Follow
Koray Karabina
Koray Karabina
Verified email at nrc-cnrc.gc.ca
Title
Cited by
Cited by
Year
Faster explicit formulas for computing pairings over ordinary curves
DF Aranha, K Karabina, P Longa, CH Gebotys, J López
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
2672011
Squaring in cyclotomic subgroups
K Karabina
Mathematics of Computation 82 (281), 555-579, 2013
952013
Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields
D Hankerson, K Karabina, A Menezes
IEEE Transactions on Computers 58 (10), 1411-1420, 2009
622009
Sike
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
Tech. Rep., 2019
482019
A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing
L Ghammam, K Karabina, P Lacharme, K Thiry-Atighehchi
IEEE Transactions on Information Forensics and Security 15, 2869-2880, 2020
402020
On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6
K Karabina, E Teske
Algorithmic Number Theory: 8th International Symposium, ANTS-VIII Banff …, 2008
332008
Supersingular isogeny key encapsulation
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
SIDH-spec. pdf, 2022
282022
A new double point multiplication algorithm and its application to binary elliptic curves with endomorphisms
R Azarderakhsh, K Karabina
IEEE Transactions on Computers 63 (10), 2614-2619, 2013
262013
A new protocol for the nearby friend problem
S Chatterjee, K Karabina, A Menezes
Cryptography and Coding: 12th IMA International Conference, Cryptography and …, 2009
192009
SIKE: Supersingular isogeny key encapsulation (2017)
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
URL: https://sike. org, 0
19
Fault attacks on pairing-based protocols revisited
S Chatterjee, K Karabina, A Menezes
IEEE Transactions on Computers 64 (6), 1707-1714, 2014
182014
Invalid-curve attacks on (hyper) elliptic curve cryptosystems.
K Karabina, B Ustaoglu
Adv. Math. Commun. 4 (3), 307-321, 2010
152010
Factor-4 and 6 compression of cyclotomic subgroups of and
K Karabina
Journal of Mathematical Cryptology 4 (1), 1-42, 2010
142010
Constructing canonical strategies for parallel implementation of isogeny based cryptography
A Hutchinson, K Karabina
International Conference on Cryptology in India, 169-189, 2018
132018
Point decomposition problem in binary elliptic curves
K Karabina
Information Security and Cryptology - ICISC 2015 9558, 155-168, 2016
132016
A new cryptographic primitive for noise tolerant template security
K Karabina, O Canpolat
Pattern Recognition Letters 80, 70-75, 2016
122016
Secure and noise-tolerant digital authentication or identification
K Karabina, O Canpolat
US Patent App. 15/522,874, 2018
112018
Constructing multidimensional differential addition chains and their applications
A Hutchinson, K Karabina
Journal of Cryptographic Engineering 9, 1-19, 2019
82019
On the asymptotic effectiveness of Weil descent attacks
K Karabina, A Menezes, C Pomerance, IE Shparlinski
Journal of Mathematical Cryptology 4 (2), 175-191, 2010
72010
A lightweight privacy-aware continuous authentication protocol-paca
A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu, K Akkaya, S Uluagac
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-28, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20