Speeding up curve25519 using Toeplitz matrix-vector multiplication HK Taşkin, M Cenk Proceedings of the Fifth Workshop on Cryptography and Security in Computing …, 2018 | 13 | 2018 |
Improbable differential attacks on SERPENT using undisturbed bits C Tezcan, HK Taşkın, M Demircioğlu Proceedings of the 7th International Conference on Security of Information …, 2014 | 8 | 2014 |
TMVP-friendly primes for efficient elliptic curve cryptography HK Taşkın, M Cenk 2020 International Conference on Information Security and Cryptology …, 2020 | 2 | 2020 |
Off-the-Record Communication with Location Hiding HK Taskın, M Demircioglu Information Security and Cryptology, Ankara, Turkey, 2013 | 2 | 2013 |
Security Analysis of the Encrypted Mobile Communication Applications M Demircioglu, HK Taskın, S Sarımurat | 1 | |
Efficient implementation of TMVP-based prime field multiplication and its applications to ecc HK Taşkın PQDT-Global, 2019 | | 2019 |
Kriptografik Algoritmaların Hızlı, Verimli ve Güvenli Gerçekleştirimi HK Taşkin, HB Yünüak, M Cenk, K Muş, S Ali, M Demircioğlu | | 2018 |
Kuantum sonrası kriptografi M Cenk, HK Taşkin, S Baloğlu, HB Yünüak, M Demircioğlu | | 2018 |
BOOLE FONKSİYONLARI, CEBIRSEL EĞRİLER VE AĞ KODLAMASI F Özbudak, K Otal, Ç Çalık, E Tekin, N Koçak, HK Taşkin | | 2014 |
End-to-end Encrypted Communication Between Multi-device Users HK Taskın, M Demircioglu, S Sarımurat | | |