SCI, SSCI ve AHCI İndekslerine Giren Dergilerde Yayınlanan Makaleler
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
IEEE ACCESS
, cilt.12, ss.1672-1687, 2024 (SCI-Expanded)
Modified graph-based algorithm to analyze security threats in IoT
PEERJ COMPUTER SCIENCE
, cilt.9, ss.1-22, 2023 (SCI-Expanded)
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
, cilt.26, sa.2, ss.865-878, 2023 (SCI-Expanded)
A novel Android malware detection system: adaption of filter-based feature selection methods
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
, cilt.14, ss.1243-1257, 2023 (SCI-Expanded)
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
Journal of King Saud University - Computer and Information Sciences
, cilt.34, sa.10, ss.9852-9866, 2022 (SCI-Expanded)
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
, cilt.25, sa.3, ss.1729-1748, 2022 (SCI-Expanded)
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES
, cilt.28, sa.1, ss.275-287, 2020 (SCI-Expanded)
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
, cilt.E96A, sa.10, ss.2016-2024, 2013 (SCI-Expanded)
Diğer Dergilerde Yayınlanan Makaleler
NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA
Mühendislik Bilimleri ve Tasarım Dergisi
, cilt.8, sa.5, ss.80-89, 2020 (Hakemli Dergi)
Parola Tabanlı SIMSec Protokolü
Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi
, cilt.11, sa.3, ss.1021-1030, 2020 (Hakemli Dergi)
JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES
Journal of Modern Technology and Engineering
, cilt.5, sa.1, ss.5-17, 2020 (Hakemli Dergi)
Efficient GeMSS Based Ring Signature Scheme
Malaysian Journal of Computing and Applied Mathematics
, cilt.3, sa.2, 2020 (Hakemli Dergi)
New Signature Algorithm Based on Concatenated Rank Codes
Malaysian Journal of Computing and Applied Mathematics
, cilt.2, sa.2, ss.25-31, 2019 (Hakemli Dergi)
İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması
Bilgisayar Bilimleri ve Mühendisliği Dergisi
, cilt.12, sa.1, ss.47-59, 2019 (Hakemli Dergi)
IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma
Avrupa Bilim ve Teknoloji Dergisi
, cilt.15, ss.36-42, 2019 (Hakemli Dergi)
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
Journal of Telecommunications and Information Technology
, cilt.5, sa.1, ss.5-11, 2011 (Hakemli Dergi)
Open Source UTM Alternative ClearOS
Proceeding of the third International Conference “Problems of Cybernetics and Informatics, PCI’ 2010
, cilt.1, ss.211-212, 2010 (Hakemli Dergi)
A modified algorithm for peer-to-peer security
Applied and Computational Mathematics
, cilt.7, sa.1, ss.1-14, 2007 (Hakemli Dergi)
Hakemli Kongre / Sempozyum Bildiri Kitaplarında Yer Alan Yayınlar
Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc)
Intermediate and Advanced Course on Post-Quantum Cryptography, Baku, Azerbaycan, 5 - 10 Eylül 2022
Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları
3. Kuantum Sonrası Kriptografi Çalıştayı, Türkiye, 29 - 30 Mart 2022
On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m
ICNDA 2022 International Conference on Nonlinear Dynamics and Applications, Majitar, Hindistan, 9 - 12 Mart 2022
Challenges and Opportunities in Cryptography
The 6th International Conference of Reliable Information and Communication Technology, Suudi Arabistan, 22 - 23 Aralık 2021
Efficient GeMSS Based Ring Signature Scheme
The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Cezayir, 18 - 19 Haziran 2019
GUI Based Ring Signature Scheme
18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakya, 6 - 08 Haziran 2018, ss.1-3
On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography
3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, 6 - 09 Aralık 2017, cilt.3, ss.70-73
Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow
The 3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, Tiflis, Gürcistan, 6 - 09 Aralık 2017, cilt.3, ss.68
A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale
8 th International Advanced Technologies Sympoium, Elazığ, Türkiye, 19 - 22 Ekim 2017, ss.3733-3738
Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması
10th International Conference on Information Security and Cryptology, 20 - 21 Ekim 2017, cilt.10, ss.1-7
Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology
International Conference on Theoretical and Application Problems of Mathematics, 25 - 26 Mayıs 2017, cilt.1, ss.21
Some Results on MDS Matrices
9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.35
Speeding up Number Theoretic Transform Lazy Reductions Explained
9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.9, ss.115-119
A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks
International Conference on Computer Science and Engineering, Türkiye, 20 - 23 Ekim 2016, cilt.75
Efficient Methods for Lattice based Cryptography
The 5th International Workshop on Cryptography and its Applications - IWCA’ 2016, Cezayir, 26 - 27 Nisan 2016
Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography
3rd International Conference on “Converging Technologies & Management (CTM-2016), Hindistan, 1 - 02 Nisan 2016
Post Quantum Cryptography An Introduction
3rd INTERNATIONAL CONFERENCE ON CONVERGENCE TECHNOLOGY MANAGEMENT (CTM-2016), Hindistan, 1 - 02 Nisan 2016
Arithmetic Operations in Lattice Based Cryptography
International Scientific Conference of Students and Young Scientists Theoretical and Applied Aspects of Cybernetics, Kiev, Ukrayna, 23 - 27 Kasım 2015
Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta
Akademik Bilişim 2011, Malatya, Türkiye, 2 - 04 Şubat 2011, ss.723-728
Open Source UTM Alternative ClearOS
Proceeding of the third International Conference “Problems of Cybernetics and Informatics, 08 Eylül 2010
Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers
Information Security and Cryptology Conference, 13 - 15 Aralık 2007, ss.157-163
A note on Knapsack Cryptosystems
International scientific conference “Information Technologies and Telecommunications in Education and Science, 06 Ekim 2007
Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye
Proceeding of the 3-th International conference on Information Technologies and Telecommunication (IT T C 2007), 06 Ekim 2007
Securty of online Learning
International scientific conference “Information Technologies and Telecommunications in Education and Science” (IT T ES’2005), 22 Mayıs 2005
Kitap & Kitap Bölümleri
A New Hybrid Method for Indoor Positioning
Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.441-451, 2023
Collecting Health Information with LoRa Technology
Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.429-439, 2023
Kafes Tabanlı Grup İmzalama Şemalarının Özellikleri Ve Değerlendirilmesi
Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, Sağıroğlu Şeref, Akleylek Sedat, Editör, Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti., Ankara, ss.491-541, 2021
Kafes Tabanlı Kriptografide Kullanılan Zor Problemlerin Kriptanalizi ve Yazılım Kütüphaneleri
SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.233-256, 2020
Lightweight Block Ciphers with Applications in IoT
Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.153-180, 2019
Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.181-207, 2019
Kuantum Bilgisayarlar ile Kriptoanaliz ve Kuantum Sonrası Güvenilir Kripto Sistemleri
Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, Ankara, ss.137-168, 2019
Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi)
PALME YAYINCILIK, Ankara, 2017
Şifrelerin Matematiği Kriptografi
ODTÜ Geliştirme Vakfı Yayıncılık, 2015