Folgen
Sedat Akleylek
Sedat Akleylek
Department of Computer Engineering, Ondokuz Mayis University and IAM, METU
Bestätigte E-Mail-Adresse bei bil.omu.edu.tr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam
Journal of Information Security and Applications 58, 102788, 2021
1252021
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
1042016
A survey on security threats and authentication approaches in wireless sensor networks
A Karakaya, S Akleylek
2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018
682018
qTESLA
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
Submission to the NIST Post-Quantum Cryptography Standardization, 2017
382017
New results on permission based static analysis for Android malware
DÖ Şahın, OE Kural, S Akleylek, E Kiliç
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-4, 2018
342018
Şifrelerin matematiği: kriptografi
C Çimen, S Akleylek, E Akyıldız
ODTÜ, 2008
322008
A novel permission-based Android malware detection system using feature selection based on linear regression
DÖ Şahin, OE Kural, S Akleylek, E Kılıç
Neural Computing and Applications, 1-16, 2021
292021
A survey on security threats and solutions in the age of IoT
A Cihan, S Akleylek
Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019
282019
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
K Seyhan, TN Nguyen, S Akleylek, K Cengiz
Cluster Computing 25 (3), 1729-1748, 2022
232022
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen
IET Information Security 12 (4), 348-355, 2018
222018
On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA
S Akleylek, Ö Dağdelen, Z Yüce Tok
Cryptography and Information Security in the Balkans: Second International …, 2016
222016
Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta
S Akleylek, HM Yıldırım, ZY Tok
Akademik Bilişim 11, 2-4, 2011
222011
qTESLA’s reference implementation
S Akleylek, E Alkim, PSLM Barreto, P Longa, H Polat, JE Ricardini, ...
21*
A probably secure bi-GISIS based modified AKE scheme with reusable keys
S Akleylek, K Seyhan
IEEE Access 8, 26210-26222, 2020
202020
Siber Güvenlik ve Savunma
Ş Sağıroğlu, M Alkan
Ankara: Grafiker Yayınları, 2018
202018
Polynomial multiplication over binary fields using Charlier polynomial representation with low space complexity
S Akleylek, M Cenk, F Özbudak
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
20*2010
Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji
S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ...
Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021
19*2021
Lattice-based digital signature scheme qTESLA
N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ...
NIST PQC project round 2, 2018
18*2018
The trend of business intelligence adoption and maturity
UB Qushem, AM Zeki, A Abubakar, S Akleylek
2017 International Conference on Computer Science and Engineering (UBMK …, 2017
162017
Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform
S Akleylek, ZY Tok
2014 22nd Signal Processing and Communications Applications Conference (SIU …, 2014
162014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20