Trojan detection using IC fingerprinting D Agrawal, S Baktir, D Karakoyunlu, P Rohatgi, B Sunar 2007 IEEE Symposium on Security and Privacy (SP'07), 296-310, 2007 | 1095 | 2007 |
A provably secure true random number generator with built-in tolerance to active attacks B Sunar, WJ Martin, DR Stinson IEEE Transactions on computers 56 (1), 109-119, 2006 | 790 | 2006 |
Public key cryptography in sensor networks—revisited G Gaubatz, JP Kaps, B Sunar Security in Ad-hoc and Sensor Networks: First European Workshop, ESAS 2004 …, 2005 | 490 | 2005 |
S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES G Irazoqui, T Eisenbarth, B Sunar 36th IEEE Symposium on Security and Privacy (S & P), 2015 | 459 | 2015 |
Wait a minute! A fast, Cross-VM attack on AES G Irazoqui, MS Inci, T Eisenbarth, B Sunar International Symposium on Research in Attacks, Intrusions and Defenses …, 2014 | 353 | 2014 |
State of the art in ultra-low power public key cryptography for wireless sensor networks G Gaubatz, JP Kaps, E Ozturk, B Sunar Third IEEE International Conference on Pervasive Computing and …, 2005 | 343 | 2005 |
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields CK Koc, B Sunar IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY 1 (1), 294-294, 1998 | 327 | 1998 |
Fallout: Leaking data on meltdown-resistant cpus C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 313 | 2019 |
LVI: Hijacking transient execution through microarchitectural load value injection J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ... 2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020 | 311 | 2020 |
Mastrovito multiplier for all trinomials B Sunar, CK Koc IEEE Transactions on Computers 48 (5), 522-527, 1999 | 266 | 1999 |
An efficient optimal normal basis type II multiplier B Sunar, CK Koç IEEE Transactions on Computers 50 (1), 83-87, 2001 | 239 | 2001 |
Cache Attacks Enable Bulk Key Recovery on the Cloud MS Inci, G Irazoqui, B Gulmezoglu, T Eisenbarth, B Sunar Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 196 | 2016 |
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth, B Sunar IACR ePrint Archive, 2015 | 174 | 2015 |
Cross Processor Cache Attacks G Irazoki, T Eisenbarth, B Sunar AsiaCCS, 2016 | 170* | 2016 |
cuHE: A Homomorphic Encryption Accelerator Library W Dai, Sunar, Berk Cryptography and Information Security in the Balkans -- BalkanCryptSec, 2015 | 166 | 2015 |
Memory leakage-resilient encryption based on physically unclonable functions F Armknecht, R Maes, AR Sadeghi, B Sunar, P Tuyls Towards Hardware-Intrinsic Security: Foundations and Practice, 135-164, 2010 | 160 | 2010 |
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations A Moghimi, J Wichelmann, T Eisenbarth, B Sunar International Journal of Parallel Programming 47, 538-570, 2019 | 156 | 2019 |
Accelerating fully homomorphic encryption using GPU W Wang, Y Hu, L Chen, X Huang, B Sunar 2012 IEEE conference on high performance extreme computing, 1-5, 2012 | 155 | 2012 |
Towards robust low cost authentication for pervasive devices E Ozturk, G Hammouri, B Sunar Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE …, 2008 | 145 | 2008 |
Energy comparison of AES and SHA-1 for ubiquitous computing JP Kaps, B Sunar International Conference on Embedded and Ubiquitous Computing, 372-381, 2006 | 141 | 2006 |