Faculty of Engineering

Academic Members

Çetin Kaya  Koç

Çetin Kaya Koç,  Prof.

CV
Faculty Member

Çetin Kaya Koç received his Ph.D. in Electrical & Computer Engineering from the University of California Santa Barbara in 1988. His research interests are in cryptographic engineering, finite field arithmetic, random number generators, cyber-physical security, and neuromorphic engineering. Koç was an Assistant Professor at the University of Houston (1988-1992), Assistant, Associate and Full Professor at Oregon State University (1992-2007). He established Information Security Laboratory at Oregon State University, and received Award for Outstanding and Sustained Research Leadership in September 2001. Currently, Koç has appointments at İstinye University (İstanbul, Turkey) and University of California Santa Barbara. His research is funded by several private and national research organizations, performed within Koç Lab composed of postdoctoral researchers, PhD and MS candidates, and undergraduate students. Koç is the co-founder of the Conference on Cryptographic Hardware and Embedded Systems which is the second largest cryptography conference in the world. Koç is also co-founder of International Workshop on the Arithmetic of Finite Fields (WAIFI) and Security Proofs for Embedded Systems (PROOFS), that cover efficient software and hardware realizations of finite fields and methodologies that increase the confidence level in the security of embedded systems, respectively. Koç also organized and chaired Open Problems in Mathematical and Computational Sciences Conference, held in September 18-20, 2013 in Istanbul, Turkey and Cyber-Physical Security Education Workshop, held in July 17-19, 2017 in Paris, France. Koç was in the editorial boards of IEEE Transactions on Computers (2003-2008 and 2015-2019) and IEEE Transactions on Mobile Computing (2003-2007). He was a guest co-editor of April 2003, November 2008, and November 2018 issues of the IEEE Transactions on Computers on cryptographic hardware and embedded systems, special-purpose hardware for cryptography and cryptanalysis, and cryptographic engineering in a post-quantum world. Furthermore, Koç is in the editorial boards of International Journal of Foundations of Computer Science since March 2016, and Transactions of Nanjing University of Aeronautics and Astronautics since June 2019. Koç has designed, developed or made contributions to more than 50 cryptographic software and hardware systems. Among them are PGP (Pretty Good Privacy), RSAREF and BSAFE (RSA Security), CDSA (Intel), TOR (The Onion Routing) and tens of embedded software and hardware IP cores. According to an estimation made in 2003, there were more than 4.5 billion copies of BSAFE running on devices and computers. The IP cores containing algorithms and architectures designed by Koç are found in products made by several companies including Texas Instruments, Intel, Samsung and Huawei. These algorithms and architectures are subjects of 13 US patents Koç co-authored. Koç is also the co-author of 4 books: Cryptographic Algorithms on Reconfigurable Hardware (2007), Cryptographic Engineering (2009), Open Problems in Mathematics and Computational Science (2014), Cyber-Physical Systems Security (2018), all published by Springer. Among them, Cryptographic Engineering is currently being translated to Chinese. Additionally, a new book Partially Homomorphic Cryptography will be published by Springer in 2020. In addition to contributing to 7 conference proceedings as co-editor, Koç has authored 85 journal articles, 58 conference articles, 11 book chapters, and 13 technical reports. Koç supervised 21 PhD students and 40 MS students, and directed research theses of 6 undergraduate students. He is among the top 3 scientists that supervised most doctoral theses in cryptography. His Google Scholar h-index is 44. Koç is among the top 100 Turkish scientists with most citations. He received TÜBİTAK International Research Leadership Award and Yıldız Technical University Stars of the Year Award in 2019.

Main Areas: Bilgisayar Bilimleri ve Mühendisliği, 

2020 - Algorithms for Inversion Mod pk
KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 69(6), 907-913.
2019 - Inversion of all principal submatrices of a matrix
KOÇ ÇETİN KAYA,Chen Guanrong. IEEE Transactions on Aerospace and Electronic Systems, 30(1), 280-281.
