Conference Papers
 P. Cappello, G. Davidson, A. Gersho, Ç. K. Koç,
and V. Somayazulu. A systolic vector quantization processor for realtime
speech coding. Proceedings of the IEEE International
Conference on Acoustic, Speech, and Signal Processing,
Vol. 3, pages 21432146, Tokyo, Japan, IEEE Press, New York,
New York, April 811, 1986.
pdf
 Ö. Eğecioğlu, Ç. K. Koç, and
A. J. Laub. Prefix algorithms for tridiagonal systems on hypercube
multiprocessors. Proceedings of the Third Conference
on Hypercube Concurrent Computers and Applications, Vol. 2,
pages 15391545, Pasadena, California, ACM Press, New York,
New York, January 1920, 1988.
pdf
 Ö. Eğecioğlu and Ç. K. Koç.
Orthogonal polynomials and leastsquares approximation
on the hypercube multiprocessor. Proceedings of the
Fourth Conference on Hypercube Concurrent Computers and
Applications, Vol. 1, pages 411414, Monterey, California,
Golden Gate Enterprises, Los Altos, California, March 68, 1989.
pdf
 Ç. K. Koç and P. Cappello.
Systolic arrays for integer Chinese remaindering.
Proceedings, 9th Symposium on Computer Arithmetic,
M. D. Ercegovac and E. Swartzlander, editors,
pages 216223, Santa Monica, California,
IEEE Computer Society Press, Los Alamitos, California,
September 68, 1989.
pdf
 Ç. K. Koç.
A fast algorithm for mixedradix conversion in
residue arithmetic. Proceedings, 1989 IEEE
International Conference on Computer Design: VLSI in
Computers and Processors, pages 1821, Cambridge,
Massachusetts, IEEE Computer Society Press, Los Alamitos, California,
October 24, 1989.
pdf
 Ö. Eğecioğlu and Ç. K. Koç.
Fast modular exponentiation.
Communication, Control, and Signal Processing: Proceedings
of 1990 Bilkent International Conference on New Trends in
Communication, Control, and Signal Processing,
E. Arikan, editor, Vol. 1, pages 188194, Ankara, Turkey,
Elsevier, Amsterdam, Netherlands, July 25, 1990.
pdf
 Ç. K. Koç and R. M. Piedra.
A parallel algorithm for exact solution of linear
equations. Proceedings of International Conference
on Parallel Processing, Vol. III, pages 18, St. Charles,
Illinois, CRC Press, Boca Raton, Florida, August 1216, 1991.
pdf
 Ç. K. Koç, A. Guvenc, and B. Bakkaloglu.
Exact solution of linear equations on distributedmemory multiprocessors.
Proceedings of the 14th IMACS World Congress on Computational
and Applied Mathematics, Vol. 3, pages 13391341, Atlanta,
Georgia, July 1115, 1994.
pdf
 G. Chen and Ç. K. Koç.
A fast algorithm for matrixvalued NevanlinnaPick interpolation.
Conference on Approximation Theory VIII, Vol 1:
Approximation and Interpolation,
C. K. Chui and L. L. Schumaker, editors, pages 129136,
World Scientific Publishing, 1995.
pdf
 Ç. K. Koç and B. Bakkaloglu.
Halley's method for the matrix sector function.
Proceedings of the 12th European Conference on Circuit
Theory and Design, Vol. 2, pages 901904,
Istanbul, Turkey, August 2731, 1995.
pdf
 B. Bakkaloglu and Ç. K. Koç.
Parallel matrix sign iterations.
Proceedings of the 33rd Annual Allerton Conference on
Communication, Control, and Computing, pages 440446,
Urbana, Illinois, October 46, 1995.
pdf
 Ç. K. Koç and T. Acar.
Montgomery multiplication in GF(2^k).
Proceedings of Third Annual Workshop on Selected Areas
in Cryptography, pages 95106, Queen's University, Kingston,
Ontario, Canada, August 1516, 1996.
pdf
 C. K. Sandalcı, Ç. K. Koç, and S. M. Goodnick.
Three dimensional Monte Carlo device
simulation with parallel multigrid solver.
Proceedings of the Eight SIAM Conference on Parallel Processing
for Scientific Computing, 8 pages, CDROM Format,
Minneapolis, Minnesota, March 1417, 1997.
pdf
 Ç. K. Koç and T. Acar.
Fast software exponentiation in GF(2^k).
