Berk Sunar
Orcid: 0000-0001-5404-5368
According to our database1,
Berk Sunar
authored at least 151 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Analysis of EM Fault Injection on Bit-sliced Number Theoretic Transform Software in Dilithium.
ACM Trans. Embed. Comput. Syst., March, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
CoRR, 2023
CoRR, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware.
CoRR, 2021
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
J. Math. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
Int. J. Parallel Program., 2019
CoRR, 2019
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
CoRR, 2018
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Computers, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries.
CoRR, 2017
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Trans. Computers, 2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
Microprocess. Microsystems, 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
2012
Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes.
Proceedings of the Fault Analysis in Cryptography, 2012
Proceedings of the IEEE Conference on High Performance Extreme Computing, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
ACM Trans. Reconfigurable Technol. Syst., 2010
Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields.
IET Inf. Secur., 2010
IET Comput. Digit. Tech., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
2009
IET Comput. Digit. Tech., 2009
Comput. Electr. Eng., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptographic Engineering, 2009
2008
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults.
IEEE Trans. Computers, 2008
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks.
IEEE Trans. Computers, 2007
A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain.
Mob. Networks Appl., 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
2006
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography.
Proceedings of the Computer and Information Sciences, 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform.
Proceedings of the 44st Annual Southeast Regional Conference, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations.
IEEE Trans. Computers, 2005
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Proceedings of the Networking, 2005
Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IEEE Trans. Computers, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
IEEE Trans. Computers, 2003
2001
1999
1998
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields.
IEEE Trans. Computers, 1998