Hüseyin Demirci

Orcid: 0000-0002-0538-2074

According to our database1, Hüseyin Demirci authored at least 23 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Preserving data privacy in machine learning systems.
Comput. Secur., February, 2024

2023
The first multi-tissue genome-scale metabolic model of a woody plant highlights suberin biosynthesis pathways in Quercus suber.
PLoS Comput. Biol., 2023

Improvement and Implementation of Sustainable Key Performance Indicators in Supply Chain Management: The Case of a Furniture Firm.
IEEE Access, 2023

2022
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification.
Mach. Learn. Knowl. Extr., 2022

Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022

A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2022

2021
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2017
VCF-Explorer: filtering and analysing whole genome VCF files.
Bioinform., 2017

2016
FMFilter: A fast model based variant filtering tool.
J. Biomed. Informatics, 2016

2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
Wirel. Commun. Mob. Comput., 2015

AKF: A key alternating Feistel scheme for lightweight cipher designs.
Inf. Process. Lett., 2015

GeneCOST: a novel scoring-based prioritization framework for identifying disease causing genes.
Bioinform., 2015

LargeDEL: A tool for identifying large deletions in the whole genome sequencing data.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2015

2013
Biclique cryptanalysis of LBlock and TWINE.
Inf. Process. Lett., 2013

ITUbee: A Software Oriented Lightweight Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

2012
Impossible Differential Cryptanalysis of Reduced-Round LBlock.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

2011
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2009
Improved Meet-in-the-Middle Attacks on AES.
Proceedings of the Progress in Cryptology, 2009

2008
New Results on the Key Scheduling Algorithm of RC4.
Proceedings of the Progress in Cryptology, 2008

A Meet-in-the-Middle Attack on 8-Round AES.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2003
A New Meet-in-the-Middle Attack on the IDEA Block Cipher.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

2002
Square-like Attacks on Reduced Rounds of IDEA.
Proceedings of the Selected Areas in Cryptography, 2002


  Loading...