2019 - Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs
Peccerillo Biagio,Bartolini Sandro,KOÇ ÇETİN KAYA. Journal of Cryptographic Engineering, 9(2), 159-171.
2019 - An efficient optimal normal basis type II multiplier
Sunar Berk,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 50(1), 83-87.
2019 - The Montgomery modular inverse-revisited
SAVAŞ ERKAY,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 49(7), 763-766.
2019 - Parallel Multiplication in GF (2k) using Polynomial Residue Arithmetic
Alper Halbutoğullari,KOÇ ÇETİN KAYA. Designs, Codes and Cryptography, 20(2), 155-173.
2019 - Mastrovito multiplier for general irreducible polynomials
Halbutoğulları Alper,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 49(5), 503-518.
2019 - Montgomery Multiplication in GF(2k)
KOÇ ÇETİN KAYA,Acar Tolga. Designs, Codes and Cryptography, 14(1), 57-69.
2019 - Low-complexity bit-parallel canonical and normal basis multipliers for a class of finite fields
KOÇ ÇETİN KAYA,Sunar Berk. IEEE Transactions on Computers, 47(3), 353-356.
2019 - Analyzing and comparing Montgomery multiplication algorithms
KOÇ ÇETİN KAYA,Acar Tolga,Kaliski BS. IEEE Micro, 16(3), 26-33.
2019 - Halley’xxs method for the matrix sector function
KOÇ ÇETİN KAYA,Bakkaloğlu Bertan. IEEE Transactions on Automatic Control, 40(5), 944-949.
2019 - Complexity analysis of wavelet signal decomposition and reconstruction
KOÇ ÇETİN KAYA,Chen Guanrong,Chui Charles Kam Tai. IEEE Transactions on Aerospace and Electronic Systems, 30(3), 910-918.
2019 - Computation of the matrix sign function using continued fraction expansion
KOÇ ÇETİN KAYA,Bakkaloğlu Bertan,Shieh Leangs San. IEEE Transactions on Automatic Control, 39(8), 1644-1647.
2019 - Distillation Strategies for Proximal Policy Optimization
Green Sam,Vineyard Craig M,KOÇ ÇETİN KAYA. arXiv,
2019 - RAPDARTS: Resource-Aware Progressive Differentiable Architecture Search
Green Sam,Vineyard Craig M,Helinski Ryan,KOÇ ÇETİN KAYA. arXiv,
2018 - FFT-based McLaughlin’xxs Montgomery Exponentiation without Conditional Selections
DAI Wangchen,CHEN Donald Donglong,Cheung Ray,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 1-1.
2018 - Visual diagnostics for deep reinforcement learning policy development
Luo Jieliang,Green Sam,Feghali Peter,Legrady George Legrady,KOÇ ÇETİN KAYA. arXiv,
2018 - Montgomery inversion
SAVAŞ ERKAY,KOÇ ÇETİN KAYA. Journal of Cryptographic Engineering, 8(3), 201-210.
2017 - Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality
Nicole Fern,SAN İSMAİL,KOÇ ÇETİN KAYA,Kwang Ting Tim Cheng. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36(9), 1435-1444.
2017 - Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication
Dai Wangchen,Chen Donald Donglong,Cheung Ray CC,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 66(3), 375-388.
2016 - A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Kızılkale Can,Egecioglu Ömer N,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 65(11), 3239-3250.
2016 - Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication
Chen Donald Donglong,Yao Gavin Xiaoxu,Cheung Ray CC,Pao Derek CW,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 65(1), 147-160.
2012 - Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications
TrujilloOlaya Vladimir,Sherwood Timothy,KOÇ ÇETİN KAYA. Journal of Cryptographic Engineering, 2(3), 179-188.
2011 - Introduction to the Journal of Cryptographic Engineering
KOÇ ÇETİN KAYA. Journal of Cryptographic Engineering, 1(1), 1-3.
