Yazar "Akleylek, Sedat" için listeleme
-
A Bayesian Network Application in Occupational Health and Safety
Pekel, Ebru; Aksehir, Z. Duygu; Meto, Bilal; Akleylek, Sedat; Kilic, Erdal (Ieee, 2018)With the development of technology, there has been an increase in production and the number of accidents has increased. Progressive technology, the development of the industry and the lack of protective precaution, and the ... -
Çok değişkenli polinom sistemlerine dayalı kuantum bilgisayarlar sonrası güvenilir yeni kimlik doğrulama ve imzalama şemaları / Meryem Soysaldı ; Danışman Sedat Akleylek.
Soysaldı, Meryem (Ondokuz Mayıs Üniversitesi, Fen Bilimleri Enstitüsü, 2018)… -
Efficient Arithmetic For Lattice-Based Cryptography on Gpu Using the Cuda Platform
Akleylek, Sedat; Tok, Zaliha Yuce (Ieee, 2014)The demand to lattice-based cryptographic schemes has been inreasing. Due to processing unit having multiple processors, there is a need to implements such protocols on these platforms. Graphical processing units (GPU) ... -
Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
Akleylek, Sedat; Tok, Zaliha Yuce (Ieice-Inst Electronics Information Communications Eng, 2014)In this paper, we give modified version of interleaved Montgomery modular multiplication method for lattice-based cryptography. With the proposed algorithms, we improve the multiplication complexity and embed the conversion ... -
Efficient methods to generate cryptographically significant binary diffusion layers
Akleylek, Sedat; Rijmen, Vincent; Sakalli, Muharrem Tolga; Ozturk, Emir (Inst Engineering Technology-Iet, 2017)In this study, the authors propose new methods using a divide-and-conquer strategy to generate n x n binary matrices ( for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. ... -
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-quantum Era
Lee, Wai-Kong; Goi, Bok-Min; Wong, Denis Chee-Keong; Yap, Wun-She; Akleylek, Sedat (Ieee, 2018)Internet of People involves a lot of data collection and analysis on human activities, which can pose serious privacy and security issues. Public key cryptography is widely used to securely send secret keys from sensor ... -
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
Pehlivanoglu, Meltem Kurt; Sakalli, Muharrem Tolga; Akleylek, Sedat; Duru, Nevcihan; Rijmen, Vincent (Inst Engineering Technology-Iet, 2018)In this study, the authors generalise Hadamard matrix over F-2m and propose a new form of Hadamard matrix, which they call generalised Hadamard (GHadamard) matrix. Then, they focus on generating lightweight (involutory) ... -
Generating binary diffusion layers with maximum/high branch numbers and low search complexity
Akleylek, Sedat; Sakalli, Muharrem Tolga; Ozturk, Emir; Mesut, Andac Sahin; Tuncay, Gokhan (Wiley-Hindawi, 2016)In this paper, we propose a new method to generate n x n binary matrices (for n = k . 2(t) where k and t are positive integers) with a maximum/high of branch numbers and a minimum number of fixed points by using 2(t) x ... -
Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form
In this paper, hardware efficient diffusion layers are generated. Non-involutory and new 8x8 MDS matrices over GF(2(8)) with the best-known XOR counts are constructed by using a new matrix form, which is developed by ... -
IoT güvenliği için kullanılan makine öğrenimi ve derin öğrenme modelleri üzerine bir derleme
Satılmış, Hami; Akleylek, Sedat (Gazi Üniversitesi, 2021)Nesnelerin internetini (internet of things - IoT) oluşturan cihazlar ve bu cihazları birbirine bağlayan ağlar hızlı bir şekilde yaygınlaşmaktadır ve evrim geçirmektedir. Buna paralel olarak, IoT cihazlarına ve ağlarına ... -
İkinci dereceden çok değişkenli polinom sistemlerine dayanan imzalama algoritmalarının bileşenlerinin analizi ve açık kaynak kodlu uygulamaları / Emre Engin; tez danışmanı Sedat Akleylek
Engin, Emre (Ondokuz Mayıs Üniversitesi, Fen Bilimleri Enstitüsü, 2017)… -
Kafes tabanlı yeni anahtar değişim protokolleri ve verimli polinom çarpımı / Nurşah Kaya ; Danışman Sedat Akleylek.
Kaya, Nurşah (Ondokuz Mayıs Üniversitesi, Fen Bilimleri Enstitüsü, 2018)… -
Kriptografik modül içeren cihazların güvenlik gereksinimleri / Halil Karaalan ; Danışman Sedat Akleylek.
Karaalan, Halil (Ondokuz Mayıs Üniversitesi, Fen Bilimleri Enstitüsü, 2014)… -
MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU
Akleylek, Sedat; Cevik, Nursah (Wiley, 2020)Quantum attack-resistant cryptosystems are required for secure communication since there is a big demand to have quantum computers. Lattice-based cryptography is one of the quantum-secure families due to its key/ciphertext ... -
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
Alkim, Erdem; Akleylek, Sedat; Kilic, Erdal (World Scientific Publ Co Pte Ltd, 2017)In this study a modified learning vector quantization (LVQ) algorithm is proposed. For this purpose, relevance LVQ (RLVQ) algorithm is effciently combined with a reinforcement mechanism. In this mechanism, it is shown that ... -
Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity
Akleylek, Sedat; Ozbudak, Ferruh (Ieee Computer Soc, 2012)We give a modified redundant representation for designing arithmetic circuits with small complexity. Using our modified redundant representation, we improve many of the complexity values significantly. Our method works for ... -
Multiplication in a Galois Ring
Akleylek, Sedat; Ozbudak, Ferruh (Ieee, 2015)In this paper, we focus on the efficient multiplication in a Galois ring of the size 4(n), where n is a positive integer. We consider to adapt the finite field multiplication methods to the Galois ring multiplication. We ... -
A new matrix form to generate all 3 x 3 involutory MDS matrices over F-2(m)
Guzel, Gulsum Gozde; Sakalli, Muharrem Tolga; Akleylek, Sedat; Rijmen, Vincent; Cengellenmis, Yasemin (Elsevier Science Bv, 2019)In this paper, we propose a new matrix form to generate all 3 x 3 involutory and MDS matrices over F-2(m) and prove that the number of all 3 x 3 involutory and MDS matrices over F-2(m) is (2(m) - 1)(2) . (2(m) - 2) . (2(m) ... -
New methods for public key cryptosystems based on XTR
Akleylek, Sedat; Kirlar, Baris Bulent (Wiley-Hindawi, 2015)In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes based on an effective and compact subgroup trace representation cryptosystem to handle with the problem of secure and efficient ... -
New Quantum Secure Key Exchange Protocols Based on MaTRU
Akleylek, Sedat; Kaya, Nursah (Ieee, 2018)In this paper, we propose two new quantum secure key exchange protocols based on MaTRU. These protocols differ on the key agreement phase. They use ephemeral keys, i.e., they satisfy perfect forward secrecy property. We ...