关注
Kübra Seyhan
Kübra Seyhan
Ondokuz Mayis University, Department of Computer Engineering
在 bil.omu.edu.tr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam
Journal of Information Security and Applications 58, 102788, 2021
1462021
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
K Seyhan, TN Nguyen, S Akleylek, K Cengiz
Cluster Computing 25 (3), 1729-1748, 2022
472022
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
S Akleylek, K Seyhan
IEEE Access 8, 26210-26222, 2020
262020
Classification of random number generator applications in IoT: A comprehensive taxonomy
K Seyhan, S Akleylek
Journal of Information Security and Applications 71, 103365, 2022
162022
A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE
K Seyhan, S Akleylek
The Journal of Supercomputing, 17859–17896, 2023
72023
Module Learning with Rounding Based Key Agreement Scheme with Modified Reconciliation
S Akleylek, K Seyhan
Computer Standards & Interfaces 79, 103549, 2022
72022
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
S Basu, K Seyhan, SKH Islam, S Akleylek
IEEE Systems Journal, 2023
62023
Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme
S Akleylek, K Seyhan
62018
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
K Seyhan, S Akleylek
PeerJ Computer Science 9, e1391, 2023
32023
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
K Seyhan, S Akleylek
PeerJ Computer Science 10, e1791, 2024
22024
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices
AF Dursun, K Seyhan, S Akleylek
2022 15th International Conference on Information Security and Cryptography …, 2022
22022
Kuantum bilgisayarlar sonrası güvenilir kafes tabanlı kriptosistem temellerine giriş
S Akleylek, K Seyhan
Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık 2, 171-209, 2019
22019
Password authenticated key exchange-based on Kyber for mobile devices
K Seyhan, S Akleylek, AF Dursun
PeerJ Computer Science 10, e1960, 2024
12024
Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols
S Akleylek, K Seyhan
2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019
12019
Smaug Kem to Smaug-PAKE: A Generic Lattice-Based Password Authenticated Key Exchange
K Seyhan, S Akleylek
Central European Conference on Cryptology CECC-2024, 1-4, 2024
2024
A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules
K Seyhan, S Akleylek
2nd International Conference on Information Technologies and Their …, 2024
2024
Post-quantum password authenticated key exchange schemes and their primitives for resource-constrained devices
K Seyhan
Ondokuz Mayıs Üniversitesi Lisansüstü Eğitim Enstitüsü, 2024
2024
QUANTUM SECURE INSTANT MESSAGING: REVISITED
AF Dursun, K Seyhan, BK Aydın, S Akleylek
INFORMATION SECURITY: PROBLEMS AND PROSPECTS, 42, 2022
2022
Kuantum sonrası güvenli yeni anahtar değişim protokolü
K Seyhan, S Akleylek, E Kılıç, Y Oruç
TR Patent App. 2020/22,849, 2022
2022
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications
AF Dursun, K Seyhan, S Akleylek
International Conference on Science, Engineering Management and Information …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20