2010 - Finite Field Arithmetic for Cryptography
SAVAŞ ERKAY,KOÇ ÇETİN KAYA. IEEE Circuits and Systems Magazine, 10(2), 40-56.
2008 - A secure hash-based strong-password authentication protocol using one-time public-key cryptography
Kim Minho,KOÇ ÇETİN KAYA. Journal of Information Science and Engineering, 24(4), 1213-1227.
2007 - Micro-Architectural Cryptanalysis
Acıiçmez Onur,Seifert Jean Pierre,KOÇ ÇETİN KAYA. IEEE Security Privacy Magazine, 5(4), 62-64.
2007 - Vulnerabilities in the Adachi-Aoki-Komano-Ohta micropayment scheme
Kim Minho,KOÇ ÇETİN KAYA. International Journal of Network Security, 4(2), 235-239.
2007 - EXACT SOLUTION OF LINEAR EQUATIONS ON DISTRIBUTED-MEMORY MULTIPROCESSORS
KOÇ ÇETİN KAYA,Güvenç A,BakkaloğLu B. Parallel Algorithms and Applications, 3(1-2), 135-143.
2006 - Polynomial Basis Multiplication over GF(2 m )
ERDEM SERDAR SÜER,YANIK TUĞRUL,KOÇ ÇETİN KAYA. Acta Applicandae Mathematicae, 93(1-3), 33-55.
2005 - A simple attack on a recently introduced hash-based secure user authentication scheme
Kim Minho,KOÇ ÇETİN KAYA. International Journal of Network Security, 1(2), 77-80.
2005 - A simple attack on a recently introduced hash-based strong-password authentication scheme
Kim Minho,KOÇ ÇETİN KAYA. International Journal of Network Security, 1(2), 77-80.
2005 - A radix-4 scalable design
Tawalbeh LoAi Ali,Tenca Alexandre Ferreira,KOÇ ÇETİN KAYA. IEEE Potentials, 24(2), 16-18.
2005 - Efficient unified Montgomery inversion with multibit shifting
SAVAŞ ERKAY,Naseer Mudasser,Gutub Adnan,KOÇ ÇETİN KAYA. IEE Proceedings - Computers and Digital Techniques, 152(4), 489-.
2004 - Multiplier architectures for GF(p) and GF(2n)
SAVAŞ ERKAY,Tenca Alexandre Ferreira,Çiftçibasi M E,KOÇ ÇETİN KAYA. IEE Proceedings - Computers and Digital Techniques, 151(2), 147-.
2004 - Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
LEVİ ALBERT,ÇAĞLAYAN MEHMET UFUK,KOÇ ÇETİN KAYA. ACM Transactions on Information and System Security, 7(1), 21-59.
2004 - Elliptic and hyperelliptic curves on embedded μP
Wollinger Thomas,Pelzl Jan,Wittelsberger Volker,Paar Christof,Saldamli Gökay,KOÇ ÇETİN KAYA. ACM Transactions on Embedded Computing Systems, 3(3), 509-533.
2004 - A design framework for scalable and unified multipliers in GF(p) and GF(2m)
Tenca Alexandre F,SAVAŞ ERKAY,KOÇ ÇETİN KAYA. International Journal of Computer Research, 13(1), 68-83.
2003 - Parallel multipliers based on special irreducible pentanomials
RodrguezHenrquez Francisco,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 52(12), 1535-1542.
2003 - Constructing composite field representations for efficient conversion
Sunar Berk,SAVAŞ ERKAY,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 52(11), 1391-1398.
2003 - A scalable architecture for modular multiplication based on montgomery’xxs algorithm
Tenca Alexandre Ferreira,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 52(9), 1215-1221.
2002 - Cryptographic Hash Functions
KOÇ ÇETİN KAYA. Electrical and Computer Engineering,
2002 - A Tutorial on p-adic Arithmetic
KOÇ ÇETİN KAYA. Electrical and Computer Engineering,
1999 - Efficient methods for composite field arithmetic
SAVAŞ ERKAY,KOÇ ÇETİN KAYA. Electrical and Computer Engineering,
1999 - Mastrovito multiplier for all trinomials
Sunar Berk,KOÇ ÇETİN KAYA. IEEE Transactions on Computers, 48(5), 522-527.
