A Custom Accelerator for Homomorphic Encryption Applications
Ozturk, Erdinc, Doroz, Yarkin, Savas, Erkay, Sunar, Berk
Published in IEEE transactions on computers (01.01.2017)
Published in IEEE transactions on computers (01.01.2017)
Get full text
Journal Article
Exploring the Feasibility of Fully Homomorphic Encryption
Wang, Wei, Hu, Yin, Chen, Lianmu, Huang, Xinming, Sunar, Berk
Published in IEEE transactions on computers (01.03.2015)
Published in IEEE transactions on computers (01.03.2015)
Get full text
Journal Article
Robot Operating System 2
DiLuoffo Vincenzo, Michalson, William R, Sunar Berk
Published in International journal of advanced robotic systems (01.05.2018)
Published in International journal of advanced robotic systems (01.05.2018)
Get full text
Journal Article
Public Key Cryptography in Sensor Networks—Revisited
Gaubatz, Gunnar, Kaps, Jens-Peter, Sunar, Berk
Published in Lecture notes in computer science (2005)
Published in Lecture notes in computer science (2005)
Get full text
Book Chapter
Conference Proceeding
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Kaps, Jens-Peter, Sunar, Berk
Published in Emerging Directions in Embedded and Ubiquitous Computing (2006)
Published in Emerging Directions in Embedded and Ubiquitous Computing (2006)
Get full text
Book Chapter
Conference Proceeding
Special Issue on Hardware and Security
PAAR, Christof, QUISQUATER, Jean-Jacques, BERK SUNAR
Published in Journal of cryptology (01.04.2011)
Published in Journal of cryptology (01.04.2011)
Get full text
Journal Article
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
Irazoqui, Gorka, Eisenbarth, Thomas, Sunar, Berk
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Get full text
Conference Proceeding
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
Moghimi, Ahmad, Wichelmann, Jan, Eisenbarth, Thomas, Sunar, Berk
Published in International journal of parallel programming (01.08.2019)
Published in International journal of parallel programming (01.08.2019)
Get full text
Journal Article
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck, Jo, Moghimi, Daniel, Schwarz, Michael, Lippi, Moritz, Minkin, Marina, Genkin, Daniel, Yarom, Yuval, Sunar, Berk, Gruss, Daniel, Piessens, Frank
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01.05.2020)
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01.05.2020)
Get full text
Conference Proceeding