Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 11 to 20 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Berkant Ustaoglu.
    Integrating identity-based and certificate-based authenticated key exchange protocols.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    On reusing ephemeral keys in Diffie-Hellman key agreement protocols.
    IJACT 2010, Volume 2 (0) 2010
    Journal article
    Koray Karabina, Berkant Ustaoglu.
    Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
    Adv. in Math. of Comm. 2010, Volume 4 (0) 2010
    Conference paper
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Jiang Wu, Berkant Ustaoglu.
    Efficient Key Exchange with Tight Security Reduction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Douglas Stebila, Berkant Ustaoglu.
    Towards Denial-of-Service-Resilient Key Agreement Protocols.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Show item 11 to 20 of 30  

    Your query returned 30 matches in the database.