Stebėti
Halil Kemal Taşkın
Pavadinimas
Cituota
Cituota
Metai
Speeding up curve25519 using Toeplitz matrix-vector multiplication
HK Taşkin, M Cenk
Proceedings of the Fifth Workshop on Cryptography and Security in Computing …, 2018
132018
Improbable differential attacks on SERPENT using undisturbed bits
C Tezcan, HK Taşkın, M Demircioğlu
Proceedings of the 7th International Conference on Security of Information …, 2014
82014
TMVP-friendly primes for efficient elliptic curve cryptography
HK Taşkın, M Cenk
2020 International Conference on Information Security and Cryptology …, 2020
22020
Off-the-Record Communication with Location Hiding
HK Taskın, M Demircioglu
Information Security and Cryptology, Ankara, Turkey, 2013
22013
Security Analysis of the Encrypted Mobile Communication Applications
M Demircioglu, HK Taskın, S Sarımurat
1
Efficient implementation of TMVP-based prime field multiplication and its applications to ecc
HK Taşkın
PQDT-Global, 2019
2019
Kriptografik Algoritmaların Hızlı, Verimli ve Güvenli Gerçekleştirimi
HK Taşkin, HB Yünüak, M Cenk, K Muş, S Ali, M Demircioğlu
2018
Kuantum sonrası kriptografi
M Cenk, HK Taşkin, S Baloğlu, HB Yünüak, M Demircioğlu
2018
BOOLE FONKSİYONLARI, CEBIRSEL EĞRİLER VE AĞ KODLAMASI
F Özbudak, K Otal, Ç Çalık, E Tekin, N Koçak, HK Taşkin
2014
End-to-end Encrypted Communication Between Multi-device Users
HK Taskın, M Demircioglu, S Sarımurat
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–10