img

Çetin Kaya Koç | Students

My Students

I graduated 15 Ph.D. students and 37 M.S. students, and also directed the theses of 6 undergraduate students. Eleven of my Ph.D. students are currently professors: Three in the US, one in Mexico, four in Turkey, two in Kingdom of Saudi Arabia, and one in South Korea. The other four work for global high-tech companies in the US.
Interestingly, as of January 2015, three of my PhD students were the Associate Editors of the prestigious IEEE Transactions on Computers:

Doctoral Students

  1. Onur Acıiçmez. Advances in Side-Channel Cryptanalysis: Micro-Architectural Attacks, 2006. (Research Scientist at Yahoo, California)
  2. Minho Kim. Cryptanalysis and Enhancement of Authentication Protocols, 2006. (Professor at Air Force Academy, South Korea)
  3. Gökay Saldamlı. Spectral Modular Arithmetic, 2006. (Professor at San Jose State University, California)
  4. Colin van Dyke. Advances in Low-Level Software Protection, 2006. (Independent Consultant and IP Attorney, Oregon)
  5. Lo'ai Tawalbeh. A Novel Unified Algorithm and Hardware Architecture for Integrated Modular Division and Multiplication in GF(p) and GF(2^n) Suitable for Public-Key Cryptography, 2004. (Professor at Um Al-Qura University, Saudi Arabia)
  6. Adnan Abdul-Aziz Gutub. New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2^n), 2002. (Professor at Um Al-Qura University, Saudi Arabia)
  7. Tuğrul Yanık. New Methods for Finite Field Arithmetic, 2001. (Professor at Celal Bayar University, Turkey)
  8. Serdar Erdem. Improving the Karatsuba-Ofman Multiplication Algorithm for Special Applications, 2001. (Professor at Gebze Institute of Technology, Turkey)
  9. Erkay Savaş. Implementation Aspects of Elliptic Curve Cryptography, 2000. (Professor at Sabancı University, Turkey)
  10. Alper Halbutoğulları. Fast Bit-Level, Word-Level and Parallel Arithmetic in Finite Fields for Elliptic Curve Cryptosystems, 1998. (Research Scientist at Groupon, California)
  11. Francisco Rodriguez-Henriquez. New Algorithms and Architectures for Arithmetic in GF(2^m) Suitable for Elliptic Curve Cryptography, 2000. (Professor at CINVESTAV-IPN, México)
  12. Murat Aydos. Efficient Wireless Security Protocols based on Elliptic Curve Cryptography, 2000. (Professor at Hacettepe University, Turkey)
  13. Berk Sunar. Fast Galois Field Arithmetic for Elliptic Curve Cryptography and Error Control Codes, 1998. (Professor at Worcester Polytechnic Institute, Massachusetts)
  14. Tolga Acar. High-Speed Algorithms and Architectures for Cryptography, 1997. (Research Scientist at Microsoft, Intel)
  15. Bertan Bakkaloğlu. Parallel and High-Performance Matrix Function Computations, 1995. (Professor at Arizona State University, Arizona)

Master's Students

  1. Ahmed Al Faresi. Hardware Realization of the OCB Mode, June 2005.
  2. R. Shamsuddin. A Study of AES Implementations on ARM Processors, June 2005.
  3. S. J. Park. Design of Scalable and Unified Modular Multiplication, June 2005.
  4. L. Barlow. Symmetric Encryption with Multiple Keys, May 2005.
  5. W.-C. Yang. Hardware Realization for AES Key Generation, May 2005.
  6. M. Cihan. Key Exchange Methods in Ad Hoc Networks, Işık University, April 2005.
  7. U. Kunter. Risk Scalable and Modular Security Architectures, Işık University, April 2005.
  8. O. A. Pamukcu. IPCUBE: Personal Firewall on Linux, Işık University, June 2004.
  9. E. Durak. IPWALL: Gateway Firewall on Linux, Işık University, June 2004.
  10. C. W. van Dyke. An In-Depth Analysis of Common Software Vulnerabilities, 2004.
  11. O. Acıiçmez. Fast Hashing on Pentium SIMD Architecture, 2004.
  12. P. Godbole. Optimizing the AES on Intel's SIMD Architecture, 2004.
  13. U. Banerjee. Hardware Encryption Using the MPC180 Security Co-Processor, 2003.
  14. S. Almanei. Secure Instant Messaging: The Jabber Protocol, 2003.
  15. A. W. Montville. Random Number Generation on Handheld Devices, 2003.
  16. H. Tanık. ECDSA Optimizations on an ARM Processor, 2001.
  17. E. Turan. ECDSA Optimizations on an ARM Processor, 2001.
  18. M. Musa. Improved Montgomery Algorithms using Special Primes, 2000.
  19. J. B. Sessions. Fast Software Implementations of Block Ciphers, 1998.
  20. C. K. Sandalcı. Three Dimensional Monte Carlo Simulator, 1996.
  21. S. Johnson. Hardware Implementations of Modular Multiplication, 1995.
  22. Y. Peng. High-Speed Implementations of the RSA Cryptosystem, 1995.
  23. A. Güvenç. Improving the Performance of the Congruence Technique, 1992.
  24. B. Bakkaloğlu. Fast and Stable Algorithms for Matrix Sign Functions, 1992.
  25. M. N. K. Iyengar. A Signal Acquisition and Analysis System, 1991.
  26. S. Kuttalingam. An Integrated Platform for Image Processing, 1991.
  27. S. K. Gajawada. New Packing Strategies for Convolution, 1991.
  28. B. B. Youssef. New Parallel Algorithms for Chebyshev Polynomials, 1991.
  29. L. C. Achour. An Improved Congruence Algorithm, 1991.
  30. X. Qian. Fast Algorithms for Computation of Periodic Continued Fractions, 1991.
  31. P. R. V. Subramaniam. Two Algorithms for Mixed-Radix Conversion, 1990.
  32. R. M. Piedra. Exact Solution of Linear Equations on Multiprocessors, 1990.
  33. B. N. Elkhoury. Prefix Computation on Distributed Memory Multiprocessors, 1990.
  34. A. Sharma. Solution of Linear Recurrences on Hypercube Multiprocessors, 1990.
  35. C. Y. Hung. Fast Algorithms and VLSI Structures for Modular Multiplication, 1990.
  36. S. C. Gan. Parallel Matrix Multiplication on Microcomputer Networks, 1990.
  37. S. N. Arachchige. A Fast Algorithm for Gaussian Elimination over GF(2), 1990.

Undergraduate Theses

  1. W. Dai. Randomness Extractors – An Exposition, December 2015.
  2. M. Poppleton. Reversible Cellular Automata, June 2013.
  3. R. Stadick. Implementation of the ECDSA over GF(p) in Java, June 2005.
  4. A. Mathur. Implementation of the ECDSA over GF(2^k) in Java, June 2005.
  5. M. MacClary. A Design for High Performance Stack Based Multiprocessor, 2004.
  6. C. W. van Dyke. Implementation of the ECDSA on the Palm Platform, 2001.