Advising Theses
-
Cryptographic Misuse Detection Tools
E.SELİN(Student), Postgraduate, 2021 -
Zero knowledge range proofs and applications on decentralized constructions
E.GÜNSAY(Student), Postgraduate, 2021 -
ANALYSIS AND IMPLEMENTATION OF BINARY POLYNOMIAL MULTIPLICATION
M.ACHIENG(Student), Postgraduate, 2021 -
Efficient implementation of lattice-based schemes
-
A PUF-BASED LIGHTWEIGHT GROUP AUTHENTICATION AND KEY DISTRIBUTION PROTOCOL
Onur E. (Consultant) , CENK M. (Co-Consultant)
H.YILDIZ(Student), Doctorate, 2020 -
High performance number theoretic transforms in cryptography
-
Decentralized secure multiparty computation
-
Quantum-resistant multivariate quadratic systems and digital signatures
-
Secure cloud storage with attribute based encryption
-
A Survey on cryptographic protocols using pairing-based cryptography
-
Quantum safe digital signatures from symmetric key primitives
-
Efficient implementation of TMVP-based prime field multiplication and its applications to ecc
-
Large sparse matrix-vector multiplication over finite fields
-
Homomorphic encryption for data security in cloud computing
-
Faster residue multiplication modulo 521-bit mersenne prime and application to ecc
-
Modular exponentiation methods in cryptography
-
Homomorphic encryption based on the Ring Learning with Errors (RLWE) problem
-
Modular expoentiation methods in cryptography
H.BARTU(Student), Postgraduate, 2017 -
On verifiable internet voting systems
-
An analysis on efficient polynomial multiplication algorithms for cryptographic purposes
-
Analysis of recent attacks on SSL/TLS protocols
-
On the efficient implementation of RSA