Proceedings, 13th Symposium on Computer Arithmetic,
T. Lang, J.M. Muller, and N. Takagi, editors,
pages 225231, Asilomar, California,
IEEE Computer Society Press, Los Alamitos, California, July 69, 1997.
pdf
 Ç. K. Koç and B. Sunar.
Lowcomplexity bitparallel canonical and normal basis multipliers
for a class of finite fields.
Proceedings of 1998 IEEE International Symposium on
Information Theory, pages 294294, MIT, Cambridge, Massachusetts,
August 1621, 1998.
pdf
 M. Aydos, E. Savaş, and Ç. K. Koç.
Implementing network security protocols based on elliptic
curve cryptography.
Proceedings of the Fourth Symposium on Computer
Networks, S. Oktug, B. Orencik, and E. Harmanci,
editors, pages 130139, Istanbul, Turkey, May 2021, 1999.
pdf
 A. F. Tenca and Ç. K. Koç.
A scalable architecture for Montgomery multiplication.
Cryptographic Hardware and Embedded Systems,
Ç. K. Koç and C. Paar, editors,
First International Workshop, Worcester, MA, USA,
pages 94108, Springer, LNCS Nr. 1717, August 1213, 1999.
pdf
 A. Halbutoğulları and Ç. K. Koç.
Mastrovito multiplier for general irreducible polynomials.
Applied Algebra, Algebraic Algorithms and ErrorCorrecting
Codes, M. Fossorier, H. Imai, S. Lin, and A. Poli, editors,
13th International Symposium, Honolulu, Hawaii, USA, pages 498507,
Springer, LNCS Nr. 1719, November 1519, 1999.
pdf
 E. Savaş, A. F. Tenca, and Ç. K. Koç.
A scalable and unified multiplier architecture for finite fields
GF(p) and GF(2^m).
Cryptographic Hardware and Embedded Systems  CHES 2000,
Ç. K. Koç and C. Paar, editors,
Second International Workshop, Worcester, MA, USA,
pages 277292, Springer, LNCS Nr. 1965, August 1718, 2000.
pdf
 M. Aydos, T. Yanık, and Ç. K. Koç.
An highspeed ECCbased wireless authentication
protocol on an ARM microprocessor.
Proceedings, The 16th Annual Computer Security Applications
Conference, pages 401409, New Orleans, Louisiana,
IEEE Computer Society Press, Los Alamitos, California,
December 1115, 2000.
pdf
 E. Savaş, T. A. Schmidt, and Ç. K. Koç.
Generating elliptic curves of known order.
Cryptographic Hardware and Embedded Systems  CHES 2001,
Ç. K. Koç, D. Naccache, and C. Paar, editors,
Third International Workshop, Paris, France, pages 142158,
Springer, LNCS Nr. 2162, May 1416, 2001.
pdf
 A. F. Tenca, G. Todorov, and Ç. K. Koç.
Highradix design of a scalable modular multiplier.
Cryptographic Hardware and Embedded Systems  CHES 2001,
Ç. K. Koç, D. Naccache, and C. Paar, editors,
Third International Workshop, Paris, France, pages 185201,
Springer, LNCS Nr. 2162, May 1416, 2001.
pdf
 A. Levi and Ç. K. Koç.
Reducing certificate revocation cost using NPKI.
Trusted Information, The New Decade Challenge,
IFIP TC11 16th International Conference on Information Security,
pages 5159, M. Dupuy and P. Paradinas, editors,
Kluwer Academic Publishers, Boston, MA,
June 1113, 2001.
pdf
 A. Levi and Ç. K. Koç.
CONSEPP: Convenient and secure electronic payment
protocol based on X9.59.
Proceedings, The 17th Annual Computer Security Applications
Conference, pages 286295, New Orleans, Louisiana,
IEEE Computer Society Press, Los Alamitos, California,
December 1014, 2001.
pdf
 A. A. Gutub, A. F. Tenca, and Ç. K. Koç.
Scalable VLSI architecture for GF(p) Montgomery modular
inverse computation.
IEEE Computer Society Annual Symposium on VLSI,
pages 5358, Pittsburgh, Pennsylvania,
IEEE Computer Society Press, Los Alamitos, California,
April 2526, 2002.
pdf
 A. A.A. Gutub, A. F. Tenca, E. Savaş, and
Ç. K. Koç. Scalable and unified hardware to compute
Montgomery inverse in GF(p) and GF(2^n).
