default search action
Sedat Akleylek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. IEEE Access 12: 1672-1687 (2024) - [j56]Hami Satilmis, Sedat Akleylek, Zaliha Yüce Tok:
A Systematic Literature Review on Host-Based Intrusion Detection Systems. IEEE Access 12: 27237-27266 (2024) - [j55]Nursah Çevik, Sedat Akleylek:
SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast. IEEE Access 12: 35643-35662 (2024) - [j54]Anwar Noureddine Bahache, Noureddine Chikouche, Sedat Akleylek:
Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework. Internet Things 26: 101200 (2024) - [j53]Kübra Seyhan, Sedat Akleylek:
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key. PeerJ Comput. Sci. 10: e1791 (2024) - [j52]Kübra Seyhan, Sedat Akleylek, Ahmet Faruk Dursun:
Password authenticated key exchange-based on Kyber for mobile devices. PeerJ Comput. Sci. 10: e1960 (2024) - [j51]Mohamed Aly Bouke, Azizol Abdullah, Korhan Cengiz, Sedat Akleylek:
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems. PeerJ Comput. Sci. 10: e2043 (2024) - 2023
- [j50]Meltem Kurt PehlIvanoõlu, Fatma Büyüksaraçoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli:
On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form. IEEE Access 11: 32708-32715 (2023) - [j49]Fouzia Samiullah, Ming-Lee Gan, Sedat Akleylek, Yichiet Aun:
Group Key Management in Internet of Things: A Systematic Literature Review. IEEE Access 11: 77464-77491 (2023) - [j48]Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari, Alireza Shirmarz:
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks. Clust. Comput. 26(1): 437-459 (2023) - [j47]Senthil Kumar Jagatheesaperumal, Akhil Gupta, Sudeep Tanwar, Neeraj Kumar, Sedat Akleylek:
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication. Clust. Comput. 26(2): 865-878 (2023) - [j46]Ferhat Arat, Sedat Akleylek:
A new method for vulnerability and risk assessment of IoT. Comput. Networks 237: 110046 (2023) - [j45]Ferhat Arat, Sedat Akleylek:
Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. Comput. Secur. 128: 103174 (2023) - [j44]Meryem Soysaldi Sahin, Sedat Akleylek:
A survey of quantum secure group signature schemes: Lattice-based approach. J. Inf. Secur. Appl. 73: 103432 (2023) - [j43]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
A novel Android malware detection system: adaption of filter-based feature selection methods. J. Ambient Intell. Humaniz. Comput. 14(2): 1243-1257 (2023) - [j42]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput. Appl. 35(7): 4903-4918 (2023) - [j41]Kübra Seyhan, Sedat Akleylek:
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism. PeerJ Comput. Sci. 9: e1391 (2023) - [j40]Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari:
SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm. PeerJ Comput. Sci. 9: e1424 (2023) - [j39]Víctor García, Santiago Escobar, Kazuhiro Ogata, Sedat Akleylek, Ayoub Otmani:
Modelling and verification of post-quantum key encapsulation mechanisms using Maude. PeerJ Comput. Sci. 9: e1547 (2023) - [j38]Gökhan Tuncay, Fatma Büyüksaraçoglu Sakalli, Meltem Kurt Pehlivanoglu, Gülsüm Gözde Yilmazgüç, Sedat Akleylek, Muharrem Tolga Sakalli:
A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions. PeerJ Comput. Sci. 9: e1577 (2023) - [j37]Ferhat Arat, Sedat Akleylek:
Modified graph-based algorithm to analyze security threats in IoT. PeerJ Comput. Sci. 9: e1743 (2023) - [j36]Swagatam Basu, Kübra Seyhan, SK Hafizul Islam, Sedat Akleylek:
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication. IEEE Syst. J. 17(4): 6093-6103 (2023) - [j35]Kübra Seyhan, Sedat Akleylek:
A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE. J. Supercomput. 79(16): 17859-17896 (2023) - [e4]Sedat Akleylek, Besik Dundua:
Handbook of Formal Analysis and Verification in Cryptography. CRC Press 2023, ISBN 978-1-003-09005-2 [contents] - 2022
- [j34]Durmus Özkan Sahin, Sedat Akleylek, Erdal Kiliç:
LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers. IEEE Access 10: 14246-14259 (2022) - [j33]Engin Karacan, Aykut Karakaya, Sedat Akleylek:
Quantum Secure Communication Between Service Provider and Sim. IEEE Access 10: 69135-69146 (2022) - [j32]Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. Clust. Comput. 25(3): 1729-1748 (2022) - [j31]Sedat Akleylek, Kübra Seyhan:
