Publications of Ali Aydın Selçuk
Journal Papers
-
O. Ersoy, T. B. Pedersen, K. Kaya, A. A. Selcuk, E. Anarim.
A CRT-based Verifiable Secret Sharing Scheme Secure Against
Unbounded Adversaries.
Security and Communication Networks,
accepted for publication.
-
C. Tezcan, A. A. Selcuk.
Improved improbable differential attacks on ISO standard CLEFIA:
Expansion technique revisited.
Information Processing Letters,
v.116, pages 136-143, February 2016.
-
M. Ashouri-Talouki, A. Baraani-Dastjerdi, A. A. Selcuk.
The Cloaked-Centroid Protocol: Location Privacy Protection for a Group
of Users of Location-Based Services.
Knowledge and Information Systems,
v.45, pages 589-615, December 2015.
-
M. Ak, A. A. Selcuk.
Punctured Interval Broadcast Encryption Scheme with Free Riders.
Information Sciences,
v.305, pages 285-301, June 2015.
-
M. Ak, S. Pehlivanoglu, A. A. Selcuk.
Anonymous Trace and Revoke.
Journal of Computational and Applied Mathematics,
v.259, pages 586-591, March 2014.
-
M. Ak, T. Hanoymak, A. A. Selcuk.
IND-CCA Secure Encryption Based on a Zheng-Seberry Scheme.
Journal of Computational and Applied Mathematics,
v.259, pages 529-535, March 2014.
-
K. Kaya, A. A. Selcuk.
Sharing DSS by the Chinese Remainder Theorem.
Journal of Computational and Applied Mathematics,
v.259, pages 495-502, March 2014.
-
M. Ashouri-Talouki, A. Baraani-Dastjerdi, A. A. Selcuk.
Preserving Location Privacy for a Group of Users.
Turkish Journal of Electrical Engineering and Computer Sciences,
v.21, pages 1857-1870, December 2013.
-
M. Ashouri-Talouki, A. Baraani-Dastjerdi, A. A. Selcuk.
GLP: A cryptographic approach for group location privacy.
Computer Communications,
v.35 (12), pages 1527-1533, July 2012.
-
M. Ak, K. Kaya, K. Onarlioglu, A. A. Selcuk.
Efficient Broadcast Encryption with User Profiles.
Information Sciences,
v.180 (6), pages 1060-1072, March 2010.
-
M. Ak, K. Kaya, A. A. Selcuk.
Optimal Subset-Difference Broadcast Encryption with
Free Riders. Information Sciences,
v.179 (20), pages 3673-3684, September 2009.
-
A. A. Selcuk, E. Uzun, M. R. Pariente.
A Reputation-Based Trust Management System for P2P
Networks. International Journal of Network Security,
v.6 (2), pages 227-237, March 2008.
-
A. A. Selcuk.
On Probability of Success in
Linear and Differential Cryptanalysis.
Journal of Cryptology, v.21 (1), pages 131-147, January 2008.
-
K. Kaya, A. A. Selcuk.
Threshold Cryptography Based on Asmuth-Bloom Secret
Sharing. Information Sciences,
v.177 (19), pages 4148-4160, October 2007.
-
A. A. Selcuk, D. Sidhu.
Probabilistic Optimization Techniques
for Multicast Key Management.
Computer Networks, v.40 (2), pages 219-234, October 2002.
Conference Papers
-
S. Uludag, M. F. Balli, A. A. Selcuk, B. Tavli.
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs.
IEEE Globecom 2015 Workshop on SmartGrid Resilience,
San Diego, California, December 2015.
-
M. Ak, A. Kiayias, S. Pehlivanoglu, A. A. Selcuk.
Generic Trace and Revoke
Scheme.
International Conference on Applied and Computational Mathematics,
Ankara, Turkey, October 2012.
-
A. A. Selcuk, R. Yilmaz.
Joint Compartmented Threshold Access Structures.
International Conference on Applied and Computational Mathematics,
Ankara, Turkey, October 2012.
-
K. Kaya, A. A. Selcuk.
Sharing DSS by the Chinese Remainder Theorem.
International Conference on Applied and Computational Mathematics,
Ankara, Turkey, October 2012.
-
M. Ak, A. A. Selcuk.
Atlamali Aralik Yayin Sifreleme Sisteminde
Bedava Alicilarin Iyi Yerlestirilmesi.
IV. Ag ve Bilgi Güvenligi Sempozyumu,
Ankara, Turkey, November 2011.
-
A. A. Selcuk, R. Yilmaz.
Linear Hierarchical Secret Sharing.
Information Security and Cryptology,
Ankara, Turkey, May 2010.
-
I. N. Bozkurt, K. Kaya, A. A. Selcuk.
Secret Sharing for General Access Structures.
Information Security and Cryptology,
Ankara, Turkey, May 2010.
-
I. N. Bozkurt, K. Kaya, A. A. Selcuk.
Practical Threshold Signatures with Linear Secret
Sharing.
Africacrypt 2009. LNCS v.5580,
Springer-Verlag. Gammarth, Tunisia, June 2009.
-
I. N. Bozkurt, K. Kaya, A. A. Selcuk, A. M. Guloglu.
Threshold Cryptography Based on Blakley Secret
Sharing.
Information Security and Cryptology,
Ankara, Turkey, December 2008.
-
H. Koyuncu, K. Kaya, A. A. Selcuk.
An Analysis of the Generalized ID-Based
ElGamal Signatures.
Information Security and Cryptology,
Ankara, Turkey, December 2008.
-
K. Kaya, A. A. Selcuk.
A Verifiable Secret Sharing Scheme Based on the
Chinese Remainder Theorem.
Indocrypt 2008. LNCS v.5365, Springer-Verlag. Kharagpur,
India, December 2008.
-
S. Kalkan, K. Kaya, A. A. Selcuk.
Generalized ID-Based Blind Signatures From Bilinear Pairings.
The 23rd International Symposium on Computer and Information Sciences
(ISCIS 2008). Istanbul, Turkey, October 2008.
-
K. Kaya, A. A. Selcuk.
Robust Threshold Schemes Based on the Chinese
Remainder Theorem.
Africacrypt 2008. LNCS v.5023, Springer-Verlag. Casablanca,
Morocco, June 2008.
-
H. Demirci, A. A. Selcuk.
A Meet-in-the-Middle Attack on 8-Round AES.
15th Fast Software Encryption Conference.
LNCS v.5086, Springer-Verlag. Lausanne, Switzerland, February 2008.
-
S. Kalkan, K. Kaya, A. A. Selcuk.
Generalized ID-Based ElGamal Signatures with Message Recovery.
Information Security and Cryptology,
Ankara, Turkey, December 2007.
-
S. Kalkan, K. Kaya, A. A. Selcuk.
Generalized ID-Based ElGamal Signatures.
The 22nd International Symposium on Computer and Information Sciences
(ISCIS 2007). Ankara, Turkey, November 2007.
-
K. Kaskaloglu, K. Kaya, A. A. Selcuk.
Threshold Broadcast Encryption With Reduced Complexity.
The 22nd International Symposium on Computer and Information Sciences
(ISCIS 2007). Ankara, Turkey, November 2007.
-
K. Kaya, B. G. Dundar, S. Kalkan, A. A. Selcuk.
Threshold Paillier and Naccache-Stern
Cryptosystems Based on Asmuth-Bloom Secret Sharing.
2nd National Cryptology Symposium,
Ankara, Turkey, December 2006.
-
H. Demirci, E. S. Ayaz, A. A. Selcuk.
Similar State Tables and Related Keys in RC4.
2nd National Cryptology Symposium,
Ankara, Turkey, December 2006.
-
K. Kaya, A. A. Selcuk, Z. Tezcan.
Threshold Cryptography Based on
Asmuth-Bloom Secret Sharing.
The 21st International Symposium on Computer and Information Sciences
(ISCIS 2006). LNCS v.4263,
Springer-Verlag. Istanbul, Turkey, November 2006.
-
H. Acan, K. Kaya, A. A. Selcuk.
Capture Resilient ElGamal Signature Protocols.
The 21st International Symposium on Computer and Information Sciences
(ISCIS 2006). LNCS v.4263,
Springer-Verlag. Istanbul, Turkey, November 2006.
-
E. S. Ayaz, A. A. Selcuk.
Improved DST Cryptanalysis of IDEA.
13th Annual Workshop on Selected Areas in Cryptography
(SAC 2006). LNCS v.4356,
Springer-Verlag. Montreal, Canada, August 2006.
-
M. Ak, K. Kaya, A. A. Selcuk, Z. Tezcan.
Experiments on Probability of Success in
Linear and Differential Cryptanalysis.
First National Cryptology Symposium,
Ankara, Turkey, November 2005.
-
O. Aydemir, A. A. Selcuk.
A Strong User Authentication Protocol for
GSM.
14th IEEE International Workshops on Enabling Technologies:
Infrastructures for Collaborative Enterprises (WETICE'05),
Linkoping, Sweden, June 2005.
-
A. A. Selcuk, E. Uzun, M. R. Pariente.
A Reputation-Based
Trust Management System for P2P Networks.
4th IEEE/ACM International Symposium on Cluster Computing
and the Grid (CCGrid 2004), Chicago, USA, April 2004.
-
A. Rangnekar, Y. Zhang, A. A. Selcuk, A. Bicak, V. Devarapalli, D. Sidhu.
A Zone-Based Shared-Tree Multicast
Routing Protocol for Mobile Ad Hoc Networks.
IEEE Semiannual Vehicular Technology Conference
(VTC2003-Fall), Orlando, USA, October 2003.
-
Y. Zhang, A. Rangnekar, A. A. Selcuk, A. Bicak, D. Sidhu.
Comparison of Zone-Based Multicast Routing
Protocols for Ad Hoc Networks.
11th IEEE International Conference on Networks (ICON 2003),
Sydney, Australia, September 2003.
-
H. Demirci, A. A. Selcuk, E. Ture.
A New Meet in the Middle Attack on The IDEA Block
Cipher.
Tenth Annual Workshop on Selected Areas in Cryptography
(SAC 2003). LNCS v.3006,
pages 117-129, Springer-Verlag. Ottowa, Canada, August 2003.
-
A. A. Selcuk, A. Bicak.
On Probability of Success in
Linear and Differential Cryptanalysis.
Third Conference on Security in Communication Networks
(SCN'02). LNCS v.2576,
pages 177-188, Springer-Verlag. Amalfi, Italy, September 2002.
-
A. A. Selcuk, D. Sidhu.
Probabilistic Methods in Multicast Key
Management.
Information Security Workshop 2000.
LNCS v.1975, pages 179-193, Springer-Verlag. Wollongong,
Australia, December 2000.
-
A. A. Selcuk.
On Bias Estimation in Linear Cryptanalysis.
Indocrypt 2000 Conference. LNCS v.1977, pages 52-66,
Springer-Verlag. Calcutta, India, December 2000.
-
C. McCubbin, A. A. Selcuk, D. Sidhu.
Initialization Vector Attacks on
the IPsec Protocol Suite.
5th IEEE International Workshop on Enterprise Security.
Gaithersburg, Maryland, June 2000.
-
A. A. Selcuk.
New Results in Linear Cryptanalysis of RC5.
5th Fast Software Encryption Conference.
LNCS v.1372, pages 1-16, Springer-Verlag. Paris, France, March 1998.
Internet Drafts
Technical Reports
-
A. A. Selcuk, E. Uzun, M. R. Pariente,
Reputation-Based Trust Management for P2P Networks.
BU-CE-0403, Department of Computer Engineering,
Bilkent University, January 2004.
-
A. A. Selcuk,
On Probability of Success in Differential and Linear Cryptanalysis.
CERIAS TR 2002-02, Center for Education and Research in Information
Assurance and Security, Purdue University, January 2002.