Issue Date | Title | Author(s) |
Dec-2021 | B92 based quantum key distribution with faint pulsed laser | Mutlu, Görkem |
2007 | Basic key exchange protocols for secret key cryptosystems under CRYMPIX library | Uslu, Sevgi |
2007 | The comparative performance analysis of lattice based NTRU cryptosystem with other asymmetrical cryptosystems | Mersin, Ali |
2006 | Computational cost analysis of elliptic curve arithmetic | Atay, Serap ; Koltuksuz, Ahmet ; Hışıl, Hüseyin; Eren, Şaban |
2005 | A distributed multiprecision cryptographic library design | Hışıl, Hüseyin |
Aug-2006 | End-to-end security implementation for mobile devices using TLS protocol | Kayayurt, Barış; Tuğlular, Tuğkan |
1999 | A genetic algorithmic approach to the differential and linear cryptanalysis | Eminağaoğlu, Mete |
2010 | Modeling leakage of ephemeral secrets in tripartite/group key exchange | Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
1998 | Modelling of Turkey Turkish words by discrete Markov processes | Güventürk, Jale |
2009 | Multi-party off-the-record messaging | Goldberg, Ian; Ustaoğlu, Berkant ; Van Gundy, Matthew D.; Chen, Hao |
2023 | New Security Proofs and Complexity Records for Advanced Encryption Standard | Kara, O. |
Aug-2016 | A practical privacy-preserving targeted advertising scheme for IPTV users | Khayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant |
2012 | Privacy-preserving targeted advertising scheme for IPTV using the cloud | Khayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant ; Örencik, Cengiz |
2008 | Reduction algorithms for the cryptanalysis of lattice based asymmetrical cryptosystems | Beyazıt, Mutlu |
2009 | Reusing static keys in key agreement protocols | Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant |
2007 | Satellite networks for key management | Koltuksuz, Ahmet |