Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu.
    A practical privacy-preserving targeted advertising scheme for IPTV users.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Michele Mosca, Douglas Stebila, Berkant Ustaoglu.
    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
    Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Ian Goldberg, Douglas Stebila, Berkant Ustaoglu.
    Anonymity and one-way authentication in key exchange protocols.
    Des. Codes Cryptography 2013, Volume 67 (0) 2013
    Journal article
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik.
    Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Michele Mosca, Douglas Stebila, Berkant Ustaoglu.
    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Journal article
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Berkant Ustaoglu.
    Integrating identity-based and certificate-based authenticated key exchange protocols.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    A Generic Variant of NIST's KAS2 Key Agreement Protocol.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Journal article
    Koray Karabina, Berkant Ustaoglu.
    Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
    Adv. in Math. of Comm. 2010, Volume 4 (0) 2010
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    On reusing ephemeral keys in Diffie-Hellman key agreement protocols.
    IJACT 2010, Volume 2 (0) 2010
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Jiang Wu, Berkant Ustaoglu.
    Efficient Key Exchange with Tight Security Reduction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    Reusing Static Keys in Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen.
    Multi-party off-the-record messaging.
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Comparing
    Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach.
    Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the pre- and post-specified peer models for key agreement.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Douglas Stebila, Berkant Ustaoglu.
    Towards Denial-of-Service-Resilient Key Agreement Protocols.
    Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings 2009 (0) 2009
    Show item 1 to 25 of 30  

    Your query returned 30 matches in the database.