Yayınlar & Eserler

SCI, SSCI ve AHCI İndekslerine Giren Dergilerde Yayınlanan Makaleler

Diğer Dergilerde Yayınlanan Makaleler

Hakemli Kongre / Sempozyum Bildiri Kitaplarında Yer Alan Yayınlar

QUANTUM SECURE INSTANT MESSAGING: REVISITED

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 25 - 26 Kasım 2022

Post-Quantum Cryptography: A Snapshot of Standardization Efforts

Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems, NATO Science for Peace and Security Series, Azerbaycan, 5 - 09 Eylül 2022, ss.90-99

End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications

International Conference on Science, Engineering Management and Information Technology, Ankara, Türkiye, 8 - 09 Eylül 2022

Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc)

Intermediate and Advanced Course on Post-Quantum Cryptography, Baku, Azerbaycan, 5 - 10 Eylül 2022

A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity

Applications of Computer Algebra – ACA 2022, İstanbul, Türkiye, 15 - 19 Ağustos 2022

A Lattice-based Group Signature Scheme with Applications in Blockchain

Applications of Computer Algebra - ACA 2022, Türkiye, 15 - 19 Ağustos 2022

CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED

Applications of Computer Algebra (ACA), SCALE, GEBZE, Türkiye, 15 Ağustos 2022

On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m

ICNDA 2022 International Conference on Nonlinear Dynamics and Applications, Majitar, Hindistan, 9 - 12 Mart 2022

Challenges and Opportunities in Cryptography

The 6th International Conference of Reliable Information and Communication Technology, Suudi Arabistan, 22 - 23 Aralık 2021

On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2m

International Conference on Nonlinear Dynamics and Applications, ICNDA 2022, Virtual, Online, 9 - 11 Mart 2022, ss.587-595 identifier

Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude

2022 International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols, FAVPQC 2022, Madrid, İspanya, 24 Ekim 2022, cilt.3280, ss.16-31 identifier

Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude

34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022, Pennsylvania, Amerika Birleşik Devletleri, 1 - 10 Temmuz 2022, ss.382-387 Creative Commons License identifier

IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 29 Ekim 2021, ss.81-84

CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS

International Conference on INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Baku, Azerbaycan, 22 Ekim 2021, ss.9-12

HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE

INFORMATION SECURITY: PROBLEMS AND PROSPECTS, Azerbaycan, 29 Ekim 2021, ss.112-114

Survey on Implementation of Lattice-based Identification Schemes

4th International Students Science Congress, İzmir, Türkiye, 15 Ocak 2021, ss.194-206

Support Vector Machines: From Classical Version to Quantum

4th International Students Science Congress, İzmir, Türkiye, 15 Ocak 2021, ss.207-216

Keystroke Dynamics Based Authentication System

6th International Conference on Computer Science and Engineering, UBMK 2021, Ankara, Türkiye, 15 - 17 Eylül 2021, ss.644-649 identifier

A Brief Review on Deep Learning Based Software Vulnerability Detection

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.143-148 identifier

Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neura Network

6th International Conference on Computer Science and Engineering, UBMK 2021, Ankara, Türkiye, 15 - 17 Eylül 2021, ss.731-734 identifier

PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices

9th International Symposium on Digital Forensics and Security (ISDFS), Elazığ, Türkiye, 28 - 29 Haziran 2021 identifier identifier

A Systematic Survey on Mobile Internet of Things Security

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.116-120 identifier

DDOS Attack Detection Accuracy Improvement in Software Defined Network (SDN) Using Ensemble Classification

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2 - 03 Aralık 2021, ss.111-115 identifier

GPU implementation of quantum secure ABC cryptosystem on CUDA

2nd International Workshop on Intelligent Information Technologies and Systems of Information Security, IntellTSIS 2021, Khmelnytskyi, Ukrayna, 24 - 26 Mart 2021, cilt.2853, ss.309-316 identifier

Efficient Implementations of Gauss-Based Sieving Algorithms Gauss Tabanli Eleme Algoritmalarinin Verimli Uygulamalari

28th Signal Processing and Communications Applications Conference, SIU 2020, Gaziantep, Türkiye, 5 - 07 Ekim 2020 identifier

