default search action
Ali Aydin Selçuk
Person information
- affiliation: TOBB University of Economics and Technology, Ankara, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Murat Burhan Ilter, Ali Aydin Selçuk:
MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE. Turkish J. Electr. Eng. Comput. Sci. 32(1): 183-197 (2024) - 2022
- [j18]Murat Osmanoglu, Ali Aydin Selçuk:
Privacy in blockchain systems. Turkish J. Electr. Eng. Comput. Sci. 30(2): 344-360 (2022) - [j17]Muhammet Bugra Torusdag, Mücahid Kutlu, Ali Aydin Selçuk:
Evaluation of social bot detection models. Turkish J. Electr. Eng. Comput. Sci. 30(4): 1269-1283 (2022) - [c25]Murat Burhan Ilter, Ali Aydin Selçuk:
MILP-Aided Cryptanalysis of the FUTURE Block Cipher. SecITC 2022: 153-167 - [i10]Murat Burhan Ilter, Ali Aydin Selçuk:
MILP-aided Cryptanalysis of the FUTURE Block Cipher. IACR Cryptol. ePrint Arch. 2022: 1398 (2022) - 2021
- [c24]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
In-Browser Cryptomining for Good: An Untold Story. DAPPS 2021: 20-29 - [c23]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. EuroS&P 2021: 120-139 - [c22]Murat Burhan Ilter, Ali Aydin Selçuk:
A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE. SECRYPT 2021: 420-427 - [c21]Ilayda Gündoüdu, Ali Aydin Selçuk, Süleyman Özarslan:
Effectiveness Analysis of Public Rule Sets Used in Snort Intrusion Detection System. SIU 2021: 1-4 - [i9]Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selçuk:
SoK: Cryptojacking Malware. CoRR abs/2103.03851 (2021)
2010 – 2019
- 2018
- [j16]Emre Yüce, Ali Aydin Selçuk:
Server notaries: a complementary approach to the web PKI trust model. IET Inf. Secur. 12(5): 455-461 (2018) - [j15]Muhammed Fatih Balli, Suleyman Uludag, Ali Aydin Selçuk, Bülent Tavli:
Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response Programs. IEEE Trans. Smart Grid 9(5): 4119-4127 (2018) - [c20]Gamze Akman, Ali Aydin Selçuk:
Usability of authentication mechanisms in secure messaging applications. SIU 2018: 1-4 - [i8]Ali Aydin Selçuk:
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2018: 478 (2018) - 2017
- [c19]Ali Aydin Selçuk, Fatih Orhan, Berker Batur:
Undecidable problems in malware analysis. ICITST 2017: 494-497 - 2016
- [j14]Cihangir Tezcan, Ali Aydin Selçuk:
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited. Inf. Process. Lett. 116(2): 136-143 (2016) - [j13]Oguzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk, Emin Anarim:
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries. Secur. Commun. Networks 9(17): 4416-4427 (2016) - [i7]Emre Yüce, Ali Aydin Selçuk:
Server Notaries: A Complementary Approach to the Web PKI Trust Model. IACR Cryptol. ePrint Arch. 2016: 126 (2016) - 2015
- [j12]Murat Ak, Ali Aydin Selçuk:
Punctured interval broadcast encryption scheme with free riders. Inf. Sci. 305: 285-301 (2015) - [j11]Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. Knowl. Inf. Syst. 45(3): 589-615 (2015) - [c18]Suleyman Uludag, Muhammed Fatih Balli, Ali Aydin Selçuk, Bülent Tavli:
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs. GLOBECOM Workshops 2015: 1-6 - 2014
- [j10]Kamer Kaya, Ali Aydin Selçuk:
Sharing DSS by the Chinese Remainder Theorem. J. Comput. Appl. Math. 259: 495-502 (2014) - [j9]Murat Ak, Turgut Hanoymak, Ali Aydin Selçuk:
IND-CCA secure encryption based on a Zheng-Seberry scheme. J. Comput. Appl. Math. 259: 529-535 (2014) - [j8]Murat Ak, Serdar Pehlivanoglu, Ali Aydin Selçuk:
Anonymous trace and revoke. J. Comput. Appl. Math. 259: 586-591 (2014) - 2013
- [c17]Ali Aydin Selçuk:
Trusting SSL in practice. SIN 2013: 15 - [i6]Ali Aydin Selçuk, Ramazan Yilmaz:
Joint Compartmented Threshold Access Structures. IACR Cryptol. ePrint Arch. 2013: 54 (2013) - 2012
- [j7]Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk:
