Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 125 | 2021 |
An efficient lattice-based signature scheme with provably secure instantiation S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 104 | 2016 |
A survey on security threats and authentication approaches in wireless sensor networks A Karakaya, S Akleylek 2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018 | 68 | 2018 |
qTESLA N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ... Submission to the NIST Post-Quantum Cryptography Standardization, 2017 | 38 | 2017 |
New results on permission based static analysis for Android malware DÖ Şahın, OE Kural, S Akleylek, E Kiliç 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-4, 2018 | 34 | 2018 |
Şifrelerin matematiği: kriptografi C Çimen, S Akleylek, E Akyıldız ODTÜ, 2008 | 32 | 2008 |
A novel permission-based Android malware detection system using feature selection based on linear regression DÖ Şahin, OE Kural, S Akleylek, E Kılıç Neural Computing and Applications, 1-16, 2021 | 29 | 2021 |
A survey on security threats and solutions in the age of IoT A Cihan, S Akleylek Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019 | 28 | 2019 |
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 23 | 2022 |
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen IET Information Security 12 (4), 348-355, 2018 | 22 | 2018 |
On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA S Akleylek, Ö Dağdelen, Z Yüce Tok Cryptography and Information Security in the Balkans: Second International …, 2016 | 22 | 2016 |
Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta S Akleylek, HM Yıldırım, ZY Tok Akademik Bilişim 11, 2-4, 2011 | 22 | 2011 |
qTESLA’s reference implementation S Akleylek, E Alkim, PSLM Barreto, P Longa, H Polat, JE Ricardini, ... | 21* | |
A probably secure bi-GISIS based modified AKE scheme with reusable keys S Akleylek, K Seyhan IEEE Access 8, 26210-26222, 2020 | 20 | 2020 |
Siber Güvenlik ve Savunma Ş Sağıroğlu, M Alkan Ankara: Grafiker Yayınları, 2018 | 20 | 2018 |
Polynomial multiplication over binary fields using Charlier polynomial representation with low space complexity S Akleylek, M Cenk, F Özbudak Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 20* | 2010 |
Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ... Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021 | 19* | 2021 |
Lattice-based digital signature scheme qTESLA N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ... NIST PQC project round 2, 2018 | 18* | 2018 |
The trend of business intelligence adoption and maturity UB Qushem, AM Zeki, A Abubakar, S Akleylek 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 16 | 2017 |
Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform S Akleylek, ZY Tok 2014 22nd Signal Processing and Communications Applications Conference (SIU …, 2014 | 16 | 2014 |