Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 30  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Koray Karabina, Berkant Ustaoglu.
    Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
    Adv. in Math. of Comm. 2010, Volume 4 (0) 2010
    Conference paper
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach.
    Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
    Des. Codes Cryptography 2008, Volume 46 (0) 2008
    Conference paper
    Ian Goldberg, Douglas Stebila, Berkant Ustaoglu.
    Anonymity and one-way authentication in key exchange protocols.
    Des. Codes Cryptography 2013, Volume 67 (0) 2013
    Conference paper
    Berkant Ustaoglu.
    Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Jiang Wu, Berkant Ustaoglu.
    Efficient Key Exchange with Tight Security Reduction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Michele Mosca, Douglas Stebila, Berkant Ustaoglu.
    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Journal article
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Show item 1 to 10 of 30  

    Your query returned 30 matches in the database.