Browsing by Author "Koc, Cetin Kaya"
Now showing items 1-7 of 7
-
Algorithms for inversion mod p(k)
Koc, Cetin Kaya (Ieee Computer Soc, 2020)This article describes and analyzes all existing algorithms for computing x = a(-1) omod pk THORN for a prime p, and also introduces a new algorithm based on the exact solution of linear equations using p-adic expansions. ... -
Cyber-physical systems security
Koç, Çetin Kaya (Springer International Publishing, 2018)The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary ... -
FFT-based McLaughlin's montgomery exponentiation without conditional selections
Dai W.; Chen D.; Cheung R.C.C.; Koc, Cetin Kaya (IEEE Computer Society, 2018)Modular multiplication forms the basis of many cryptographic functions such as RSA, Diffie-Hellman key exchange, and ElGamal encryption. For large RSA moduli, combining the fast Fourier transform (FFT) with McLaughlin's ... -
Guest editors' introduction to the special issue on cryptographic engineering in a post-quantum world: state of the art advances
Liu, Zhe; Longa, Patrick; Koc, Cetin Kaya (Ieee Computer Soc, 2018)THE vast majority of public-key cryptosystems currently in use is based on integer factorization and (elliptic curve) discrete logarithm problems, which are believed to be intractable with current computing technology. ... -
Mathematical optimizations for deep learning
Green S.; Vineyard C.M.; Koc, Cetin Kaya (Springer International Publishing, 2018)Deep neural networks are often computationally expensive, during both the training stage and inference stage. Training is always expensive, because back-propagation requires high-precision floating-pointmultiplication and ... -
Preface
Koc, Cetin Kaya (Springer International Publishing, 2018)Cyber-physical systems involve interactions between computer-controlled and actuator-enabled components, whose dynamics have thus far been modeled, designed, and analyzed separately, but now need to be investigated and ... -
Reinforcement learning and trustworthy autonomy
Luo J.; Green S.; Feghali P.; Legrady G.; Koc, Cetin Kaya (Springer International Publishing, 2018)Cyber-Physical Systems (CPS) possess physical and software interdependence and are typically designed by teams of mechanical, electrical, and software engineers. The interdisciplinary nature of CPS makes them difficult to ...