Worcester Polytechnic Institute

Publications

Homomorphic Encryption


  • Flattening NTRU for Evaluation Key Free Homomorphic Encryption
    by Yarkın Doröz, Berk Sunar
    Cryptography ePrint Archive. (BIB) (PDF)
  • Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware
    by Yarkın Doröz, Erdinç Öztürk, Berk Sunar, Erkay Savaş
    Cryptographic Hardware and Embedded Systems – CHES, 2015. (BIB) (Springer)
    Cryptography ePrint Archive. (PDF)
  • cuHE: A Homomorphic Encryption Accelerator Library
    by Wei Dai and Berk Sunar
    Cryptography and Information Security in the Balkans, 2015. (BIB) (Springer)
    Cryptography ePrint Archive. (PDF)
  • Depth Optimized Efficient Homomorphic Sorting
    by Gizem Selcan Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
    LatinCrypt, 2015. (BIB) (Springer)
    Cryptography ePrint Archive. (PDF)
  • Homomorphic Autocomplete
    by Gizem Selcan Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
    Cryptography ePrint Archive. (BIB) (PDF)
  • On-the-fly Homomorphic Batching/Unbatching
    by Yarkın Doröz, Gizem Selcan Çetin, Berk Sunar
    Workshop on Applied Homomorphic Cryptography and Encrypted Computing – WAHC’16, 2016.
    Cryptography ePrint Archive. (BIB) (PDF)
  • An Investigation of Complex Operations with Word-Size Homomorphic Encryption
    by Gizem Selcan Çetin, Yarkın Doröz, Berk Sunar, Willaim J. Martin
    Cryptography ePrint Archive. (BIB) (PDF)
  • Accelerating SWHE based PIRs using GPUs
    by Wei Dai, Yarkın Doröz and Berk Sunar
    Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Vol. 8976. Springer, 2015. (BIB) (Springer) (PDF)
  • Accelerating NTRU based Homomorphic Encryption using GPUs
    by Wei Dai, Yarkın Doröz and Berk Sunar
    High PerformanceExtreme Computing Conference – HPEC’14, 2014. (BIB) (IEEE) (PDF)
  • Bandwidth Efficient PIR from NTRU
    by Yarkın Doröz, Berk Sunar and Ghaith Hammouri
    Workshop on Applied Homomorphic Cryptography and Encrypted Computing – WAHC’14, 2014. (BIB) (PDF)
  • Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
    by Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
    Workshop on Applied Homomorphic Cryptography and Encrypted Computing – WAHC’14, 2014. (BIB) (PDF)
  • Homomorphic AES Evaluation Using the Modified LTV Scheme
    by Yarkın Doröz, Yin Hu and Berk Sunar
    Design, Codes and Cryptography – DCC, 2014. (BIB) (Springer) (PDF)
  • Accelerating Fully Homomorphic Encryption in Hardware
    by Yarkın Doröz, Erdinç Öztürk and Berk Sunar
    IEEE Transactions on Computers, 2013. (BIB) (IEEE) (PDF)
  • A Million-bit Multiplier Architecture for Fully Homomorphic Encryption
    by Yarkın Doröz, Erdinç Öztürk and Berk Sunar
    Microprocessors and Microsystems, 2014. (BIB) (MICRO) (PDF)
  • Evaluating the Hardware Performance of a Million-bit Multiplier
    by Yarkın Doröz, Erdinç Öztürk and Berk Sunar
    Euromicro Conference on Digital System Design – DSD 2013, 2013. (BIB) (PDF)
  • Exploring the Feasibility of Fully Homomorphic Encryption through GPU Acceleration
    by Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang and Berk Sunar
    to appear in IEEE Transactions on Computers, 2013. (PDF)
  • Enhanced Flexibility for Homomorphic Encryption Schemes via CRT
    by Yin Hu, William J. Martin and Berk Sunar
    Industrial Track of ACNS 2012, 2012. (PDF)
  • Accelerating Fully Homomorphic Encryption Using GPU
    by Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar
    Proceedings of 2012 IEEE High Performance Extreme Computing Conference – HPEC’ 12, 2012. (PDF)
  • Exploring the Feasibility of Fully Homomorphic Encryption through GPU Acceleration
    by Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang and Berk Sunar,
    Draft, 2012.(PDF)
  • Enhanced Flexibility for Homomorphic Encryption Schemes via CRT
    by Yin Hu, William J. Martin and Berk Sunar
    Industrial Track of ACNS 2012, 2012. (PDF)
  • Accelerating Fully Homomorphic Encryption Using GPU
    by Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar
    Proceedings of 2012 IEEE High Performance Extreme Computing Conference – HPEC’ 12, 2012. (PDF)

RAIN

A poster for this project that was published in CHES 2014 is available at CHESPoster.

