Networks, SIN 2021, Virtual, Online, United Kingdom, 15 - 17 December 2021 identifier identifier

TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography

13th International Conference on Information Security and Cryptology, ISCTURKEY 2020, Virtual, Ankara, Turkey, 3 - 04 December 2020, pp.80-87 identifier identifier

Efficient GeMSS Based Ring Signature Scheme

The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Algeria, 18 - 19 June 2019

Compact and Simple RLWE Based Key Encapsulation Mechanism

6th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), Santiago de Cuba, Cuba, 2 - 04 October 2019, vol.11774, pp.237-256 identifier identifier

Data sharing under confidentiality

Ninth IFC Conference , Basel, Switzerland, 30 - 31 August 2018, pp.1057-1072

GUI Based Ring Signature Scheme

18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakia, 6 - 08 June 2018, pp.1-3

Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication

5th Workshop on Cryptography and Security in Computing Systems (CS2), Manchester, United Kingdom, 24 January 2018, pp.1-6 identifier identifier

A New Algorithm for Residue Multiplication Modulo 2(521)-1

19th International Conference on Information Security and Cryptology (ICISC), Seoul, South Korea, 30 November - 02 December 2016, vol.10157, pp.181-193 identifier identifier

Improved three-way split formulas for binary polynomial multiplication

18th International Conference on Selected Areas in Cryptography, SAC 2011, Toronto, Canada, 11 - 12 August 2011, pp.384-398 Creative Commons License identifier

Faster Montgomery modular multiplication without pre-computational phase for some classes of finite fields

25th International Symposium on Computer and Information Sciences, ISCIS 2010, London, United Kingdom, 22 - 24 September 2010, pp.405-408 identifier

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation

19th IEEE Symposium on Computer Arithmetic (ARITH 2009), Oregon, United States Of America, 8 - 10 June 2009, pp.84-85 identifier identifier

Efficient multiplication in F-3lm, m >= 1 and 5 <= l <= 18

1st International Conference on Cryptology in Africa, Casablanca, Morocco, 11 - 14 June 2008, vol.5023, pp.406-409 identifier

Efficient multiplication in double-struck F sign3ℓm, m ≥ 1 and 5 ≤ ℓ ≤ 18

1st International Conference on Cryptology in Africa, AFRICACRYPT 2008, Casablanca, Morocco, 11 - 14 June 2008, pp.406-414 identifier identifier

Ayrık Logaritma Problemini Kullanan E İmza

Ulusal Elektronik İmza Sempozyumu, Turkey, 7 - 08 December 2006, pp.381-386