GLP: A cryptographic approach for group location privacy. Comput. Commun. 35(12): 1527-1533 (2012) - [i5]Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk:
Generic Construction of Trace and Revoke Schemes. IACR Cryptol. ePrint Arch. 2012: 531 (2012) - 2010
- [j6]Murat Ak, Kamer Kaya, Kaan Onarlioglu, Ali Aydin Selçuk:
Efficient broadcast encryption with user profiles. Inf. Sci. 180(6): 1060-1072 (2010) - [i4]Kamer Kaya, Ali Aydin Selçuk:
Secret Sharing Extensions based on the Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2010: 96 (2010)
2000 – 2009
- 2009
- [j5]Murat Ak, Kamer Kaya, Ali Aydin Selçuk:
Optimal subset-difference broadcast encryption with free riders. Inf. Sci. 179(20): 3673-3684 (2009) - [c16]Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk:
Practical Threshold Signatures with Linear Secret Sharing Schemes. AFRICACRYPT 2009: 167-178 - [i3]Ali Aydin Selçuk, Kerem Kaskaloglu, Ferruh Özbudak:
On Hierarchical Threshold Secret Sharing. IACR Cryptol. ePrint Arch. 2009: 450 (2009) - 2008
- [j4]Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:
A Reputation-based Trust Management System for P2P Networks. Int. J. Netw. Secur. 6(2): 227-237 (2008) - [j3]Ali Aydin Selçuk:
On Probability of Success in Linear and Differential Cryptanalysis. J. Cryptol. 21(1): 131-147 (2008) - [c15]Kamer Kaya, Ali Aydin Selçuk:
Robust Threshold Schemes Based on the Chinese Remainder Theorem. AFRICACRYPT 2008: 94-108 - [c14]Hüseyin Demirci, Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES. FSE 2008: 116-126 - [c13]Kamer Kaya, Ali Aydin Selçuk:
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. INDOCRYPT 2008: 414-425 - [i2]Murat Ak, Kamer Kaya, Ali Aydin Selçuk:
Optimal Subset-Difference Broadcast Encryption with Free Riders. IACR Cryptol. ePrint Arch. 2008: 389 (2008) - [i1]Kamer Kaya, Ali Aydin Selçuk:
Sharing DSS by the Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2008: 483 (2008) - 2007
- [j2]Kamer Kaya, Ali Aydin Selçuk:
Threshold cryptography based on Asmuth-Bloom secret sharing. Inf. Sci. 177(19): 4148-4160 (2007) - 2006
- [c12]Kamer Kaya, Ali Aydin Selçuk, Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing. ISCIS 2006: 935-942 - [c11]Hüseyin Acan, Kamer Kaya, Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols. ISCIS 2006: 943-951 - [c10]Eyüp Serdar Ayaz, Ali Aydin Selçuk:
Improved DST Cryptanalysis of IDEA. Selected Areas in Cryptography 2006: 1-14 - 2005
- [c9]Özer Aydemir, Ali Aydin Selçuk:
A Strong User Authentication Protocol for GSM. WETICE 2005: 150-153 - 2004
- [c8]Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:
A reputation-based trust management system for P2P networks. CCGRID 2004: 251-258 - 2003
- [c7]Ying Zhang, Aniruddha Rangnekar, Ali Aydin Selçuk, Ali Biçak, Deepinder P. Sidhu:
A performance comparison of zone-based multicast protocols for mobile ad hoc networks. ICON 2003: 543-548 - [c6]Hüseyin Demirci, Ali Aydin Selçuk, Erkan Türe:
A New Meet-in-the-Middle Attack on the IDEA Block Cipher. Selected Areas in Cryptography 2003: 117-129 - 2002
- [j1]Ali Aydin Selçuk, Deepinder P. Sidhu:
Probabilistic optimization techniques for multicast key management. Comput. Networks 40(2): 219-234 (2002) - [c5]Ali Aydin Selçuk, Ali Biçak:
On Probability of Success in Linear and Differential Cryptanalysis. SCN 2002: 174-185 - 2000
- [c4]Ali Aydin Selçuk:
On Bias Estimation in Linear Cryptanalysis. INDOCRYPT 2000: 52-66 - [c3]Ali Aydin Selçuk, Deepinder P. Sidhu:
Probabilistic Methods in Multicast Key Management. ISW 2000: 179-193 - [c2]Christopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu:
Initialization Vector Attacks on the IPsec Protocol Suite. WETICE 2000: 171-175
1990 – 1999
- 1998
- [c1]Ali Aydin Selçuk:
New Results in Linear Cryptanalysis of RC5. FSE 1998: 1-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint