Publications & Works

Published journal articles indexed by SCI, SSCI, and AHCI

Articles Published in Other Journals

Refereed Congress / Symposium Publications in Proceedings

Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks

2023 16th International Conference on Information Security and Cryptology (ISCTürkiye), Turkey, 18 October 2023 identifier

Improving Performance in Space-Hard Algorithms

7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, Be'er-Sheva, Israel, 29 - 30 June 2023, vol.13914 LNCS, pp.398-410 identifier

Random Sequences in Vehicle Routing Problem

10th International Conference on Numerical Methods and Applications, NMA 2022, Borovets, Bulgaria, 22 - 26 August 2022, vol.13858 LNCS, pp.159-170 identifier

Verifiable Timed Commitments f or Fair Sealed-bid Auctions

1st IEEE International Conference on Cryptography, Informatics, and Cybersecurity, ICoCICs 2023, Hybrid, Bogor, Indonesia, 22 - 24 August 2023, pp.236-245 identifier

A General Version of Carlet’s Construction of APN Functions

ALGORITHMS IN CRYPTOGRAPHY AND BLOCKCHAIN: Special Session at the 27th International Conference on Applications of Computer Algebra (ACA’2022), İstanbul, Turkey, 15 - 19 August 2022, pp.187-188

Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf

15th International Conference on Information Security and Cryptography, ISCTURKEY 2022, Ankara, Turkey, 19 - 20 October 2022, pp.1-7 identifier

On the Number of Arithmetic Operations in NTT-based Polynomial Multiplication in Kyber and Dilithium Cryptosystems

14th International Conference on Security of Information and Networks (SIN), ELECTR NETWORK, 15 - 17 December 2021 identifier identifier

PSO based Blockchain Committee Member Selection

6th International Conference on Computer Science and Engineering, UBMK 2021, Ankara, Turkey, 15 - 17 September 2021, pp.725-730 identifier

Implementation Analysis of Cryptography Toolbox in Hyperledger

14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Turkey, 2 - 03 December 2021, pp.179-184 identifier

Comparison of Randomized Solutions for Constrained Vehicle Routing Problem

2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020, İstanbul, Turkey, 12 - 13 June 2020 identifier

Three-Weight Minimal Linear Codes and Their Applications

Second International Workshop on Cryptography and itsApplications, Oran, Algeria, 18 - 19 June 2019

Ideal factorization method and its applications

3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, AMINSE 2017, Tbilisi, Georgia, 7 - 09 December 2017, vol.276, pp.149-160 identifier

Nearly Perfect Sequences and Cryptographic Functions

Workshop on Practical and Theoretical Aspects of Cryptography and Information Security, 08 December 2017

Near Butson Hadamard Matrices with Small off diagonal Entries

3rd Istanbul Design Theory, Graph Theory and Combinatorics Workshop, 13 - 17 June 2016

F11 üzerinde çok noktalı cebirsel eğriler

8. Ankara Matematik Günleri, Turkey, 13 - 14 June 2013, pp.94

Recent attacks against HFE Multi HFE MQ cryptosystems and Connection with Ore s p polynomial decomposition

6th International Conference on Information Security and Cryptology, Turkey, 23 - 24 May 2013

RSA Kriptosistemi Parametreleri için Güvenlik Testi Yazılımı

6th International Conference on Information Security and Cryptology, Turkey, 23 - 24 May 2013

Probabilistic Decoding of RS Codes with Extended BKY Algorithm

International Conference on Applied and Computational Mathematics, Ankara, Turkey, 3 - 06 October 2012

Nonexistence of certain almost p-ary perfect sequences

7th International Conference on Sequences and Their Applications, SETA 2012, Waterloo, ON, Canada, 4 - 08 June 2012, vol.7280 LNCS, pp.13-24 identifier

Kriptografik Modüllerin Güvenlik Gereksinimleri

III. International Conference on Information Security and Cryptology, Turkey, 25 - 27 December 2008, vol.3, pp.253-256

PKI lite A PKI system with limited resources

II. International Conference on Information Security and Cryptology, Turkey, 13 - 14 December 2007, pp.59-62

On Algebraic Attacks Using Groebner Basis

II. Information Security and Cryptology Conference, Turkey, 13 - 14 December 2007, pp.312-318

DSA Sisteminin Çalıştırılması ve Test Edilmesi

II. Information Security and Cryptology Conference, Turkey, 13 - 14 December 2007, pp.290-297

Scalar multiplication on elliptic curves

II. National Conference on Cryptology, Turkey, 15 - 17 December 2006, pp.114-124

Ayrık Logaritma Problemini Kullanan E İmza

Ulusal Elektronik İmza Sempozyumu, Turkey, 7 - 08 December 2006, pp.381-386

Expert Reports

Kripto varlıkların durumu

11. Ağır Ceza Mahkemesi, pp.9, Gaziantep, 2022

Metrics

Publication

51

Citation (WoS)

13

H-Index (WoS)

3

Citation (Scopus)

20

H-Index (Scopus)

3

Citiation (TrDizin)

1

H-Index (TrDizin)

1

Project

8

Thesis Advisory

15

Open Access

9