Now showing items 1-16 of 16

    • Capture resilient ElGamal signature protocols 

      Acan, Hüseyin; Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2006-11)
      One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is ...
    • Generalized ID-based blind signatures from bilinear pairings 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2008-10)
      Blind signature schemes provide the feature that a user is able to get a signature without giving the actual message to the signer. Recently a number of ID-based blind signatures have been proposed. In this paper, we ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • Generic construction of trace and revoke schemes 

      Ak, Murat; Kiayias, A.; Pehlivanoğlu, S.; Selçuk, Ali Aydın (2012)
    • Improved DST cryptanalysis of IDEA 

      Ayaz, Eyüp Serdar; Selçuk, Ali Aydın (Springer, 2006-08)
      In this paper, we show how the Demirci-Selcuk-Ture attack, which is currently the deepest penetrating attack on the IDEA block cipher, can be improved significantly in performance. The improvements presented reduce the ...
    • Joint compartmented threshold access structures 

      Selçuk, Ali Aydın; Yılmaz, Ramazan (2012)
    • A meet-in-the-middle attack on 8-round AES 

      Demirci, H.; Selçuk, Ali Aydın (Springer, 2008-02)
      We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time-memory tradeoff generalization of the ...
    • Practical threshold signatures with linear secret sharing schemes 

      Bozkurt, İlker Nadi; Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2009-06)
      Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating ...
    • Preserving location privacy for a group of users 

      Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın (Scientific and Technical Research Council of Turkey - TUBITAK, 2013)
      Location privacy is an interesting problem that has been receiving considerable attention. This problem has been widely discussed from the individual point of view; however, there exist only a few works that support ...
    • Robust threshold schemes based on the Chinese remainder theorem 

      Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2008-06)
      Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the ...
    • Sharing DSS by the Chinese remainder theorem 

      Kaya, K.; Selçuk, Ali Aydın (2012)
    • A strong user authentication protocol for GSM 

      Aydemir, Özer; Selçuk, Ali Aydın (IEEE, 2005-06)
      Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality ...
    • Threshold broadcast encryption with reduced complexity 

      Kaşkaloǧlu, K.; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ...
    • Threshold cryptography based on asmuth-bloom secret sharing 

      Kaya, Kamer; Selçuk, Ali Aydın; Tezcan, Zahir (Springer, 2006-11)
      In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal ...
    • A verifiable secret sharing scheme based on the chinese remainder theorem 

      Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2008-12)
      In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure by an attack where the dealer ...
    • Word-based compression in full-text retrieval systems 

      Selçuk, Ali Aydın (Bilkent University, 1995)
      Large space requirement of a full-text retrieval system can be reduced significantly by data compression. In this study, the problem of compressing the main text of a full-text retrieval system is addressed and performance ...