Analyzing and comparing Montgomery multiplication algorithms CK Koc, T Acar, BS Kaliski IEEE micro 16 (3), 26-33, 1996 | 856 | 1996 |
Montgomery multiplication in GF (2k) CK Koc, T Acar Designs, Codes and Cryptography 14, 57-69, 1998 | 414 | 1998 |
Anonymous principals for policy languages M Belinkiy, T Acar, T Roeder, J Mackay, B LaMachia US Patent 8,955,035, 2015 | 121 | 2015 |
Role-based distributed key management T Acar, HN Jerez, LD Nguyen, TM Roeder US Patent 9,008,316, 2015 | 93 | 2015 |
Cryptographic agility and its relation to circular encryption T Acar, M Belenkiy, M Bellare, D Cash Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 92 | 2010 |
Single password authentication T Acar, M Belenkiy, A Küpçü Computer Networks 57 (13), 2597-2614, 2013 | 89 | 2013 |
Securing passwords against dictionary attacks M Belenkiy, T Acar, HNJ Morales, A Kupcu US Patent 9,015,489, 2015 | 84 | 2015 |
Revocation for delegatable anonymous credentials T Acar, L Nguyen International Workshop on Public Key Cryptography, 423-440, 2011 | 65 | 2011 |
Key management using trusted platform modules T Acar, B LaMacchia, HJ Morales, LD Nguyen, D Robinson, TB Tariq US Patent 9,026,805, 2015 | 62 | 2015 |
Minimal disclosure credential verification and revocation T Acar, C Paquin, DL Nguyen, M Chase US Patent 9,768,962, 2017 | 55 | 2017 |
Cryptographically strong key derivation using password, audio-visual and mental means T Dutta, S Kadam, T Acar US Patent App. 11/788,687, 2008 | 49 | 2008 |
Managing group keys T Acar, J Benaloh, NT Ferguson, CM Ellison, M Belenkiy, DL Nguyen US Patent 8,325,924, 2012 | 39 | 2012 |
Accumulators and U-prove revocation T Acar, SSM Chow, L Nguyen Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 35 | 2013 |
Homomorphic signatures and network coding signatures DL Nguyen, T Acar, A Mandal US Patent 9,722,776, 2017 | 34 | 2017 |
Fast software exponentiation in GF (2/sup k/) CK Koc, T Acar Proceedings 13th IEEE Sympsoium on Computer Arithmetic, 225-231, 1997 | 34 | 1997 |
Trusted platform module (TPM) protected device T Acar, M Pisut, D Barlow, M Stark, T Byfield, A McKelvey, M Pearson US Patent 10,009,179, 2018 | 33 | 2018 |
Managing system and active-content integrity JR Michener, T Acar Computer 33 (7), 108-110, 2000 | 33 | 2000 |
Affine pairings on ARM T Acar, K Lauter, M Naehrig, D Shumow Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 32 | 2013 |
Secure identification of computing device and secure identification methods S Dandu, P Ciskowski, T Acar, JLG Raza US Patent 9,202,039, 2015 | 28 | 2015 |
Weighted entropy pool service T Acar, DB Shumow, AS Tucker, CM Ellison US Patent 7,930,332, 2011 | 26 | 2011 |