Module learning with rounding based key agreement scheme with modified reconciliation. Comput. Stand. Interfaces 79: 103549 (2022) - [j30]Sedat Akleylek, Meryem Soysaldi:
A new lattice-based authentication scheme for IoT. J. Inf. Secur. Appl. 64: 103053 (2022) - [j29]Kübra Seyhan, Sedat Akleylek:
Classification of random number generator applications in IoT: A comprehensive taxonomy. J. Inf. Secur. Appl. 71: 103365 (2022) - [j28]Meryem Soysaldi, Sedat Akleylek:
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9852-9866 (2022) - [j27]Aykut Karakaya, Ahmet Ulu, Sedat Akleylek:
GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports. Microprocess. Microsystems 93: 104606 (2022) - [j26]Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari, Alireza Shirmarz:
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey. Telecommun. Syst. 81(3): 475-502 (2022) - [c17]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude. FAVPQC@ICFEM 2022: 16-31 - [c16]Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani:
Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude. SEKE 2022: 382-387 - [e3]Sedat Akleylek, Santiago Escobar, Kazuhiro Ogata, Ayoub Otmani:
Proceedings of the International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols co-located with the 23rd International Conference on Formal Engineering Methods (ICFEM 2022), Madrid, Spain, October 24, 2022. CEUR Workshop Proceedings 3280, CEUR-WS.org 2022 [contents] - [e2]Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 [contents] - 2021
- [j25]Durmus Özkan Sahin, Sedat Akleylek, Erdal Kiliç:
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection. Adv. Data Sci. Adapt. Anal. 13(3&4): 2141001:1-2141001:20 (2021) - [j24]Korhan Cengiz, Rashid Ali, Sedat Akleylek, Jaroslav Frnda:
Call for papers: Special issue on distributed next generation 5G data networks. Intell. Converged Networks 2(1): 84-85 (2021) - [j23]Sedat Akleylek, Meryem Soysaldi, Wai-Kong Lee, Seong Oun Hwang, Denis Chee-Keong Wong:
Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation. IEEE Internet Things J. 8(8): 6983-6994 (2021) - [j22]Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz, SK Hafizul Islam:
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58: 102788 (2021) - [j21]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
Permission-based Android malware analysis by using dimension reduction with PCA and LDA. J. Inf. Secur. Appl. 63: 102995 (2021) - [j20]Roumaissa Mahdjoubi, Pierre-Louis Cayrel, Sedat Akleylek, Kenza Guenda:
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes. RAIRO Theor. Informatics Appl. 55: 1-16 (2021) - [j19]Aykut Karakaya, Sedat Akleylek:
A novel IoT-based health and tactical analysis model with fog computing. PeerJ Comput. Sci. 7: e342 (2021) - [j18]Wai-Kong Lee, Sedat Akleylek, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi, Seong Oun Hwang:
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA. J. Supercomput. 77(4): 3289-3314 (2021) - [c15]Meltem Kurt PehlIvanoõlu, Fatma Büyüksaraçoglu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli:
On the Construction of 4 ˟ 4 Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$. ICMC 2021: 725-736 - [c14]Sedat Akleylek, Ramazan Koyutürk, Hakan Kutucu:
GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda. IntelITSIS 2021: 309-316 - [c13]Engin Karacan, Sedat Akleylek, Aykut Karakaya:
PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices. ISDFS 2021: 1-5 - [c12]Meltem Kurt PehlIvanoõlu, Fatma Büyüksaraçoõlu Sakalli, Sedat Akleylek, Muharrem Tolga Sakalli:
Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m. SIU 2021: 1-4 - 2020
- [j17]Sedat Akleylek, Kübra Seyhan:
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys. IEEE Access 8: 26210-26222 (2020) - [j16]Muharrem Tolga Sakalli, Sedat Akleylek, Kemal Akkanat, Vincent Rijmen:
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations. Turkish J. Electr. Eng. Comput. Sci. 28(1): 275-287 (2020) - [j15]Sedat Akleylek, Nursah Çevik:
MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU. Int. J. Commun. Syst. 33(7) (2020) - [c11]Zýnnet Duygu Akþehýr, Erdal Kiliç, Sedat Akleylek, Mesut Döngül, Burak Coskun:
Stocks Prices Prediction with Long Short-term Memory. IoTBDS 2020: 221-226 - [c10]Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç:
