Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security K Seyhan, TN Nguyen, S Akleylek, K Cengiz, SKH Islam Journal of Information Security and Applications 58, 102788, 2021 | 137 | 2021 |
An efficient lattice-based signature scheme with provably secure instantiation S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 112 | 2016 |
A survey on security threats and authentication approaches in wireless sensor networks A Karakaya, S Akleylek 2018 6th international symposium on digital forensic and security (ISDFS), 1-4, 2018 | 87 | 2018 |
A novel permission-based Android malware detection system using feature selection based on linear regression DÖ Şahin, OE Kural, S Akleylek, E Kılıç Neural Computing and Applications, 1-16, 2023 | 61 | 2023 |
LinRegDroid: Detection of Android malware using multiple linear regression models-based classifiers DÖ Şahın, S Akleylek, E Kiliç IEEE Access 10, 14246-14259, 2022 | 51 | 2022 |
New results on permission based static analysis for Android malware DÖ Şahın, OE Kural, S Akleylek, E Kiliç 2018 6th International symposium on digital forensic and security (ISDFS), 1-4, 2018 | 43 | 2018 |
qTESLA N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ... Submission to the NIST Post-Quantum Cryptography Standardization, 2017 | 43 | 2017 |
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey K Seyhan, TN Nguyen, S Akleylek, K Cengiz Cluster Computing 25 (3), 1729-1748, 2022 | 41 | 2022 |
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography MK Pehlivanoğlu, MT Sakallı, S Akleylek, N Duru, V Rijmen IET Information Security 12 (4), 348-355, 2018 | 34 | 2018 |
Şifrelerin matematiği: kriptografi C Çimen, S Akleylek, E Akyıldız ODTÜ, 2008 | 34 | 2008 |
Siber Güvenlik ve Savunma Ş Sağıroğlu, M Alkan, S Akleylek Ankara: Grafiker Yayınları, 2018 | 31 | 2018 |
A survey on security threats and solutions in the age of IoT C Atac, S Akleylek Avrupa Bilim ve Teknoloji Dergisi, 36-42, 2019 | 29 | 2019 |
A study on the use of quantum computers, risk assessment and security problems B Arslan, M Ulker, S Akleylek, S Sagiroglu 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018 | 29* | 2018 |
A novel Android malware detection system: adaption of filter-based feature selection methods DÖ Şahin, OE Kural, S Akleylek, E Kılıç Journal of Ambient Intelligence and Humanized Computing, 1-15, 2023 | 28 | 2023 |
On the efficiency of polynomial multiplication for lattice-based cryptography on GPUs using CUDA S Akleylek, Ö Dağdelen, Z Yüce Tok International Conference on Cryptography and Information Security in the …, 2015 | 27 | 2015 |
A probably secure bi-GISIS based modified AKE scheme with reusable keys S Akleylek, K Seyhan IEEE Access 8, 26210-26222, 2020 | 25 | 2020 |
Lattice-based digital signature scheme qTESLA N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ... NIST PQC project round 2, 2018 | 24* | 2018 |
Kriptoloji ve uygulama alanları: açık anahtar altyapısı ve kayıtlı elektronik posta S Akleylek, HM Yıldırım, ZY Tok Akademik Bilişim 11, 2-4, 2011 | 24 | 2011 |
Polynomial multiplication over binary fields using Charlier polynomial representation with low space complexity S Akleylek, M Cenk, F Özbudak Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 24* | 2010 |
Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji S Akleylek, Ş Sagiroglu, Enis, M Karakuş, K Seyhan, BB Kırlar, M Uğuz, ... Nobel Akademik Yayıncılık Eğitim Danışmanlık Tic. Ltd. Şti, 2021 | 23* | 2021 |