Analyzing and comparing Montgomery multiplication algorithms CK Koc, T Acar, BS Kaliski IEEE micro 16 (3), 26-33, 1996 | 829 | 1996 |
Montgomery multiplication in GF (2k) CK Koc, T Acar Designs, Codes and Cryptography 14, 57-69, 1998 | 411 | 1998 |
Anonymous principals for policy languages M Belinkiy, T Acar, T Roeder, J Mackay, B LaMachia US Patent 8,955,035, 2015 | 112 | 2015 |
Cryptographic agility and its relation to circular encryption T Acar, M Belenkiy, M Bellare, D Cash Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 88 | 2010 |
Single password authentication T Acar, M Belenkiy, A Küpçü Computer Networks 57 (13), 2597-2614, 2013 | 80 | 2013 |
Securing passwords against dictionary attacks M Belenkiy, T Acar, HNJ Morales, A Kupcu US Patent 9,015,489, 2015 | 79 | 2015 |
Role-based distributed key management T Acar, HN Jerez, LD Nguyen, TM Roeder US Patent 9,008,316, 2015 | 72 | 2015 |
Key management using trusted platform modules T Acar, B LaMacchia, HJ Morales, LD Nguyen, D Robinson, TB Tariq US Patent 9,026,805, 2015 | 53 | 2015 |
Revocation for delegatable anonymous credentials T Acar, L Nguyen International Workshop on Public Key Cryptography, 423-440, 2011 | 50 | 2011 |
Cryptographically strong key derivation using password, audio-visual and mental means T Dutta, S Kadam, T Acar US Patent App. 11/788,687, 2008 | 46 | 2008 |
Minimal disclosure credential verification and revocation T Acar, C Paquin, DL Nguyen, M Chase US Patent 9,768,962, 2017 | 41 | 2017 |
Fast software exponentiation in GF (2/sup k/) CK Koc, T Acar Proceedings 13th IEEE Sympsoium on Computer Arithmetic, 225-231, 1997 | 34 | 1997 |
Managing group keys T Acar, J Benaloh, NT Ferguson, CM Ellison, M Belenkiy, DL Nguyen US Patent 8,325,924, 2012 | 33 | 2012 |
Accumulators and U-Prove revocation T Acar, SSM Chow, L Nguyen Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 32 | 2013 |
Homomorphic signatures and network coding signatures DL Nguyen, T Acar, A Mandal US Patent 9,722,776, 2017 | 28 | 2017 |
Affine pairings on ARM T Acar, K Lauter, M Naehrig, D Shumow Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 28 | 2013 |
Managing system and active-content integrity JR Michener, T Acar Computer 33 (7), 108-110, 2000 | 28 | 2000 |
Trusted platform module (TPM) protected device T Acar, M Pisut, D Barlow, M Stark, T Byfield, A McKelvey, M Pearson US Patent 10,009,179, 2018 | 24 | 2018 |
Weighted entropy pool service T Acar, DB Shumow, AS Tucker, CM Ellison US Patent 7,930,332, 2011 | 24 | 2011 |
Modular reduction without pre-computation for special moduli T Acar, D Shumow Microsoft Research, 2010 | 23 | 2010 |