Author
Now showing items 1-2 of 2
-
Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation
Kalkavan, T.; Koltuksuz, A. (IEEE, 2013)the purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can ... -
Spymasters Tools: A Comparative Approach to Side Channel Attacks
Kalkavan, T. (ACAD CONFERENCES LTD, 2014)In many security protocols, implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. ...
DSpace@YASAR by Yasar University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..