Comparison of Regression Methods in Permission Based Android Malware Detection

28th Signal Processing and Communications Applications Conference (SIU), ELECTR NETWORK, 5 - 07 Ekim 2020 identifier

Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 Aralık 2020, ss.75-79 identifier

Efficient Implementations of Gauss-Based Sieving Algorithms

28th Signal Processing and Communications Applications Conference (SIU), ELECTR NETWORK, 5 - 07 Ekim 2020 identifier identifier

A Novel Lattice-Based Threshold Ring Signature Scheme

5th International Conference on Computer Science and Engineering (UBMK), Diyarbakır, Türkiye, 9 - 11 Eylül 2020, ss.219-223 identifier

Stocks Prices Prediction with Long Short-term Memory

5th International Conference on Internet of Things, Big Data and Security (IoTBDS), Prague, Çek Cumhuriyeti, 7 - 09 Mayıs 2020, ss.221-226 identifier

Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları

12th International Conference on Information Security and Cryptology, Ankara, Türkiye, 16 - 17 Ekim 2019, ss.24-29

Efficient GeMSS Based Ring Signature Scheme

The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Cezayir, 18 - 19 Haziran 2019

New Signature Algorithm Based on Concatenated Rank Codes

Second International Workshop on Cryptography and its Applications, Oran, Cezayir, 18 - 19 Haziran 2019, ss.221-224

Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.91-96 identifier identifier

Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.372-377 identifier identifier

Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme

15th International Conference on Information Security Practice and Experience (ISPEC), Kuala-Lumpur, Malezya, 26 - 28 Kasım 2019, cilt.11879, ss.41-55 identifier identifier

Permission Weighting Approaches in Permission Based Android Malware Detection

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.134-139 identifier identifier

A New 3-pass Zero-knowledge Lattice-based Identification Scheme

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.409-413 identifier identifier

Formal Analysis of MaTRU Cryptosystem

4th International Conference on Computer Science and Engineering (UBMK), Samsun, Türkiye, 11 - 15 Eylül 2019, ss.403-408 identifier identifier

Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme

İnformasiya təhlükəsizliyinin aktual multidissiplinar elmi-praktiki problemləri IV respublika konfransının materialları, 14 Aralık 2018

A Bayesian Networks Application in Occupational Health and Safety

International Conference on Computer Science and Engineering, 20 - 23 Eylül 2018 identifier

Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması

SAVTEK 2018, 9. SAVUNMA TEKNOLOJİLERİ KONGRESİ, 27 Haziran 2018

GUI Based Ring Signature Scheme

18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakya, 6 - 08 Haziran 2018, ss.1-3

A SURVEY ON DIGITAL RIGHTS MANAGEMENT

4th International Conference on Engineering and Natural Sciences (ICENS 2018), Kiev, Ukrayna, 2 - 06 Mayıs 2018, ss.260

An Automated Vulnerable Website Penetration

International Conference on Advanced Technologies, Computer Engineering and Science (ICATCES 2018), Karabük, Türkiye, 11 - 13 Mayıs 2018, ss.297-301

An Overview for the National Cyber Security Strategy

International Conference on Advanced Technologies, Computer Engineering and Science (ICATCES 2018), Karabük, Türkiye, 11 - 13 Mayıs 2018, ss.603-609

A study on the use of quantum computers, risk assessment and security problems

6th International Symposium on Digital Forensic and Security, ISDFS 2018, Antalya, Türkiye, 22 - 25 Mart 2018, cilt.2018-January, ss.1-6 identifier

New Results on Permission Based Static Analysis for Android Malware

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.340-343 identifier identifier

On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques

2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Kizilcahamam, Türkiye, 19 - 21 Ekim 2018, ss.649-654 identifier identifier

New Quantum Secure Key Exchange Protocols Based on MaTRU

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.260-264 identifier identifier

TRCyberLab: An Infrastructure for Future Internet and Security Studies

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.431-435 identifier identifier

Work Accident Analysis with Machine Learning Techniques

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosna-Hersek, 20 - 23 Eylül 2018, ss.215-219 identifier identifier

Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form

International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Türkiye, 3 - 04 Aralık 2018, ss.81-86 identifier

