| 2008 |
| 15 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Robust Threshold Schemes Based on the Chinese Remainder Theorem.
AFRICACRYPT 2008: 94-108 |
| 14 | EE | Hüseyin Demirci,
Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES.
FSE 2008: 116-126 |
| 13 | EE | Kamer Kaya,
Ali Aydin Selçuk:
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem.
INDOCRYPT 2008: 414-425 |
| 12 | EE | Ali Aydin Selçuk:
On Probability of Success in Linear and Differential Cryptanalysis.
J. Cryptology 21(1): 131-147 (2008) |
| 2007 |
| 11 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Threshold cryptography based on Asmuth-Bloom secret sharing.
Inf. Sci. 177(19): 4148-4160 (2007) |
| 2006 |
| 10 | EE | Kamer Kaya,
Ali Aydin Selçuk,
Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.
ISCIS 2006: 935-942 |
| 9 | EE | Hüseyin Acan,
Kamer Kaya,
Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols.
ISCIS 2006: 943-951 |
| 8 | EE | Eyüp Serdar Ayaz,
Ali Aydin Selçuk:
Improved DST Cryptanalysis of IDEA.
Selected Areas in Cryptography 2006: 1-14 |
| 2003 |
| 7 | EE | Hüseyin Demirci,
Ali Aydin Selçuk,
Erkan Türe:
A New Meet-in-the-Middle Attack on the IDEA Block Cipher.
Selected Areas in Cryptography 2003: 117-129 |
| 2002 |
| 6 | EE | Ali Aydin Selçuk,
Ali Biçak:
On Probability of Success in Linear and Differential Cryptanalysis.
SCN 2002: 174-185 |
| 5 | EE | Ali Aydin Selçuk,
Deepinder P. Sidhu:
Probabilistic optimization techniques for multicast key management.
Computer Networks 40(2): 219-234 (2002) |
| 2000 |
| 4 | EE | Ali Aydin Selçuk:
On Bias Estimation in Linear Cryptanalysis.
INDOCRYPT 2000: 52-66 |
| 3 | EE | Ali Aydin Selçuk,
Deepinder P. Sidhu:
Probabilistic Methods in Multicast Key Management.
ISW 2000: 179-193 |
| 2 | EE | Christopher B. McCubbin,
Ali Aydin Selçuk,
Deepinder P. Sidhu:
Initialization Vector Attacks on the IPsec Protocol Suite.
WETICE 2000: 171-175 |
| 1998 |
| 1 | EE | Ali Aydin Selçuk:
New Results in Linear Cryptanalysis of RC5.
FSE 1998: 1-16 |