Search Results - "Seker, Okan"
-
1
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Published in IACR transactions on cryptographic hardware and embedded systems (23-02-2021)“…White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are…”
Get full text
Journal Article -
2
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Published in IACR transactions on cryptographic hardware and embedded systems (31-08-2023)“…The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and…”
Get full text
Journal Article -
3
Side-Channel Protections for Picnic Signatures
Published in IACR transactions on cryptographic hardware and embedded systems (11-08-2021)“…We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC…”
Get full text
Journal Article -
4
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Published in IACR transactions on cryptographic hardware and embedded systems (01-08-2018)“…Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied…”
Get full text
Journal Article -
5
-
6
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Published in IACR transactions on cryptographic hardware and embedded systems (16-08-2018)“…Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied…”
Get full text
Journal Article -
7
Küçük değişim: Devrim neden tweetlenmeyecek?
Published in Etkileşim (01-10-2020)Get full text
Journal Article -
8
Big Data’yı anlamak: verinin bilgiye dönüşümünde ekonomik gözetim: Amazon örneği
Published in Uluslararası Medya ve İletişim Araştırmaları Hakemli Dergisi - MEDIAJ (01-01-2022)“…Bu çalışmada yeni medya ortamlarında, veri paylaşımının artmasıyla ortaya çıkan Big Data’nın (Büyük Veri) toplanması, işlenmesi ve kullanılama sunulması…”
Get full text
Journal Article -
9
On The Success Probabilities Of Differential Attacks On Present
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (01-01-2016)“…Advanced growth in ubiquitous devices leads to increasing popularity of lightweight cryptography and as a result, various block ciphers are designed. The…”
Get full text
Journal Article -
10
A Randomness Test Based on Postulate R-2 on the Number of Runs
Published 01-01-2014“…Random values are considered as an indispensable part of cryptography, since they are necessary for almost all cryptographic protocols. Most importantly, key…”
Get full text
Dissertation -
11
Elon Musk: geleceğin dahilerine / Ashlee Vance ; çevirmen, Ali Atav ; editör, Ahmet Okan Şeker
Published 2018“…2017 Kasım’ında ElonMusk Ankara’ya geldi ve Anıtkabir’i ziyareti esnasında çektiği fotoğrafı şu sözlerle paylaştı: “Üç kırık kaburga, delik bir akciğer ve yine…”
Get more information
Book -
12
Suriyeli mültecilerin değişen toplumsal cinsiyet rolleri
Published in 21. Yüzyılda Eğitim ve Toplum (2019)“…Bu araştırmada ülkelerinden iç savaş nedeniyle kaçıp Türkiye’ye sığınan Suriyeli mültecilerin göç süreci boyunca başlayan ve daha sonrasında değişentoplumsal…”
Get full text
Journal Article