Ali Can Atici

According to our database1, Ali Can Atici authored at least 5 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Methods for finding the sources of leakage in cache-timing attacks and removing the profiling phase (Önbellek-zamanlama saldırılarında sızıntı kaynaklarını bulmak ve ayrımlama fazını kaldırmak için metotlar)
PhD thesis, 2018

Cache-timing attacks without a profiling phase.
Turkish J. Electr. Eng. Comput. Sci., 2018

2016
Remote Cache-Timing Attack without Learning Phase.
IACR Cryptol. ePrint Arch., 2016

2013
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2008
Low-cost implementations of NTRU for pervasive security.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008


  Loading...