Koray Karabina
Orcid: 0000-0001-9538-8877
According to our database1,
Koray Karabina
authored at least 38 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
2
1
1
2
3
1
1
2
1
3
1
4
3
1
1
1
1
1
3
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Document Anal. Recognit., December, 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
2021
ACM Trans. Priv. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography.
IACR Cryptol. ePrint Arch., 2020
Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
J. Cryptogr. Eng., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
2018
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018
Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
2016
Pattern Recognit. Lett., 2016
Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016
Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms.
IEEE Trans. Computers, 2014
2013
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013
Adv. Math. Commun., 2013
2012
2010
IACR Cryptol. ePrint Arch., 2010
Adv. Math. Commun., 2010
2009
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Trans. Computers, 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Cryptography and Coding, 2009
2007
IACR Cryptol. ePrint Arch., 2007