Koray Karabina

Orcid: 0000-0001-9538-8877

According to our database1, Koray Karabina authored at least 36 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Poster: Computing the Persistent Homology of Encrypted Data.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Improving Accuracy and Explainability of Online Handwriting Recognition.
CoRR, 2022

Equi-Joins over Encrypted Data for Series of Queries.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021

Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.
IACR Cryptol. ePrint Arch., 2021

2020
A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder.
IACR Cryptol. ePrint Arch., 2020

Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography.
IACR Cryptol. ePrint Arch., 2020

Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template Generation.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Constructing multidimensional differential addition chains and their applications.
J. Cryptogr. Eng., 2019

Biometric data transformation for cryptographic domains and its application: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Extending a Framework for Biometric Visual Cryptography.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

2016
A new cryptographic primitive for noise tolerant template security.
Pattern Recognit. Lett., 2016

Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

2015
Fault Attacks on Pairing-Based Protocols Revisited.
IEEE Trans. Computers, 2015

Point Decomposition Problem in Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2015

2014
A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms.
IEEE Trans. Computers, 2014

2013
Squaring in cyclotomic subgroups.
Math. Comput., 2013

A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Generalizations of Verheul's theorem to asymmetric pairings.
Adv. Math. Commun., 2013

2012
Torus-Based Compression by Factor 4 and 6.
IEEE Trans. Inf. Theory, 2012

2010
Discrete Logarithm Cryptography.
PhD thesis, 2010

On the asymptotic effectiveness of Weil descent attacks.
J. Math. Cryptol., 2010

Factor-4 and 6 compression of cyclotomic subgroups of and.
J. Math. Cryptol., 2010

Faster Explicit Formulas for Computing Pairings over Ordinary Curves.
IACR Cryptol. ePrint Arch., 2010

Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
Adv. Math. Commun., 2010

2009
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields.
IEEE Trans. Computers, 2009

Double-Exponentiation in Factor-4 Groups and its Applications.
IACR Cryptol. ePrint Arch., 2009

Factor-4 and 6 Compression of Cyclotomic Subgroups.
IACR Cryptol. ePrint Arch., 2009

A New Protocol for the Nearby Friend Problem.
Proceedings of the Cryptography and Coding, 2009

2007
On prime-order elliptic curves with embedding degrees k=3, 4 and 6.
IACR Cryptol. ePrint Arch., 2007


  Loading...