Yayınlar & Eserler

SCI, SSCI ve AHCI İndekslerine Giren Dergilerde Yayınlanan Makaleler

Almost p-ary sequences

CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, cilt.12, ss.1057-1069, 2020 (SCI İndekslerine Giren Dergi) identifier identifier

A new lower bound on the family complexity of Legendre sequences

APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2020 (SCI İndekslerine Giren Dergi) identifier identifier

NEARLY PERFECT SEQUENCES WITH ARBITRARY OUT-OF-PHASE AUTOCORRELATION

ADVANCES IN MATHEMATICS OF COMMUNICATIONS, cilt.10, sa.2, ss.401-411, 2016 (SCI İndekslerine Giren Dergi) identifier identifier

Family complexity and cross-correlation measure for families of binary sequences

RAMANUJAN JOURNAL, cilt.39, sa.3, ss.639-645, 2016 (SCI İndekslerine Giren Dergi) identifier identifier

Improving results on the pseudorandomness of sequences generated via the additive order of a finite field

DISCRETE MATHEMATICS, cilt.338, sa.11, ss.2020-2025, 2015 (SCI İndekslerine Giren Dergi) identifier identifier

On some bounds on the minimum distance of cyclic codes over finite fields

Designs, Codes, and Cryptography, cilt.76, sa.2, ss.173-178, 2015 (SCI Expanded İndekslerine Giren Dergi) identifier identifier

Improved probabilistic decoding of interleaved Reed-Solomon codes and folded Hermitian codes

THEORETICAL COMPUTER SCIENCE, cilt.520, ss.111-123, 2014 (SCI İndekslerine Giren Dergi) identifier identifier

Diğer Dergilerde Yayınlanan Makaleler

Non-existence of Some Nearly Perfect Sequences, Near Butson–Hadamard Matrices, and Near Conference Matrices

Mathematics in Computer Science, cilt.12, sa.4, ss.465-471, 2018 (Diğer Kurumların Hakemli Dergileri)

Near Butson-Hadamard Matrices and Nonlinear Boolean Functions

Lecture Notes in Computer Science, 2018 (Diğer Kurumların Hakemli Dergileri)

Families of Pseudorandom Binary Sequences with Low Cross Correlation Measure

Lecture Notes in Computer Sciences, cilt.9024, ss.31-39, 2015 (Diğer Kurumların Hakemli Dergileri)

On Verification of Restricted Extended Affine Equivalence of Vectorial Boolean Functions

Lecture Notes in Computer Science, cilt.9061, ss.137-154, 2015 (Diğer Kurumların Hakemli Dergileri)

Classes of weak Dembowski-Ostrom polynomials for multivariate quadratic cryptosystems

Journal of Mathematical Cryptology, cilt.9, sa.1, ss.11-22, 2015 (Diğer Kurumların Hakemli Dergileri) identifier identifier

Hakemli Kongre / Sempozyum Bildiri Kitaplarında Yer Alan Yayınlar

Comparison of Randomized Solutions for Constrained Vehicle Routing Problem

2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020, İstanbul, Türkiye, 12 - 13 Haziran 2020 identifier

Ideal factorization method and its applications

3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, AMINSE 2017, Tbilisi, Gürcistan, 7 - 09 Aralık 2017, cilt.276, ss.149-160 identifier

Nearly Perfect Sequences and Cryptographic Functions

Workshop on Practical and Theoretical Aspects of Cryptography and Information Security, 08 Aralık 2017

Near Butson Hadamard Matrices with Small off diagonal Entries

3rd Istanbul Design Theory, Graph Theory and Combinatorics Workshop, 13 - 17 Haziran 2016

F11 üzerinde çok noktalı cebirsel eğriler

8. Ankara Matematik Günleri, Türkiye, 13 - 14 Haziran 2013, ss.94

RSA Kriptosistemi Parametreleri için Güvenlik Testi Yazılımı

6th International Conference on Information Security and Cryptology, Türkiye, 23 - 24 Mayıs 2013

Recent attacks against HFE Multi HFE MQ cryptosystems and Connection with Ore s p polynomial decomposition

6th International Conference on Information Security and Cryptology, Türkiye, 23 - 24 Mayıs 2013

Probabilistic Decoding of RS Codes with Extended BKY Algorithm

International Conference on Applied and Computational Mathematics, Ankara, Türkiye, 3 - 06 Ekim 2012

Kriptografik Modüllerin Güvenlik Gereksinimleri

III. International Conference on Information Security and Cryptology, Türkiye, 25 - 27 Aralık 2008, cilt.3, ss.253-256

On Algebraic Attacks Using Groebner Basis

II. Information Security and Cryptology Conference, Türkiye, 13 - 14 Aralık 2007, ss.312-318

PKI lite A PKI system with limited resources

II. International Conference on Information Security and Cryptology, Türkiye, 13 - 14 Aralık 2007, ss.59-62

DSA Sisteminin Çalıştırılması ve Test Edilmesi

II. Information Security and Cryptology Conference, Türkiye, 13 - 14 Aralık 2007, ss.290-297

Scalar multiplication on elliptic curves

II. National Conference on Cryptology, Türkiye, 15 - 17 Aralık 2006, ss.114-124

Ayrık Logaritma Problemini Kullanan E İmza

Ulusal Elektronik İmza Sempozyumu, Türkiye, 7 - 08 Aralık 2006, ss.381-386