scispace - formally typeset
B

Berk Sunar

Researcher at Worcester Polytechnic Institute

Publications -  176
Citations -  9063

Berk Sunar is an academic researcher from Worcester Polytechnic Institute. The author has contributed to research in topics: Homomorphic encryption & Cache. The author has an hindex of 45, co-authored 171 publications receiving 8000 citations. Previous affiliations of Berk Sunar include Oregon State University.

Papers
More filters
Proceedings ArticleDOI

Trojan Detection using IC Fingerprinting

TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Journal ArticleDOI

A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks

TL;DR: This paper proposes a general model which, under mild assumptions, will generate provably random bits with some tolerance to adversarial manipulation and running in the megabit-per-second range, and develops fault-attack models and the properties of resilient functions to withstand such attacks.
Proceedings ArticleDOI

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES

TL;DR: A fine-grain cross-core cache attack that exploits access time variations on the last level cache and can be customized to work virtually at any cache level/size is introduced.
Book ChapterDOI

Public key cryptography in sensor networks—revisited

TL;DR: This paper proposes a custom hardware assisted approach for which it is claimed that it makes public key cryptography feasible in ultra-low power environments like wireless sensor networks, provided the right selection of algorithms and associated parameters, careful optimization, and low-power design techniques.
Book

Cryptographic hardware and embedded systems - CHES 2005 : 7th International Workshop, Edinburgh, UK, August 29-September 1, 2005 : proceedings

Josyula R. Rao, +1 more
TL;DR: A Stochastic Model for Differential Side Channel Cryptanalysis and some Applications to Cryptanalysis, and a New Baby-Step Giant-Step Algorithm and Some Applications to cryptanalysis are presented.