Follow
Ali Aydin Selcuk
Ali Aydin Selcuk
Professor of Computer Engineering, TOBB University of Economics and Technology, Ankara
Verified email at etu.edu.tr - Homepage
Title
Cited by
Cited by
Year
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
4422004
On probability of success in linear and differential cryptanalysis
AA Selçuk
Journal of Cryptology 21, 131-147, 2008
325*2008
A meet-in-the-middle attack on 8-round AES
H Demirci, AA Selçuk
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
2572008
Threshold cryptography based on Asmuth–Bloom secret sharing
K Kaya, AA Selçuk
Information sciences 177 (19), 4148-4160, 2007
1082007
A verifiable secret sharing scheme based on the chinese remainder theorem
K Kaya, AA Selçuk
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
632008
SoK: cryptojacking malware
E Tekiner, A Acar, AS Uluagac, E Kirda, AA Selcuk
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 120-139, 2021
542021
A new meet-in-the-middle attack on the IDEA block cipher
H Demirci, AA Selçuk, E Türe
International workshop on selected areas in cryptography, 117-129, 2003
502003
Threshold cryptography based on blakley secret sharing
IN Bozkurt, K Kaya, AA Selcuk, AM Güloglu
Information Sciences, 1-4, 2008
472008
New results in linear cryptanalysis of RC5
AA Selçuk
Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998
471998
GLP: A cryptographic approach for group location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Computer Communications 35 (12), 1527-1533, 2012
332012
Distributed multi-unit privacy assured bidding (PAB) for smart grid demand response programs
MF Balli, S Uludag, AA Selcuk, B Tavli
IEEE Transactions on Smart grid 9 (5), 4119-4127, 2017
322017
Initialization vector attacks on the IPsec protocol suite
CB McCubbin, AA Selçuk, D Sidhu
Proceedings IEEE 9th International Workshops on Enabling Technologies …, 2000
272000
Robust threshold schemes based on the Chinese remainder theorem
K Kaya, AA Selçuk
Progress in Cryptology–AFRICACRYPT 2008: First International Conference on …, 2008
262008
Improved DST cryptanalysis of IDEA
ES Ayaz, AA Selçuk
International Workshop on Selected Areas in Cryptography, 1-14, 2006
232006
Probabilistic optimization techniques for multicast key management
AA Selçuk, D Sidhu
Computer Networks 40 (2), 219-234, 2002
192002
Threshold cryptography based on Asmuth-Bloom secret sharing
K Kaya, AA Selçuk, Z Tezcan
International Symposium on Computer and Information Sciences, 935-942, 2006
172006
Probabilistic optimization of LKH-based multicast key distribution schemes
A Selcuk, C McCubbin, D Sidhu
Draft-selcuk-probabilistic-Ikh-01. txt, Internet Draft, 2000
172000
The cloaked-centroid protocol: location privacy protection for a group of users of location-based services
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Knowledge and Information Systems 45, 589-615, 2015
16*2015
Undecidable problems in malware analysis
AA Selçuk, F Orhan, B Batur
2017 12th International Conference for Internet Technology and Secured …, 2017
152017
Sharing DSS by the Chinese remainder theorem
K Kaya, AA Selçuk
Journal of Computational and Applied Mathematics 259, 495-502, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20