Çetin Kaya Koç


Ontology type: schema:Person     


Person Info

NAME

Çetin Kaya

SURNAME

Koç

Publications in SciGraph latest 50 shown

  • 2018-09 Montgomery inversion in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2018 Reinforcement Learning and Trustworthy Autonomy in CYBER-PHYSICAL SYSTEMS SECURITY
  • 2018 Mathematical Optimizations for Deep Learning in CYBER-PHYSICAL SYSTEMS SECURITY
  • 2017-10-29 Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2016 Bitsliced High-Performance AES-ECB on GPUs in THE NEW CODEBREAKERS
  • 2015 Reducing the Complexity of Normal Basis Multiplication in ARITHMETIC OF FINITE FIELDS
  • 2014 About Open Problems in OPEN PROBLEMS IN MATHEMATICS AND COMPUTATIONAL SCIENCE
  • 2014 True Random Number Generators in OPEN PROBLEMS IN MATHEMATICS AND COMPUTATIONAL SCIENCE
  • 2012-10 Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2012 A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors in CRYPTOGRAPHY AND SECURITY: FROM THEORY TO APPLICATIONS
  • 2011-04 Introduction to the Journal of Cryptographic Engineering in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2011 Minimal Privilege in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Message Authentication Algorithm in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 MD4 Hash Function in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 MAA in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 MIPS-Year in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Malware Behavior Clustering in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Minimal Polynomial in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Microdata Statistical Disclosure Control in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multicast Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multiple Encryption in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 MILS in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Miller-Rabin Test in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Monitoring in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 MPKC in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Master Key in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Microdata Masking Techniques in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multilevel Database in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Mobile Payments in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Maurer’s Method in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Measurement Models of Software Security in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Montgomery Arithmetic in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Mandatory Access Control in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Maliciously Modified Set of Administrative Tools in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Microdata Disclosure Protection in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 m-Sequence in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Merkle-Hash-Trees Signatures in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Macrodata Disclosure Protection in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multiple Independent Levels of Security in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Miss-in-the-Middle Attack in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Mobile Wallet in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Memory and State Exhaustion Denial of Service in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multibiometrics in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multivariate Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multiprecision Squaring in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Miller–Rabin Probabilistic Primality Test in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Malware in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multiparty Computation (MPC) in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Multifactor Authentication in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Macrodata Disclosure Limitation in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.133342.4", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Ko\u00e7", 
        "givenName": "\u00c7etin Kaya", 
        "id": "sg:person.011276776763.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011276776763.01"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1518.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011276776763.01'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011276776763.01'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011276776763.01'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011276776763.01'


     




    Preview window. Press ESC to close (or click here)


    ...