Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 137 | 2021 |
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 41 | 2022 |
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys S Akleylek, K Seyhan IEEE Access 8, 26210-26222, 2020 | 25 | 2020 |
Classification of random number generator applications in IoT: A comprehensive taxonomy K Seyhan, S Akleylek Journal of Information Security and Applications 71, 103365, 2022 | 12 | 2022 |
Module Learning with Rounding Based Key Agreement Scheme with Modified Reconciliation S Akleylek, K Seyhan Computer Standards & Interfaces 79, 103549, 2022 | 7 | 2022 |
Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme S Akleylek, K Seyhan | 6 | 2018 |
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication S Basu, K Seyhan, SKH Islam, S Akleylek IEEE Systems Journal, 2023 | 4 | 2023 |
A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE K Seyhan, S Akleylek The Journal of Supercomputing, 17859–17896, 2023 | 4 | 2023 |
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism K Seyhan, S Akleylek PeerJ Computer Science 9, e1391, 2023 | 2 | 2023 |
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices AF Dursun, K Seyhan, S Akleylek 2022 15th International Conference on Information Security and Cryptography …, 2022 | 2 | 2022 |
Kuantum bilgisayarlar sonrası güvenilir kafes tabanlı kriptosistem temellerine giriş S Akleylek, K Seyhan Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık 2, 171-209, 2019 | 2 | 2019 |
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key K Seyhan, S Akleylek PeerJ Computer Science 10, e1791, 2024 | 1 | 2024 |
Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols S Akleylek, K Seyhan 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 1 | 2019 |
Password authenticated key exchange-based on Kyber for mobile devices K Seyhan, S Akleylek, AF Dursun PeerJ Computer Science 10, e1960, 2024 | | 2024 |
Post-quantum password authenticated key exchange schemes and their primitives for resource-constrained devices K Seyhan Ondokuz Mayıs Üniversitesi Lisansüstü Eğitim Enstitüsü, 2024 | | 2024 |
QUANTUM SECURE INSTANT MESSAGING: REVISITED AF Dursun, K Seyhan, BK Aydın, S Akleylek INFORMATION SECURITY: PROBLEMS AND PROSPECTS, 42, 2022 | | 2022 |
Kuantum sonrası güvenli yeni anahtar değişim protokolü K Seyhan, S Akleylek, E Kılıç, Y Oruç TR Patent App. 2020/22,849, 2022 | | 2022 |
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications AF Dursun, K Seyhan, S Akleylek International Conference on Science, Engineering Management and Information …, 2022 | | 2022 |
Post-Quantum Cryptography: A Snapshot of Standardization Efforts K Seyhan, S Akleylek Cybersecurity for Critical Infrastructure Protection via Reflection of …, 2022 | | 2022 |
A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity K Seyhan, S Akleylek Program Committee Chair, 189, 2022 | | 2022 |