Toplam kayıt 2, listelenen: 1-2

    • Dishonest node identification for key sharing systems through distributed key generation 

      Kalkavan, T.; Koltuksuz, A. (AICT 2013 - 7th International Conference on Application of Information and Communication Technologies, Conference Proceedings, 2013)
      The purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can ...
    • Spymasters tools: A comparative approach to side channel attacks 

      Kalkavan, T. (European Conference on Information Warfare and Security, ECCWS, 2014)
      In many security protocols, implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. ...