A Bayesian Network Application in Occupational Health and Safety

3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosna-Hersek, 20 - 23 Eylül 2018, ss.239-243 identifier identifier

A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks

6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Türkiye, 22 - 25 Mart 2018, ss.359-362 identifier identifier

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-quantum Era

IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, Çin, 7 - 11 Kasım 2018, ss.1923-1928 identifier identifier

On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography

3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, 6 - 09 Aralık 2017, cilt.3, ss.70-73

Computing Square Roots in Prime Fields via Singular Elliptic Curves

The Third International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering (AMINSE 2017), 6 - 09 Aralık 2017

Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow

The 3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, Tiflis, Gürcistan, 6 - 09 Aralık 2017, cilt.3, ss.68

A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale

8 th International Advanced Technologies Sympoium, Elazığ, Türkiye, 19 - 22 Ekim 2017, ss.3733-3738

Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması

10th International Conference on Information Security and Cryptology, 20 - 21 Ekim 2017, cilt.10, ss.1-7

Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü

2nd International Conference on Computer Science and Engineering (UBMK’17), 5 - 08 Ekim 2017, ss.322-327 identifier

An artificial bee colony algorithm for solving the weapon target assignment problem

7th International Conference on Information Communication and Management, ICICM 2017, Moscow, Rusya, 28 - 30 Ağustos 2017, cilt.Part F131202, ss.28-31 identifier

Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology

International Conference on Theoretical and Application Problems of Mathematics, 25 - 26 Mayıs 2017, cilt.1, ss.21

Strassen-like 2x2 Matrix Squaring Revisited

3rd International Conference on Engineering and Natural Sciences (ICENS 2017), Budapest, Macaristan, 3 - 07 Mayıs 2017, ss.421

Modified Arithmetic Circuits for Galois Rings

3rd International Conference on Engineering and Natural Sciences (ICENS 2017), Budapest, Macaristan, 3 - 07 Mayıs 2017, ss.327

On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.456-461 identifier identifier

A Novel Identicication Scheme for Post-Quantum Secure Digital Right Management

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.322-327 identifier identifier

The Trend of Business Intelligence Adoption and Maturity

2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Türkiye, 5 - 08 Ekim 2017, ss.532-537 identifier identifier

Some Results on MDS Matrices

9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.35

Speeding up Number Theoretic Transform Lazy Reductions Explained

9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.9, ss.115-119

A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks

International Conference on Computer Science and Engineering, Türkiye, 20 - 23 Ekim 2016, cilt.75

Efficient Methods for Lattice based Cryptography

The 5th International Workshop on Cryptography and its Applications - IWCA’ 2016, Cezayir, 26 - 27 Nisan 2016

Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography

3rd International Conference on “Converging Technologies & Management (CTM-2016), Hindistan, 1 - 02 Nisan 2016

Post Quantum Cryptography An Introduction

3rd INTERNATIONAL CONFERENCE ON CONVERGENCE TECHNOLOGY MANAGEMENT (CTM-2016), Hindistan, 1 - 02 Nisan 2016

On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA

2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015, Koper, Slovenya, 3 - 04 Eylül 2015, cilt.9540, ss.155-168 identifier

An efficient lattice-based signature scheme with provably secure instantiation

8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, Fes, Fas, 13 - 15 Nisan 2016, cilt.9646, ss.44-60 identifier

Arithmetic Operations in Lattice Based Cryptography

International Scientific Conference of Students and Young Scientists Theoretical and Applied Aspects of Cybernetics, Kiev, Ukrayna, 23 - 27 Kasım 2015

Data Storage of Electronic Exams

Proceedings of 8th International Conference on Information Security and Cryptology (ISCTURKEY 2015), Ankara, Türkiye, 30 - 31 Ekim 2015

Multiplication in a Galois Ring

7th International Workshop on Signal Design and Its Applications in Communications (IWSDA), Bengaluru, Hindistan, 13 - 19 Eylül 2015, ss.28-32 identifier

Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA

IEEE 22nd Signal Processing and Communications Applications Conference, Trabzon, Türkiye, 23 - 25 Nisan 2014, ss.854-857 identifier

