2008 |
15 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Robust Threshold Schemes Based on the Chinese Remainder Theorem.
AFRICACRYPT 2008: 94-108 |
14 | EE | Hüseyin Demirci,
Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES.
FSE 2008: 116-126 |
13 | EE | Kamer Kaya,
Ali Aydin Selçuk:
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem.
INDOCRYPT 2008: 414-425 |
12 | EE | Ali Aydin Selçuk:
On Probability of Success in Linear and Differential Cryptanalysis.
J. Cryptology 21(1): 131-147 (2008) |
2007 |
11 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Threshold cryptography based on Asmuth-Bloom secret sharing.
Inf. Sci. 177(19): 4148-4160 (2007) |
2006 |
10 | EE | Kamer Kaya,
Ali Aydin Selçuk,
Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.
ISCIS 2006: 935-942 |
9 | EE | Hüseyin Acan,
Kamer Kaya,
Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols.
ISCIS 2006: 943-951 |
8 | EE | Eyüp Serdar Ayaz,
Ali Aydin Selçuk:
Improved DST Cryptanalysis of IDEA.
Selected Areas in Cryptography 2006: 1-14 |
2003 |
7 | EE | Hüseyin Demirci,
Ali Aydin Selçuk,
Erkan Türe:
A New Meet-in-the-Middle Attack on the IDEA Block Cipher.
Selected Areas in Cryptography 2003: 117-129 |
2002 |
6 | EE | Ali Aydin Selçuk,
Ali Biçak:
On Probability of Success in Linear and Differential Cryptanalysis.
SCN 2002: 174-185 |
5 | EE | Ali Aydin Selçuk,
Deepinder P. Sidhu:
Probabilistic optimization techniques for multicast key management.
Computer Networks 40(2): 219-234 (2002) |
2000 |
4 | EE | Ali Aydin Selçuk:
On Bias Estimation in Linear Cryptanalysis.
INDOCRYPT 2000: 52-66 |
3 | EE | Ali Aydin Selçuk,
Deepinder P. Sidhu:
Probabilistic Methods in Multicast Key Management.
ISW 2000: 179-193 |
2 | EE | Christopher B. McCubbin,
Ali Aydin Selçuk,
Deepinder P. Sidhu:
Initialization Vector Attacks on the IPsec Protocol Suite.
WETICE 2000: 171-175 |
1998 |
1 | EE | Ali Aydin Selçuk:
New Results in Linear Cryptanalysis of RC5.
FSE 1998: 1-16 |