Publications

  • Hit by the Bus: QoS Degredation Attack on Android. Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar. ASIACCS 2017. (PDF)
  • Cache-Based Application Detection in the Cloud Using Machine Learning. Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar. ASIACCS 2017. (PDF)
  • Efficient, Adversarial Neighbor Discovery using Logical Channels on Microsoft Azure. Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar. Accepted at ACSAC 2016.
  • Cache Attacks Enable Bulk Key Recovery on the Cloud (Extended Version). Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar. CHES 2016. (PDF) (Bib)
  • Co-location detection on the Cloud. Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar. COSADE 2016. (PDF) (Bib)
  • Cross Processor Cache Attacks. Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. AsiaCCS 2016. PDF) (Bib)
  • Seriously get off my cloud! Cross-VM RSA Recovery in a Public Cloud. Mehmet Sinan Inci, Berk GulmezogluGorka Irazoqui, Thomas Eisenbarth, Berk Sunar. Eprint (PDF) (Bib)
  • Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. Euromicro Conference on Digital System Design- DSD, 2015. (PDF) (Bib)
  • S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing—and its Application to AES. Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. IEEE Symposium on Security and Privacy-S&P, 2015. (PDF) (Bib)
  • A Faster and More Realistic Flush+Reload Attack on AES. Berk GulmezogluMehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. COSADE, 2015. (PDF) (Bib)
  • Know Thy Neighbor: Crypto Library Detection in Cloud. Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar. Privacy Enhancing Technologies Symposium-PETS, 2015. (PDF) (Bib)
  • Lucky 13 Strikes Back.  Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk SunarASIA Symposium on Information, Computer and Communications Security-AsiaCCS 2015. (PDF) (Bib)
  • Fine Grain Cross-VM Attacks on Xen and VMware. Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar.International Conference on Big Data and Cloud Computing-BDCloud 2014. (PDF) (Bib)
  • Wait a minute! A fast, Cross-VM attack on AES. Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar.Research in Attacks, Intrusions and Defenses-RAID 2014. (PDF) (Bib)