Cryptographic Hardware and Embedded Systems  CHES 2002,
B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors,
4th International Workshop, Redwood Shores, CA, USA, pages 484499,
Springer, LNCS Nr. 2523, August 1315, 2002.
pdf
 E. Savaş and Ç. K. Koç.
Architectures for unified field inversion with applications
in elliptic curve cryptography.
The 9th IEEE International Conference on Electronics,
Circuits and Systems  ICECS 2002,
volume 3, pages 11551158, Dubrovnik, Croatia, September 1518, 2002.
pdf
 C. van Dyke and Ç. K. Koç.
On ubiquitous network security and anomaly detection.
2003 Symposium on Applications and Internet 
Workshop on Security and Assurance in Ad hoc Networks,
pages 374378, Orlando, Florida, January 2731, 2003.
pdf
 F. RodríguezHenríquez and Ç. K. Koç.
On fully parallel Karatsuba multipliers for GF(2^m).
Proceedings of the International Conference on Computer
Science and Technology  CST 2003, pages 405410,
Acta Press, Cancun, Mexico, May 1921, 2003.
pdf
 S. S. Erdem and Ç. K. Koç.
A less recursive variant of KaratsubaOfman algorithm
for multiplying operands of size a power of two.
Proceedings, 16th IEEE Symposium on Computer Arithmetic,
J.C. Bajard and M. Schulte, editors, pages 2835, IEEE Computer
Society Press, Santiago de Compostela, Spain, June 1518, 2003.
pdf
 E. Savaş, A. F. Tenca, and Ç. K. Koç.
Dualfield multiplier architecture for cryptographic applications.
ThirtySeventh Asilomar Conference on Signals, Systems, and
Computers, pages 374378, IEEE Press,
Pacific Grove, California, November 912, 2003.
pdf
 A. Levi, E. Cetintas, M. Aydos, Ç. K. Koç, and
M. U.Çağlayan. Relay attacks on Bluetooth
authentication and solutions.
Computer and Information Sciences  ISCIS 2004,
C. Aykanat et al, editors, 19th International Symposium,
KemerAntalya, Turkey, pages 278288, Springer, LNCS Nr. 3280,
October 2729, 2004.
pdf
 L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç.
A dualfield modular division algorithm and architecture for
application specific hardware.
ThirtyEighth Asilomar Conference on Signals, Systems, and
Computers, pages 483487, IEEE Press, Pacific Grove, California,
November 710, 2004.
pdf
 M. Cihan and Ç. K. Koç.
Setting initial secret keys in a mobile adhoc network.
1st International Symposium on Information Technologies  ISIT 2005,
Symposium Proceedings, pages 7183, Girne, North Cyprus,
April 1921, 2005.
pdf
 L. A. Tawalbeh, A. F. Tenca, S. Park, and Ç. K. Koç.
An efficient hardware architecture of a scalable elliptic curve
cryptoprocessor over GF(2^m). Advanced Signal Processing
Algorithms, Architectures, and Implementations XV, Proceedings of
SPIE Conference,, F. T. Luk, editor, pages 216226, Volume 5910,
San Diego, California, August 24, 2005.
pdf
 O. Acıiçmez, W. Schindler, and Ç. K. Koç.
Improving Brumley and Boneh timing attack on unprotected SSL
implementations. Proceedings of 12th ACM Conference on
Computer and Communications Security, C. Meadows and P. Syverson,
editors, pages 139146, Alexandria, Virginia, November 711, 2005.
pdf
 O. Acıiçmez and Ç. K. Koç.
Tracedriven cache attacks on AES.
8th International Conference on Information and Communications
Security, ICISCS 2006, P. Ning, S. Qing, and N. Li, editors,
pages 112121, Springer, LNCS Nr. 4307, Raleigh, North Carolina,
December 47, 2006.
pdf
 O. Acıiçmez, W. Schindler, and Ç. K. Koç.
Cache based remote timing attack on the AES.
Topics in Cryptology, The Cryptographers' Track at the RSA
Conference, CTRSA 2007, M. Abe, editor, pages 271286, Springer,
LNCS Nr. 4377, San Francisco, California, February 59, 2007.
pdf
 O. Acıiçmez, J. P. Seifert, and
Ç. K. Koç. Predicting secret keys via branch prediction.
Topics in Cryptology, The Cryptographers' Track at the RSA
Conference, CTRSA 2007, M. Abe, editor, pages 225242, Springer,
LNCS Nr. 4377, San Francisco, California, February 59, 2007.
pdf
 O. Acıiçmez, Ç. K. Koç, and
J. P. Seifert. On the power of simple branch prediction analysis.
ACM Symposium on Information, Computer and Communications
Security, ASIACCS 2007, R. Deng and P. Samarati, editors,
pages 312320, Singapore, March 2022, 2007.
pdf
 G. Saldamlı and Ç. K. Koç.
Spectral modular exponentiation.