1998 - A Reduction Method for Multiplication in Finite Fields
KOÇ ÇETİN KAYA. Electrical and Computer Engineering,
1998 - Fast algorithm for modular reduction
KOÇ ÇETİN KAYA,Hung ChungYu. IEE Proceedings - Computers and Digital Techniques, 145(4), 265-.
1998 - Recommended Test Plan for Arithmetic and Cryptographic Operations in DTCP Signing Facility
KOÇ ÇETİN KAYA. Intel Corporation,
1998 - 3D Parallel Monte Carlo Simulation of GaAs MESFETs
Pennathur Shankar S,Sandalci Can K,KOÇ ÇETİN KAYA,Goodnick Stephen M. VLSI Design, 6(1-4), 273-276.
1997 - Analysis of MMX Technology for Implementing Number-Theoretic Cryptosystems
KOÇ ÇETİN KAYA. Intel Corporation,
1997 - A Methodology for High-Speed Software Implementationsof Number-Theoretic Cryptosystems
KOÇ ÇETİN KAYA,ACAR TOLGA. Electrical and Computer Engineering,
1997 - Parallel p-adic method for solving linear systems of equations
KOÇ ÇETİN KAYA. Parallel Computing, 23(13), 2067-2074.
1997 - Three-Dimensional Monte Carlo Device Simulation with Parallel Multigrid Solver
Sandalci Can K,KOÇ ÇETİN KAYA,Goodnick Stephen M. International Journal of High Speed Computing, 9(03), 223-236.
1997 - A PARLLELIZATION OF PARLETT’xxS ALGORITHM FOR FUNCTIONS OF TRIANGULAR MATRICES∗
Bakkaloglu Bertan,Erciyes Kayhan,KOÇ ÇETİN KAYA. Parallel Algorithms and Applications, 11(1-2), 61-69.
1997 - Inversion of cellular automata iterations
KOÇ ÇETİN KAYA,Apohan A M. IEE Proceedings - Computers and Digital Techniques, 144(5), 279-.
1997 - A Parallel algorithm for principal nth roots of matrices
KOÇ ÇETİN KAYA,Inceoglu Mustafa Murat. Automatica, 33(9), 1735-1738.
1996 - RSA Hardware Implementation
KOÇ ÇETİN KAYA. TR 801, RSA Laboratories,
1996 - Parallel canonical recoding
KOÇ ÇETİN KAYA. Electronics Letters, 32(22), 2063-.
1996 - A parallel algorithm for functions of triangular matrices
KOÇ ÇETİN KAYA,Bakkalolu Bertan. Computing, 57(1), 85-92.
1996 - A Divide-and-Conquer Algorithm for Functions of Triangular Matrices
KOÇ ÇETİN KAYA. Electrical and Computer Engineering,
1995 - Analysis of sliding window techniques for exponentiation
KOÇ ÇETİN KAYA. Computers Mathematics with Applications, 30(10), 17-24.
1994 - Computing matrix-valued Nevanlinna-Pick interpolation
Chen Guanrong,KOÇ ÇETİN KAYA. Linear Algebra and its Applications, 203204(), 253-263.
1994 - High-Speed RSA Implementation
KOÇ ÇETİN KAYA. TR 201, RSA Laboratories,
1994 - Multiplication of signed-digit numbers
KOÇ ÇETİN KAYA,Johnson Scott L. Electronics Letters, 30(11), 840-.
1994 - Exponentiation using canonical recoding
Egecioglu Ömer N,KOÇ ÇETİN KAYA. Theoretical Computer Science, 129(2), 407-417.
1994 - Montgomery reduction with even modulus
KOÇ ÇETİN KAYA. IEE Proceedings - Computers and Digital Techniques, 141(5), 314-.