Others


  • NTRU Modular Lattice Signature Scheme on CUDA GPUs
    by Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
    Accepted in the 11th International Workshop on Security and High Performance Computing Systems (SHPCS 2016) Cryptography ePrint Archive. (PDF)
  • Ghaith Hammouri and Berk Sunar, Generating unique identifiers for smart-phones using software.. IET Electronics Letters, 2014. to appear. (PDF)
  • Chenguang Yang, Ghaith Hammouri, Berk Sunar, Voice Passwords Revisited, International Conference on Security and Cryptography – SECRYPT, Rome, Italy, July 24-27, 2012. (PDF)
  • Yin Hu, Berk Sunar, Introduction to Hardware Security and Trust,
    In Introduction to Hardware Security and Trust, Eds. Mohammad Tehranipoor and Cliff Wang, pages 305-324, Springer Verlag, August 2011.
  • William J. Martin, Berk Sunar, Resilient functions: Just how resilient are the they?, in: Error-Correcting Codes, Finite Geometries and Cryptography Contemporary Mathematics, Vol. 523 Aiden A. Bruen and David L. Wehlau, editors. Published by the American Mathematical Society, 2010.
  • D. Karakoyunlu, B. Sunar, Differential Template Attacks on PUF Enabled Cryptographic Devices, Proceedings of IEEE Workshop on Information Forensics and Security – WIFS’10, Seattle, December 12-15, 2010
  • Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls, Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions, In Towards Hardware-Intrinsic Security: Foundation and Practice, Sadeghi, Ahmad-Reza; Naccache, David (Eds.), pages 135-166, Springer Verlag, 2010.
  • Mohammad Tehranipoor and Berk Sunar, Hardware Trojan Horses, In Towards Hardware-Intrinsic Security: Foundation and Practice, Sadeghi, Ahmad-Reza; Naccache, David (Eds.), pages 167-188, Springer Verlag, 2010.
  • Ghaith Hammouri, Aykutlu Dana and Berk Sunar,
    License Distribution Protocols from Optical Media Fingerprints, In Towards Hardware-Intrinsic Security: Foundation and Practice, Sadeghi, Ahmad-Reza; Naccache, David (Eds.), pages 201-222, Springer Verlag, 2010.
  • K. Akdemir, D. Karakoyunlu, T. Padir, B. Sunar; An Emerging Threat: Eve Meets a Robot Proceedings of the Second International Conference on Trusted Systems, December 2010.
  • Karakoyunlu, D.; Gurkaynak, F.K.; Sunar, B.; Leblebici, Y.; Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields, in Information Security, IET, Volume: 4, Issue:1, Pages: 30-43, March 2010.
  • Sang-Kyung Yoo, Deniz Karakoyunlu, Berk Birand, Berk Sunar, Improving the Robustness of Ring Oscillator TRNGs, ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 3 Issue 2, May 2010.
  • Yin Hu, Berk Sunar, An Improved Memory Integrity Protection Scheme (Short Paper). Proceeding of Trust 2010, 2010. Full Version: (PDF)
  • Zhen Wang, Mark Karpovsky, Ajay Jayant Joshi, Berk Sunar, Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes, in Proceedings of Eleventh International Conference on Information and Communications Security, ICICS 2009, December 14-17, 2009, Beijing, China.
  • Kahraman Akdemir, Ghaith Hammouri, Berk Sunar, Non-linear Error Detection for Finite State Machines. In: Youm, H. Y., Yung, M., (eds.) Proceedings of the 10th International Workshop on Information Security Applications (WISA 2009), Springer-Verlag, Heidelberg, Germany, 2009 (to appear).
  • Ghaith Hammouri, Aykutlu Dana, Berk Sunar, CDs Have Fingerprints Too. In: Clavier, C., Gaj, K., (eds.) Proceedings of the 11th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS, vol. 5747, pp. 348-362, Springer-Verlag, Heidelberg, Germany (2009). (PDF)
  • Z.Wang, M.Karpovsky, B.Sunar, Multilinear Codes for Robust Error Detection. D. Gizopoulos, A. Chatterjee. 15th IEEE International On-Line Testing Symposium, Sesimbra-Lisbon, Portugal, June 24-26, 2009
  • Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls. Memory Leakage-Resilient Encryption based on Physically Unclonable Functions, to appear in The 15th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT 2009).
  • A.O. Durahim, E. Savas, B. Sunar, , T. B. PedersenO. Kocabas Transparent Code Authentication at the Processor Level, IET Computers & Digital Techniques, Volume 3, Issue 4, pages 354-372, July 2009.
  • Erdinc Ozturk, Erkay Savas, Berk Sunar, A Versatile Montgomery Multiplier Architecture with Characteristic Three Support, Computers & Electrical Engineering, Volume 35 , Issue 1 (January 2009) Pages 71-85. Elsevier. Pre-Print (PDF)
  • Ghaith Hammouri, Kahraman Akdemir and Berk Sunar, Novel PUF-based Error Detection Methods in Finite State Machines, In: Lee, P.J.,Cheon, J.H., (eds.) Proceedings of the 11th International Conference on Information Security and Cryptology (ICISC 2008), LNCS, vol. 5461, pp. 235-252, Springer-Verlag, Heidelberg, Germany (2008).
  • Yin Hu, Ghaith Hammouri, Berk Sunar, A Fast Real-time Memory Authentication Protocol, Conference on Computer and Communications Security, Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 31-40, 2008. Pre-print: (PDF)
  • Ghaith Hammouri, Erdinc Ozturk, Berk Birand and Berk Sunar, Unclonable Lightweight Authentication Scheme, in Proceedings of Information and Communications Security, 10th International Conference (ICICS 2008), Liqun Chen, Mark Dermot Ryan, Guilin Wang (Eds.) Birmingham, UK, October 20-22, 2008, Lecture Notes in Computer Science 5308 Sprnger Verlag, pages 33-48, 2008.
  • Ghaith Hammouri, Erdinc Ozturk, Berk Sunar, A Tamper-Proof and Lightweight Authentication Scheme, Pervasive and Mobile Computing, Volume 4, Issue 6, pages 807-818, Elsevier Science Publishers B. V. Amsterdam, The Netherlands, 2008. Pre-print: (PDF)
  • Selcuk Baktir, Berk Sunar. Optimal Extension Field Inversion in the Frequency Domain, in Proceedings of International Workshop on the Arithmetic of Finite Fields — WAIFI 08, LNCS 5130, pages 47-61, Siena, Italy. July 6-9, 2008. Pre-print: (PDF)
  • Ghaith Hammouri, Berk Sunar. PUF-HB: A Tamper-Resilient HB based Authentication Protocol Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings, Eds. Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung, LNCS 5037. Pre-print: (PDF)
  • Erdinc Ozturk, Ghaith Hammouri, Berk Sunar, Physical unclonable function with tristate buffers. In: Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Seattle, Washington, USA, pp. 3194-3197, IEEE, Washington, DC, USA (2008). Pre-print: (PDF)
  • Erdinc Ozturk, Berk Sunar and Ghaith Hammouri, Towards Robust Low Cost Authentication for Pervasive Devices, the Sixth Annual IEEE International Conference on Pervasive Computing and Communications, March 17-21, 2008, Hong Kong. Pre-print: (PDF)
  • Erdinc Ozturk, Gunnar Gaubatz, Berk Sunar Tate Pairing with Strong Fault Resiliency, to appear in Proceedings of the IEEE Workshop on Fault Detection and Tolerance in Cryptography — FDTC 2007. Pre-print: (PDF)
  • Dakshi Agrawal, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar, Trojan Detection Using IC Fingerprinting, in Proceedings of IEEE Symposium on Security and Privacy, 20-23 May 2007 Page(s):296 – 310, 2007.