Proceedings, 18th IEEE Symposium on Computer Arithmetic,
P. Kornerup and J.M. Muller, editors, pages 123130, IEEE Computer
Society Press, Montpellier, France, June 2527, 2007.
pdf
 I. Yavuz, S. B. O. Yalcin, and Ç. K. Koç.
FPGA implementation of an elliptic curve cryptosystem over GF(3^m).
2008 International Conference on ReConFigurable Computing and
FPGAs, pages 397402, IEEE Computer Society Press, Cancun, Mexico,
December 35, 2008. pdf
 G. Saldamlı, C. Demirkiran, M. Maguire, C. Minden,
J. Topper, A. Troesch, C. Walker, and Ç. K. Koç.
Spectral hash. The First SHA3 Candidate Conference,
Katholieke Universiteit, Leuven, Belgium,
February 2528, 2009. pdf
 M. Cenk, Ç. K. Koç, and F. Özbudak.
Polynomial multiplication over finite fields using field
extensions and interpolation.
Proceedings, 19th IEEE Symposium on Computer Arithmetic,
pages 8491, IEEE Computer Society Press, Portland, Oregon,
June 810, 2009. pdf
 R. C. C. Cheung, Ç. K. Koç, and J. D. Villasenor.
An efficient hardware architecture for Spectral Hash algorithm.
Proceedings, 20th IEEE International Conference on
Applicationspecific Systems, Architectures and Processors,
pages 215218, IEEE Press, Boston, MA, July 79, 2009.
pdf
 L.W. Kim, J. D. Villasenor, and Ç. K. Koç.
A Trojanresistant systemonchip bus architecture.
Proceedings of Military Communications Conference (MILCOM),
pages 16, Boston, MA, October 1821, 2009.
pdf
 G. X. Yao, R. C. C. Cheung, Ç. K. Koç, and K. F. Man.
Reconfigurable number theoretic transform architectures for
cryptographic applications.
The 2010 International Conference on FieldProgrammable
Technology (FPT), pages 308311, Beijing, China,
December 810, 2010.
pdf
 G. Saldamlı, Y.J. Baek, and Ç. K. Koç.
Spectral modular arithmetic for binary extension fields.
The 2011 International Conference on Information
and Computer Networks (ICICN), pages 323328,
Guiyang, China, January 2628, 2011.
pdf
 J. Valamehr, T. Huffmire, C. Irvine, R. Kastner,
Ç. K. Koç, T. Levin, and T. Sherwood.
A qualitative security analysis of a new class of
3D integrated crypto coprocessors.
Festschrift JeanJacques Quisquater,
pages 364382, D. Naccache, editor, LNCS Nr. 6805, Springer, 2012.
pdf
 D. D. Chen, G. X. Yao, Ç. K. Koç, and R. C. C. Cheung.
Low complexity and hardwarefriendly spectral modular multiplication.
The 2012 International Conference on FieldProgrammable
Technology (FPT), pages 368375, Seoul, Korea, December 1012, 2012.
pdf
 Ö. Eğecioğlu and Ç. K. Koç.
Reducing the complexity of normal basis multiplication.
Arithmetic of Finite Fields.
5th International Workshop, WAIFI 2014. Gebze, Turkey.
Springer, LNCS Nr. 9061, pages 6180, September 2628, 2014.
pdf
 N. Fern, İ. San, Ç. K. Koç, and K.T. Cheng.
Hardware Trojans in incompletely specified onchip bus systems.
Design, Automation and Test in Europe (DATE), pages 527530,
Dresden, Germany, March 1418, 2016.
pdf
 S. Green, İ. Çiçek, and Ç. K. Koç.
Continuoustime computational aspects of cyberphysical security.
Workshop on Fault Diagnosis and Tolerance in Cryptography,
pages 5962, Santa Barbara, CA, August 16, 2016.
pdf
 İ. San, N. Fern, Ç. K. Koç, and K.T. Cheng.
Trojans modifying softprocessor instruction sequences embedded in
FPGA bitstreams. 26th International Conference on
FieldProgrammable Logic and Applications (FPL), pages 334337,
Lausanne, Switzerland, August 29  September 2, 2016.
pdf