1993 - Systolic arrays for integer Chinese remaindering
KOÇ ÇETİN KAYA,Cappello Peter R. Parallel Computing, 19(11), 1303-1311.
1993 - A fast algorithm for scalar Nevanlinna-Pick interpolation
KOÇ ÇETİN KAYA,Chen Guanrong. Numerische Mathematik, 64(1), 115-126.
1992 - Parallel prefix computation with few processors
Egecioglu Ömer N,KOÇ ÇETİN KAYA. Computers Mathematics with Applications, 24(4), 77-84.
1992 - Adaptive m-ary segmentation and canonical recoding algorithms for multiplication of large binary numbers
KOÇ ÇETİN KAYA,ChingYu Hung. Computers Mathematics with Applications, 24(3), 3-12.
1992 - A parallel algorithm for generating discrete orthogonal polynomials
Egecioglu Ömer N,KOÇ ÇETİN KAYA. Parallel Computing, 18(6), 649-659.
1992 - A parallel algorithm for exact solution of linear equations via congruence technique
KOÇ ÇETİN KAYA. Computers Mathematics with Applications, 23(12), 13-24.
1992 - Parallel matrix multiplication on networked microcomputers
KOÇ ÇETİN KAYA,Gan Seng C. Computers Electrical Engineering, 18(2), 145-152.
1992 - Landscape reshaping algorithm for additive neural networks with application to graph mapping problems
Iyer K VK,Öğmen Haluk,KOÇ ÇETİN KAYA. Electronics Letters, 28(2), 109-.
1991 - Fast computation of continued fractions
Egecioglu Ömer N,KOÇ ÇETİN KAYA,RifI Coma Josep. Computers Mathematics with Applications, 21(2-3), 167-169.
1991 - Decomposing polynomial interpolation for systolic arrays
KOÇ ÇETİN KAYA. International Journal of Computer Mathematics, 38(3-4), 291-239.
1991 - Bit-level systolic arrays for modular multiplication
KOÇ ÇETİN KAYA,Hung Chingyu. Journal of VLSI signal processing systems for signal, image and video technology, 3(3), 215-223.
1991 - Parallel algorithms for nevanlinna-pick interpolation:the scalar case
KOÇ ÇETİN KAYA,Chen Guanrong. International Journal of Computer Mathematics, 40(1-2), 99-115.
1991 - A fast algorithm for gaussian elimination over GF(2) and its implementation on the GAPP
KOÇ ÇETİN KAYA,ARACHCHIGE SN. Journal of Parallel and Distributed Computing, 13(1), 118-122.
1991 - Comments on ”Residue arithmetic VLSI array architecture for manipulator pseudo-inverse Jacobian computation” [with reply]
KOÇ ÇETİN KAYA. IEEE Transactions on Robotics and Automation, 7(5), 715-717.
1991 - An improved algorithm for mixed-radix conversion of residue numbers
KOÇ ÇETİN KAYA. Computers Mathematics with Applications, 22(8), 63-71.
1991 - High-radix and bit recoding techniques for modular exponentiation
KOÇ ÇETİN KAYA. International Journal of Computer Mathematics, 40(3-4), 139-156.
1990 - Systolic computation of interpolating polynomials
Cappello Peter R,Gallopoulos Efstratios J,KOÇ ÇETİN KAYA. Computing, 45(2), 95-117.
1990 - Carry-save adders for computing the product AB modulo N
KOÇ ÇETİN KAYA,Hung Chingyu. Electronics Letters, 26(13), 899-.
1990 - Multi-operand modulo addition using carry save adders
KOÇ ÇETİN KAYA,Hung Chingyu. Electronics Letters, 26(6), 361-.
1990 - Parallel rational interpolation
Eğecioglu Ömer N,KOÇ ÇETİN KAYA. International Journal of Computer Mathematics, 32(3-4), 217-231.
