Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 146 | 2021 |
An efficient lattice-based signature scheme with provably secure instantiation S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 111 | 2016 |
A survey on security threats and authentication approaches in wireless sensor networks A Karakaya, S Akleylek 2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018 | 87 | 2018 |
A novel permission-based Android malware detection system using feature selection based on linear regression DÖ Şahin, OE Kural, S Akleylek, E Kılıç Neural Computing and Applications, 1-16, 2023 | 71 | 2023 |
LinRegDroid: Detection of Android malware using multiple linear regression models-based classifiers DÖ Şahın, S Akleylek, E Kiliç IEEE Access 10, 14246-14259, 2022 | 63 | 2022 |
qTESLA N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ... Submission to the NIST Post-Quantum Cryptography Standardization, 2017 | 48 | 2017 |
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 47 | 2022 |
New results on permission based static analysis for Android malware DÖ Şahın, OE Kural, S Akleylek, E Kiliç 2018 6th International symposium on digital forensic and security (ISDFS), 1-4, 2018 | 44 | 2018 |
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen IET Information Security 12 (4), 348-355, 2018 | 37 | 2018 |
Şifrelerin matematiği: kriptografi C Çimen, S Akleylek, E Akyıldız ODTÜ, 2008 | 37 | 2008 |
A novel Android malware detection system: adaption of filter-based feature selection methods DÖ Şahin, OE Kural, S Akleylek, E Kılıç Journal of Ambient Intelligence and Humanized Computing, 1-15, 2023 | 34 | 2023 |
Siber Güvenlik ve Savunma Ş Sağıroğlu, M Alkan, S Akleylek Ankara: Grafiker Yayınları, 2018 | 32 | 2018 |
A survey on security threats and solutions in the age of IoT C Atac, S Akleylek Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019 | 31 | 2019 |
Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ... Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021 | 28* | 2021 |
A study on the use of quantum computers, risk assessment and security problems B Arslan, M Ulker, S Akleylek, S Sagiroglu 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018 | 28* | 2018 |
Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta S Akleylek, HM Yıldırım, ZY Tok Akademik Bilişim 11, 2-4, 2011 | 27 | 2011 |
A probably secure bi-GISIS based modified AKE scheme with reusable keys S Akleylek, K Seyhan IEEE Access 8, 26210-26222, 2020 | 26 | 2020 |
A new matrix form to generate all 3× 3 involutory MDS matrices over F2m GG Güzel, MT Sakallı, S Akleylek, V Rijmen, Y Çengellenmiş Information Processing Letters 147, 61-68, 2019 | 26* | 2019 |
On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA S Akleylek, Ö Dağdelen, Z Yüce Tok International Conference on Cryptography and Information Security in the …, 2015 | 26 | 2015 |
Lattice-based digital signature scheme qTESLA N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ... NIST PQC project round 2, 2018 | 24* | 2018 |