Özgür Dagdelen
According to our database1,
Özgür Dagdelen
authored at least 37 papers
between 2010 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010