Koray Karabina
Koray Karabina
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Faster explicit formulas for computing pairings over ordinary curves
DF Aranha, K Karabina, P Longa, CH Gebotys, J López
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
Squaring in cyclotomic subgroups
K Karabina
Mathematics of Computation 82 (281), 555-579, 2013
Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields
D Hankerson, K Karabina, A Menezes
IEEE Transactions on Computers 58 (10), 1411-1420, 2009
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
National Institute of Standards and Technology, Technical report, 2020
A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing
L Ghammam, K Karabina, P Lacharme, K Thiry-Atighehchi
IEEE Transactions on Information Forensics and Security 15, 2869-2880, 2020
On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6
K Karabina, E Teske
Algorithmic Number Theory: 8th International Symposium, ANTS-VIII Banff …, 2008
A new double point multiplication algorithm and its application to binary elliptic curves with endomorphisms
R Azarderakhsh, K Karabina
IEEE Transactions on Computers 63 (10), 2614-2619, 2013
SIKE: Supersingular isogeny key encapsulation (2017)
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
URL: https://sike. org, 0
A new protocol for the nearby friend problem
S Chatterjee, K Karabina, A Menezes
Cryptography and Coding: 12th IMA International Conference, Cryptography and …, 2009
Fault attacks on pairing-based protocols revisited
S Chatterjee, K Karabina, A Menezes
IEEE Transactions on Computers 64 (6), 1707-1714, 2014
Invalid-curve attacks on (hyper) elliptic curve cryptosystems.
K Karabina, B Ustaoglu
Adv. Math. Commun. 4 (3), 307-321, 2010
Constructing canonical strategies for parallel implementation of isogeny based cryptography
A Hutchinson, K Karabina
International Conference on Cryptology in India, 169-189, 2018
Point decomposition problem in binary elliptic curves
K Karabina
Information Security and Cryptology - ICISC 2015 9558, 155-168, 2016
Factor-4 and 6 compression of cyclotomic subgroups of and
K Karabina
Journal of Mathematical Cryptology 4 (1), 1-42, 2010
Secure and noise-tolerant digital authentication or identification
K Karabina, O Canpolat
US Patent App. 15/522,874, 2018
A new cryptographic primitive for noise tolerant template security
K Karabina, O Canpolat
Pattern Recognition Letters 80, 70-75, 2016
Constructing multidimensional differential addition chains and their applications
A Hutchinson, K Karabina
Journal of Cryptographic Engineering 9, 1-19, 2019
Equi-joins over encrypted data for series of queries
M Shafieinejad, S Gupta, JY Liu, K Karabina, F Kerschbaum
2022 IEEE 38th International Conference on Data Engineering (ICDE), 1635-1648, 2022
A lightweight privacy-aware continuous authentication protocol-paca
A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu, K Akkaya, S Uluagac
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-28, 2021
Memory optimization techniques for computing discrete logarithms in compressed SIKE
A Hutchinson, K Karabina, G Pereira
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20