1990 - A parallel method for fast and practical high-order newton interpolation
Eğecioglu Ömer N,Gallopoulos Efstratios J,KOÇ ÇETİN KAYA. BIT, 30(2), 268-288.
1989 - Schwarz-Christoffel transformation for the simulation of two-dimensional capacitance (VLSI circuits)
KOÇ ÇETİN KAYA,Ordung Philip F. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 8(9), 1025-1027.
1989 - Fast computation of divided differences and parallel hermite interpolation
Eğecioglu Ömer N,Gallopoulos Efstratios J,KOÇ ÇETİN KAYA. Journal of Complexity, 5(4), 417-437.
1989 - Parallel Hermite interpolation: An algebraic approach
Egecioglu Ömer N,Gallopoulos Efstratios J,KOÇ ÇETİN KAYA. Computing, 42(4), 291-307.
1989 - A fast algorithm for rational interpolation via orthogonal polynomials
Egecioglu Ömer N,KOÇ ÇETİN KAYA. Mathematics of Computation, 53(187), 249-249.
1989 - A recursive doubling algorithm for solution of tridiagonal systems on hypercube multiprocessors
Egecioglu Ömer N,KOÇ ÇETİN KAYA,Laub Alan J. Journal of Computational and Applied Mathematics, 27(1-2), 95-108.
Parallel Algorithms for Numerical Linear Algebra
1990 - İngilizce, Bilimsel Kitap
ISBN: 9781483295732
Eğecioğlu Ömer,KOÇ ÇETİN KAYA,Laub Alan J
Approximation Theory VIII, Vol 1: Approximation and Interpolation
1995 - İngilizce, Bilimsel Kitap
ISBN: 9789810229719
KOÇ ÇETİN KAYA
Embedded Cryptographic Hardware: Methodologies and Architectures
2004 - İngilizce, Bilimsel Kitap
ISBN: 1594540128
Tenca A F,SAVAŞ ERKAY,KOÇ ÇETİN KAYA
Wireless Security and Cryptography: Specifications and Implementation
2007 - İngilizce, Bilimsel Kitap
ISBN: 9780849387715
Tawalbeh Loai A,KOÇ ÇETİN KAYA
Encyclopedia of Cryptography and Security
2011 - İngilizce, Bilimsel Kitap
ISBN: 978-1-4419-5907-2
Contini Scott,KOÇ ÇETİN KAYA,Walter Colin D
Encyclopedia of Cryptography and Security
2011 - İngilizce, Bilimsel Kitap
ISBN: 978-1-4419-5907-2
KOÇ ÇETİN KAYA,Walter Colin D
Open Problems in Mathematics and Computational Science
2014 - İngilizce, Bilimsel Kitap
ISBN: 978-3-319-10682-3
KOÇ ÇETİN KAYA
The New Codebreakers
2016 - İngilizce, Bilimsel Kitap
ISBN: 978-3-662-49300-7
Lim Rone Kwei,Petzold Linda Ruth,KOÇ ÇETİN KAYA
Open Problems in Mathematics and Computational Science
2014 - İngilizce, Bilimsel Kitap
ISBN: 978-3-319-10682-3
Stipcevic Mario,KOÇ ÇETİN KAYA
Cryptographic Algorithms on Reconfigurable Hardware
2020 - İngilizce, Bilimsel Kitap
ISBN: 978-0-387-33883-5
RodriguezHenriquez Francisco,Saqib NA,Perez A,KOÇ ÇETİN KAYA
Cyber-Physical Systems Security
2018 - İngilizce, Bilimsel Kitap
ISBN: 978-331998935-8978-331998934-1
GREEN SAM,VINEYARD CRAIG M,KOÇ ÇETİN KAYA
Cyber-Physical Systems Security
2019 - İngilizce, Bilimsel Kitap
ISBN: 978-331998935-8978-331998934-1
Luo Jieliang,Green Sam,Feghali Peter,Legrady George,KOÇ ÇETİN KAYA