Berkant Ustaoglu
Orcid: 0000-0002-0411-9389
According to our database1,
Berkant Ustaoglu
authored at least 28 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.
Adv. Math. Commun., 2020
2016
Int. J. Inf. Sec., 2016
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Des. Codes Cryptogr., 2013
2012
Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Integrating identity-based and certificate-based authenticated key exchange protocols.
Int. J. Inf. Sec., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Int. J. Appl. Cryptogr., 2010
Adv. Math. Commun., 2010
Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
IACR Cryptol. ePrint Arch., 2009
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
IACR Cryptol. ePrint Arch., 2009
Comparing <i>SessionStateReveal</i> and <i>EphemeralKeyReveal</i> for Diffie-Hellman Protocols.
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Des. Codes Cryptogr., 2008
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2006
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.
Proceedings of the Progress in Cryptology, 2006