Evren, Atif; Tuna, Elif; Ustaoglu, Erhan; Sahin, Busra Some dominance indices to determine market concentration. (English) Zbl 1521.62311 J. Appl. Stat. 48, No. 13-15, 2755-2775 (2021). MSC: 62-XX PDFBibTeX XMLCite \textit{A. Evren} et al., J. Appl. Stat. 48, No. 13--15, 2755--2775 (2021; Zbl 1521.62311) Full Text: DOI
Chatterjee, Sanjit; Ustaoğlu, Berkant Malleability and ownership of proxy signatures: towards a stronger definition and its limitations. (English) Zbl 1437.94055 Adv. Math. Commun. 14, No. 2, 177-205 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Chatterjee} and \textit{B. Ustaoğlu}, Adv. Math. Commun. 14, No. 2, 177--205 (2020; Zbl 1437.94055) Full Text: DOI
Mosca, Michele; Stebila, Douglas; Ustaoğlu, Berkant Quantum key distribution in the classical authenticated key exchange framework. (English) Zbl 1306.94105 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013). MSC: 94A62 81P94 94A60 PDFBibTeX XMLCite \textit{M. Mosca} et al., Lect. Notes Comput. Sci. 7932, 136--154 (2013; Zbl 1306.94105) Full Text: DOI arXiv Link
Goldberg, Ian; Stebila, Douglas; Ustaoglu, Berkant Anonymity and one-way authentication in key exchange protocols. (English) Zbl 1305.94050 Des. Codes Cryptography 67, No. 2, 245-269 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{I. Goldberg} et al., Des. Codes Cryptography 67, No. 2, 245--269 (2013; Zbl 1305.94050) Full Text: DOI Link
Fujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant Sufficient condition for ephemeral key-leakage resilient tripartite key exchange. (English) Zbl 1305.94047 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 15-28 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Fujioka} et al., Lect. Notes Comput. Sci. 7372, 15--28 (2012; Zbl 1305.94047) Full Text: DOI Link
Amirov, Arif; Ustaoglu, Zekeriya; Heydarov, Bayram Solvability of a two dimensional coefficient inverse problem for transport equation and a numerical method. (English) Zbl 1276.82052 Transp. Theory Stat. Phys. 40, No. 1-4, 1-22 (2011). Reviewer: Gen Qi Xu (Tianjin) MSC: 82C70 65N21 65N06 65N12 82-08 PDFBibTeX XMLCite \textit{A. Amirov} et al., Transp. Theory Stat. Phys. 40, No. 1--4, 1--22 (2011; Zbl 1276.82052) Full Text: DOI
Chatterjee, Sanjit; Menezes, Alfred; Ustaoglu, Berkant A generic variant of NIST’S KAS2 key agreement protocol. (English) Zbl 1279.94062 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 353-370 (2011). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Chatterjee} et al., Lect. Notes Comput. Sci. 6812, 353--370 (2011; Zbl 1279.94062) Full Text: DOI
Karabina, Koray; Ustaoglu, Berkant Invalid-curve attacks on (hyper)elliptic curve cryptosystems. (English) Zbl 1213.94116 Adv. Math. Commun. 4, No. 3, 307-321 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Karabina} and \textit{B. Ustaoglu}, Adv. Math. Commun. 4, No. 3, 307--321 (2010; Zbl 1213.94116) Full Text: DOI
Menezes, Alfred; Ustaoglu, Berkant On reusing ephemeral keys in Diffie-Hellman key agreement protocols. (English) Zbl 1208.94050 Int. J. Appl. Cryptogr. 2, No. 2, 154-158 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Menezes} and \textit{B. Ustaoglu}, Int. J. Appl. Cryptogr. 2, No. 2, 154--158 (2010; Zbl 1208.94050) Full Text: DOI
Ustaoglu, Zekeriya; Heydarov, Bayram; Amirov, Serif On the solvability and approximate solution of a two-dimensional coefficient inverse problem for a transport-like equation. (English) Zbl 1204.35179 Inverse Probl. 26, No. 11, Article ID 115019, 15 p. (2010). MSC: 35R30 35A35 65N21 65N06 PDFBibTeX XMLCite \textit{Z. Ustaoglu} et al., Inverse Probl. 26, No. 11, Article ID 115019, 15 p. (2010; Zbl 1204.35179) Full Text: DOI
Chatterjee, Sanjit; Menezes, Alfred; Ustaoglu, Berkant Combined security analysis of the one- and three-pass unified model key agreement protocols. (English) Zbl 1253.94043 Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 49-68 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Chatterjee} et al., Lect. Notes Comput. Sci. 6498, 49--68 (2010; Zbl 1253.94043) Full Text: DOI
Fujioka, Atsushi; Suzuki, Koutarou; Ustaoğlu, Berkant Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys. (English) Zbl 1252.94063 Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 187-205 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Fujioka} et al., Lect. Notes Comput. Sci. 6487, 187--205 (2010; Zbl 1252.94063) Full Text: DOI
Manulis, Mark; Suzuki, Koutarou; Ustaoglu, Berkant Modeling leakage of ephemeral secrets in tripartite/group key exchange. (English) Zbl 1305.94063 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 16-33 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 5984, 16--33 (2010; Zbl 1305.94063) Full Text: DOI Link
Chatterjee, Sanjit; Menezes, Alfred; Ustaoglu, Berkant Reusing static keys in key agreement protocols. (English) Zbl 1252.94054 Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 39-56 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Chatterjee} et al., Lect. Notes Comput. Sci. 5922, 39--56 (2009; Zbl 1252.94054) Full Text: DOI Link
Ustaoglu, Berkant Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols. (English) Zbl 1267.94133 Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 183-197 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{B. Ustaoglu}, Lect. Notes Comput. Sci. 5848, 183--197 (2009; Zbl 1267.94133) Full Text: DOI
Stebila, Douglas; Ustaoglu, Berkant Towards denial-of-service-resilient key agreement protocols. (English) Zbl 1284.94114 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 389-406 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Stebila} and \textit{B. Ustaoglu}, Lect. Notes Comput. Sci. 5594, 389--406 (2009; Zbl 1284.94114) Full Text: DOI Link
Menezes, Alfred; Ustaoglu, Berkant Comparing the pre- and post-specified peer models for key agreement. (English) Zbl 1159.94367 Int. J. Appl. Cryptogr. 1, No. 3, 236-250 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Menezes} and \textit{B. Ustaoglu}, Int. J. Appl. Cryptogr. 1, No. 3, 236--250 (2009; Zbl 1159.94367) Full Text: DOI
Ustaoglu, Berkant Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. (English) Zbl 1178.94205 Des. Codes Cryptography 46, No. 3, 329-342 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Ustaoglu}, Des. Codes Cryptography 46, No. 3, 329--342 (2008; Zbl 1178.94205) Full Text: DOI Link
Menezes, Alfred; Ustaoglu, Berkant Comparing the pre- and post-specified peer models for key agreement. (English) Zbl 1279.94102 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 53-68 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Menezes} and \textit{B. Ustaoglu}, Lect. Notes Comput. Sci. 5107, 53--68 (2008; Zbl 1279.94102) Full Text: DOI Link
Menezes, Alfred; Ustaoglu, Berkant On the importance of public-key validation in the MQV and HMQV key agreement protocols. (English) Zbl 1175.94092 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 133-147 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Menezes} and \textit{B. Ustaoglu}, Lect. Notes Comput. Sci. 4329, 133--147 (2006; Zbl 1175.94092) Full Text: DOI Link