Yazar
-
Dishonest node identification for key sharing systems through distributed key generation
Kalkavan, T.; Koltuksuz, A. (AICT 2013 - 7th International Conference on Application of Information and Communication Technologies, Conference Proceedings, 2013)The purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can ... -
Spymasters tools: A comparative approach to side channel attacks
Kalkavan, T. (European Conference on Information Warfare and Security, ECCWS, 2014)In many security protocols, implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. ...
DSpace@YASAR by Yasar University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..