Özgür Dagdelen

According to our database1, Özgür Dagdelen authored at least 37 papers between 2010 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Revisiting TESLA in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Rate-limited secure function evaluation.
Theor. Comput. Sci., 2016

Entangled cloud storage.
Future Gener. Comput. Syst., 2016

Extended security arguments for signature schemes.
Des. Codes Cryptogr., 2016

2015
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
IACR Cryptol. ePrint Arch., 2015

Authenticated Key Exchange from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
A comprehensive empirical comparison of parallel ListSieve and GaussSieve.
IACR Cryptol. ePrint Arch., 2014

Tuning GaussSieve for Speed.
IACR Cryptol. ePrint Arch., 2014

A Second Look at Fischlin's Transformation.
IACR Cryptol. ePrint Arch., 2014

Learning with Errors in the Exponent.
IACR Cryptol. ePrint Arch., 2014

Augmented Learning with Errors: The Untapped Potential of the Error Term.
IACR Cryptol. ePrint Arch., 2014

Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

High-Speed Signatures from Standard Lattices.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Nearest Planes in Practice.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
The cryptographic security of the German electronic identity card.
PhD thesis, 2013

Rate-Limited Secure Function Evaluation: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

The Fiat-Shamir Transformation in a Quantum World.
IACR Cryptol. ePrint Arch., 2013

The PACE|AA Protocol for Machine Readable Travel Documents, and its Security.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012

Domain-Specifi c Pseudonymous Signatures for the German Identity Card.
IACR Cryptol. ePrint Arch., 2012

Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Domain-Specific Pseudonymous Signatures for the German Identity Card.
Proceedings of the Information Security - 15th International Conference, 2012

2011
S-FSB: An Improved Variant of the FSB Hash Family.
Proceedings of the Information Security and Assurance - International Conference, 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Parallel Enumeration of Shortest Lattice Vectors.
IACR Cryptol. ePrint Arch., 2010

Random Oracles in a Quantum World.
IACR Cryptol. ePrint Arch., 2010

Random Oracles in a Quantum World
CoRR, 2010

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...