EFFICIENT ARITHMETIC FOR LATTICE-BASED CRYPTOGRAPHY ON GPU USING THE CUDA PLATFORM

22nd IEEE Signal Processing and Communications Applications Conference (SIU), Trabzon, Türkiye, 23 - 25 Nisan 2014, ss.854-857 identifier identifier

Polynomial multiplication over binary fields using charlier polynomial representation with low space complexity

11th International Conference on Cryptology in India, INDOCRYPT 2010, Hyderabad, Hindistan, 12 - 15 Aralık 2010, cilt.6498 LNCS, ss.227-237 identifier

Faster Montgomery modular multiplication without pre-computational phase for some classes of finite fields

25th International Symposium on Computer and Information Sciences, ISCIS 2010, London, İngiltere, 22 - 24 Eylül 2010, cilt.62 LNEE, ss.405-408 identifier

The Third International Conference onProblems of Cybernetics and Informatics

Problems of Cybernetics and Informatics, PCI’ 2010, Baku, Azerbaycan, 08 Eylül 2010, ss.211-212

Open Source UTM Alternative ClearOS

Proceeding of the third International Conference “Problems of Cybernetics and Informatics, 08 Eylül 2010

Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers

Information Security and Cryptology Conference, 13 - 15 Aralık 2007, ss.157-163

A note on Knapsack Cryptosystems

International scientific conference “Information Technologies and Telecommunications in Education and Science, 06 Ekim 2007

Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye

Proceeding of the 3-th International conference on Information Technologies and Telecommunication (IT T C 2007), 06 Ekim 2007

Steganography and new implementation of steganography Steganografi ve steganografinin yeni bir uygulamasi

IEEE 13th Signal Processing and Communications Applications Conference, SIU 2005, Kayseri, Türkiye, 16 - 18 Mayıs 2005, cilt.2005, ss.64-67 identifier

Securty of online Learning

International scientific conference “Information Technologies and Telecommunications in Education and Science” (IT T ES’2005), 22 Mayıs 2005

Kitap & Kitap Bölümleri

On the Android Malware Detection System Based on Deep Learning

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, D. Jude Hemanth , Utku Kose , Junzo Watada , Bogdan Patrut, Editör, Springer Cham, ss.453-466, 2023

A New Hybrid Method for Indoor Positioning

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.441-451, 2023

Collecting Health Information with LoRa Technology

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.429-439, 2023

Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler

NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., 2022

Havacılık Sistemlerinde Siber Güvenlik

Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., ss.293-324, 2022

A Review of Resource Allocation and Management Methods in IoT

A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems, Pardeep Kumar, Ahmed Jabbar Obaid, Korhan Cengiz, Ashish Khanna, Valentina Emilia Balas, Editör, Springer, Cham, ss.409-429, 2022

Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji

NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, 2021

Kafes Tabanlı Grup İmzalama Şemalarının Özellikleri Ve Değerlendirilmesi

Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, Sağıroğlu Şeref, Akleylek Sedat, Editör, Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti., Ankara, ss.491-541, 2021

Kuantum Bilgisayar Çağında Kriptosistemlere Bir Bakış

Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji, Sağıroğlu, Şeref, Akleylek, Sedat, Editör, Nobel, Ankara, ss.239-275, 2021

SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR

NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, 2020

Sis Bilişimi ve Uygulamalarında Veri Güvenliği

Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.1-28, 2020

Kafes Tabanlı Kriptografide Kullanılan Zor Problemlerin Kriptanalizi ve Yazılım Kütüphaneleri

SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.233-256, 2020

Lightweight Block Ciphers with Applications in IoT

Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.153-180, 2019

Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT

Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.181-207, 2019

Kuantum Bilgisayarlar ile Kriptoanaliz ve Kuantum Sonrası Güvenilir Kripto Sistemleri

Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, Ankara, ss.137-168, 2019

Kuantum Bilgisayarlar Sonrası Güvenilir Kafes Tabanlı Kriptosistem Temellerine Giriş

Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, ss.171-209, 2019

Metrikler

Yayın

201

Atıf (WoS)

314

H-İndeks (WoS)

9

Atıf (Scopus)

568

H-İndeks (Scopus)

12

Proje

29

Fikri Mülkiyet

3

Tez Danışmanlığı

13

Açık Erişim

15