Comparison of Regression Methods in Permission Based Android Malware Detection. SIU 2020: 1-4 - [c9]Hami Satilmis, Sedat Akleylek:
Efficient Implementations of Gauss-Based Sieving Algorithms. SIU 2020: 1-4
2010 – 2019
- 2019
- [j14]Gülsüm Gözde Güzel, Muharrem Tolga Sakalli, Sedat Akleylek, Vincent Rijmen, Yasemin Cengellenmis:
A new matrix form to generate all 3 × 3 involutory MDS matrices over F2m. Inf. Process. Lett. 147: 61-68 (2019) - [j13]Sedat Akleylek, Meryem Soysaldi, Djallel Eddine Boubiche, Homero Toral-Cruz:
A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT. Sensors 19(4): 903 (2019) - [c8]Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi:
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. ISPEC 2019: 41-55 - 2018
- [j12]Meltem Kurt PehlIvanoõlu, Muharrem Tolga Sakalli, Sedat Akleylek, Nevcihan Duru, Vincent Rijmen:
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. IET Inf. Secur. 12(4): 348-355 (2018) - [c7]Sedat Akleylek, Bok-Min Goi, Wun-She Yap, Denis Chee-Keong Wong, Wai-Kong Lee:
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1923-1928 - 2017
- [j11]Sedat Akleylek, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk:
Efficient methods to generate cryptographically significant binary diffusion layers. IET Inf. Secur. 11(4): 177-187 (2017) - [j10]Erdem Alkim, Sedat Akleylek, Erdal Kiliç:
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications. J. Circuits Syst. Comput. 26(10): 1750156:1-1750156:14 (2017) - [e1]Hani Hamdan, Djallel Eddine Boubiche, Homero Toral-Cruz, Sedat Akleylek, Hamid Mcheick:
Proceedings of the Second International Conference on Internet of things and Cloud Computing, ICC 2017, Cambridge, United Kingdom, March 22-23, 2017. ACM 2017 [contents] - 2016
- [j9]Sedat Akleylek, Muharrem Tolga Sakalli, Emir Öztürk, Andac Sahin Mesut, Gökhan Tuncay:
Generating binary diffusion layers with maximum/high branch numbers and low search complexity. Secur. Commun. Networks 9(16): 3558-3569 (2016) - [j8]Sedat Akleylek, Erdem Alkim, Zaliha Yüce Tok:
Sparse polynomial multiplication for lattice-based cryptography with small complexity. J. Supercomput. 72(2): 438-450 (2016) - [c6]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. AFRICACRYPT 2016: 44-60 - [i1]Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. IACR Cryptol. ePrint Arch. 2016: 30 (2016) - 2015
- [j7]Sedat Akleylek, Baris Bülent Kirlar:
New methods for public key cryptosystems based on XTR. Secur. Commun. Networks 8(18): 3682-3689 (2015) - [c5]Sedat Akleylek, Özgür Dagdelen, Zaliha Yüce Tok:
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA. BalkanCryptSec 2015: 155-168 - [c4]Sedat Akleylek, Ferruh Özbudak:
Multiplication in a Galois ring. IWSDA 2015: 28-32 - 2014
- [j6]Sedat Akleylek, Zaliha Yüce Tok:
Efficient interleaved Montgomery modular multiplication for lattice-based cryptography. IEICE Electron. Express 11(22): 20140960 (2014) - [j5]Sedat Akleylek, Ferruh Özbudak, Canan Özel:
On the arithmetic operations over finite fields of characteristic three with low complexity. J. Comput. Appl. Math. 259: 546-554 (2014) - [c3]Sedat Akleylek, Zaliha Yüce Tok:
Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform. SIU 2014: 854-857 - 2013
- [j4]Ferruh Özbudak, Sedat Akleylek, Murat Cenk:
A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2016-2024 (2013) - [j3]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. IET Inf. Secur. 7(3): 165-171 (2013) - 2012
- [j2]Sedat Akleylek, Ferruh Özbudak:
Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity. IEEE Trans. Computers 61(3): 427-432 (2012) - [j1]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the Polynomial Multiplication in Chebyshev Form. IEEE Trans. Computers 61(4): 584-587 (2012) - 2010
- [b1]Sedat Akleylek:
On the representation of finite fields (Sonlu cisimlerin gösterimi üzerine). Middle East Technical University, Turkey, 2010 - [c2]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. INDOCRYPT 2010: 227-237 - [c1]Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
Faster Montgomery Modular Multiplication without Pre-computational Phase For Some Classes of Finite Fields. ISCIS 2010: 405-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint