Berkant Ustaoglu

Orcid: 0000-0002-0411-9389

According to our database1, Berkant Ustaoglu authored at least 28 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.
Adv. Math. Commun., 2020

2016
A practical privacy-preserving targeted advertising scheme for IPTV users.
Int. J. Inf. Sec., 2016

2013
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Anonymity and one-way authentication in key exchange protocols.
Des. Codes Cryptogr., 2013

2012
Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
IACR Cryptol. ePrint Arch., 2012

Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
Proceedings of the SECRYPT 2012, 2012

Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Integrating identity-based and certificate-based authenticated key exchange protocols.
Int. J. Inf. Sec., 2011

A Generic Variant of NIST's KAS2 Key Agreement Protocol.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
On reusing ephemeral keys in Diffie-Hellman key agreement protocols.
Int. J. Appl. Cryptogr., 2010

Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
Adv. Math. Commun., 2010

Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Comparing the pre- and post-specified peer models for key agreement.
Int. J. Appl. Cryptogr., 2009

Efficient Key Exchange with Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2009

Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
IACR Cryptol. ePrint Arch., 2009

Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
IACR Cryptol. ePrint Arch., 2009

Comparing <i>SessionStateReveal</i> and <i>EphemeralKeyReveal</i> for Diffie-Hellman Protocols.
Proceedings of the Provable Security, Third International Conference, 2009

Strongly Secure Authenticated Key Exchange without NAXOS' Approach.
Proceedings of the Advances in Information and Computer Security, 2009

Reusing Static Keys in Key Agreement Protocols.
Proceedings of the Progress in Cryptology, 2009

Multi-party off-the-record messaging.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Towards Denial-of-Service-Resilient Key Agreement Protocols.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Key establishment - security models, protocols and usage.
PhD thesis, 2008

Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
Des. Codes Cryptogr., 2008

Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2006
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.
Proceedings of the Progress in Cryptology, 2006


  Loading...