Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 146 | 2021 |
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 47 | 2022 |
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys S Akleylek, K Seyhan IEEE Access 8, 26210-26222, 2020 | 26 | 2020 |
Classification of random number generator applications in IoT: A comprehensive taxonomy K Seyhan, S Akleylek Journal of Information Security and Applications 71, 103365, 2022 | 16 | 2022 |
A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE K Seyhan, S Akleylek The Journal of Supercomputing, 17859–17896, 2023 | 7 | 2023 |
Module Learning with Rounding Based Key Agreement Scheme with Modified Reconciliation S Akleylek, K Seyhan Computer Standards & Interfaces 79, 103549, 2022 | 7 | 2022 |
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication S Basu, K Seyhan, SKH Islam, S Akleylek IEEE Systems Journal, 2023 | 6 | 2023 |
Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme S Akleylek, K Seyhan | 6 | 2018 |
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism K Seyhan, S Akleylek PeerJ Computer Science 9, e1391, 2023 | 3 | 2023 |
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key K Seyhan, S Akleylek PeerJ Computer Science 10, e1791, 2024 | 2 | 2024 |
Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices AF Dursun, K Seyhan, S Akleylek 2022 15th International Conference on Information Security and Cryptography …, 2022 | 2 | 2022 |
Kuantum bilgisayarlar sonrası güvenilir kafes tabanlı kriptosistem temellerine giriş S Akleylek, K Seyhan Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık 2, 171-209, 2019 | 2 | 2019 |
Password authenticated key exchange-based on Kyber for mobile devices K Seyhan, S Akleylek, AF Dursun PeerJ Computer Science 10, e1960, 2024 | 1 | 2024 |
Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols S Akleylek, K Seyhan 2019 4th International Conference on Computer Science and Engineering (UBMK …, 2019 | 1 | 2019 |
Smaug Kem to Smaug-PAKE: A Generic Lattice-Based Password Authenticated Key Exchange K Seyhan, S Akleylek Central European Conference on Cryptology CECC-2024, 1-4, 2024 | | 2024 |
A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules K Seyhan, S Akleylek 2nd International Conference on Information Technologies and Their …, 2024 | | 2024 |
Post-quantum password authenticated key exchange schemes and their primitives for resource-constrained devices K Seyhan Ondokuz Mayıs Üniversitesi Lisansüstü Eğitim Enstitüsü, 2024 | | 2024 |
QUANTUM SECURE INSTANT MESSAGING: REVISITED AF Dursun, K Seyhan, BK Aydın, S Akleylek INFORMATION SECURITY: PROBLEMS AND PROSPECTS, 42, 2022 | | 2022 |
Kuantum sonrası güvenli yeni anahtar değişim protokolü K Seyhan, S Akleylek, E Kılıç, Y Oruç TR Patent App. 2020/22,849, 2022 | | 2022 |
End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications AF Dursun, K Seyhan, S Akleylek International Conference on Science, Engineering Management and Information …, 2022 | | 2022 |