Skip to main content

Showing 1–5 of 5 results for author: Temel, M

.
  1. arXiv:2404.16857  [pdf, ps, other

    cs.CR

    Implementation of Entropically Secure Encryption: Securing Personal Health Data

    Authors: Mehmet Hüseyin Temel, Boris Skoric, Idelfonso Tafur Monroy

    Abstract: Entropically Secure Encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. In this paper, we present the first implementation of ESE for bulk encryption. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. We have implemented polynomial mul… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 4 pages

  2. arXiv:2404.14069  [pdf, ps, other

    cs.AR

    On the Systematic Creation of Faithfully Rounded Commutative Truncated Booth Multipliers

    Authors: Theo Drane, Samuel Coward, Mertcan Temel, Joe Leslie-Hurd

    Abstract: In many instances of fixed-point multiplication, a full precision result is not required. Instead it is sufficient to return a faithfully rounded result. Faithful rounding permits the machine representable number either immediately above or below the full precision result, if the latter is not exactly representable. Multipliers which take full advantage of this freedom can be implemented using les… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. Verified Implementation of an Efficient Term-Rewriting Algorithm for Multiplier Verification on ACL2

    Authors: Mertcan Temel

    Abstract: Automatic and efficient verification of multiplier designs, especially through a provably correct method, is a difficult problem. We show how to utilize a theorem prover, ACL2, to implement an efficient rewriting algorithm for multiplier design verification. Through a basic understanding of the features and data structures of ACL2, we created a verified program that can automatically verify vari… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: In Proceedings ACL2 2022, arXiv:2205.11103

    Journal ref: EPTCS 359, 2022, pp. 116-133

  4. arXiv:2201.00188  [pdf, ps, other

    quant-ph

    Entropically secure encryption with faster key expansion

    Authors: Mehmet Huseyin Temel, Boris Skoric

    Abstract: Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a certain sense circumventing Shannon's result that perfect encryption requires the key to be at least as long as the entropy of the plaintext. Entropically secure encryption is not perfect, and it works only if a lower bound is known on the entropy of the pl… ▽ More

    Submitted 23 October, 2022; v1 submitted 1 January, 2022; originally announced January 2022.

  5. RP-Rewriter: An Optimized Rewriter for Large Terms in ACL2

    Authors: Mertcan Temel

    Abstract: RP-Rewriter (Retain-Property) is a verified clause processor that can use some of the existing ACL2 rewrite rules to prove conjectures through term rewriting. Optimized for conjectures that can expand into large terms, the rewriter tries to mimic some of the ACL2 rewriting heuristics but also adds some extra features. It can attach side-conditions to terms that help… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

    Comments: In Proceedings ACL2 2020, arXiv:2009.12521

    Journal ref: EPTCS 327, 2020, pp. 61-74