Koray Karabina

Orcid: 0000-0001-9538-8877

According to our database1, Koray Karabina authored at least 36 papers between 2007 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


An Algorithm for Persistent Homology Computation Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Poster: Computing the Persistent Homology of Encrypted Data.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Improving Accuracy and Explainability of Online Handwriting Recognition.
CoRR, 2022

Equi-Joins over Encrypted Data for Series of Queries.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021

Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.
IACR Cryptol. ePrint Arch., 2021

A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder.
IACR Cryptol. ePrint Arch., 2020

Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography.
IACR Cryptol. ePrint Arch., 2020

Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Constructing multidimensional differential addition chains and their applications.
J. Cryptogr. Eng., 2019

Biometric data transformation for cryptographic domains and its application: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Extending a Framework for Biometric Visual Cryptography.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

A new cryptographic primitive for noise tolerant template security.
Pattern Recognit. Lett., 2016

Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

Fault Attacks on Pairing-Based Protocols Revisited.
IEEE Trans. Computers, 2015

Point Decomposition Problem in Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2015

A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms.
IEEE Trans. Computers, 2014

Squaring in cyclotomic subgroups.
Math. Comput., 2013

A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Generalizations of Verheul's theorem to asymmetric pairings.
Adv. Math. Commun., 2013

Torus-Based Compression by Factor 4 and 6.
IEEE Trans. Inf. Theory, 2012

Discrete Logarithm Cryptography.
PhD thesis, 2010

On the asymptotic effectiveness of Weil descent attacks.
J. Math. Cryptol., 2010

Factor-4 and 6 compression of cyclotomic subgroups of and.
J. Math. Cryptol., 2010

Faster Explicit Formulas for Computing Pairings over Ordinary Curves.
IACR Cryptol. ePrint Arch., 2010

Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
Adv. Math. Commun., 2010

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Trans. Computers, 2009

Double-Exponentiation in Factor-4 Groups and its Applications.
IACR Cryptol. ePrint Arch., 2009

Factor-4 and 6 Compression of Cyclotomic Subgroups.
IACR Cryptol. ePrint Arch., 2009

A New Protocol for the Nearby Friend Problem.
Proceedings of the Cryptography and Coding, 2009

On prime-order elliptic curves with embedding degrees k=3, 4 and 6.
IACR Cryptol. ePrint Arch., 2007