Özgür Dagdelen

According to our database1, Özgür Dagdelen authored at least 37 papers between 2010 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Revisiting TESLA in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Rate-limited secure function evaluation.
Theor. Comput. Sci., 2016

Entangled cloud storage.
Future Gener. Comput. Syst., 2016

2015
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
IACR Cryptol. ePrint Arch., 2015

Learning with Errors in the Exponent.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Augmented Learning with Errors: The Untapped Potential of the Error Term.
Proceedings of the Financial Cryptography and Data Security, 2015

Authenticated Key Exchange from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

Tuning GaussSieve for Speed.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

High-Speed Signatures from Standard Lattices.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A Comprehensive Empirical Comparison of Parallel ListSieve and GaussSieve.
Proceedings of the Euro-Par 2014: Parallel Processing Workshops, 2014

A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Nearest Planes in Practice.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

A Second Look at Fischlin's Transformation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
The cryptographic security of the German electronic identity card.
PhD thesis, 2013

A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

Rate-Limited Secure Function Evaluation: Definitions and Constructions.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

The Fiat-Shamir Transformation in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012

Domain-Specifi c Pseudonymous Signatures for the German Identity Card.
IACR Cryptol. ePrint Arch., 2012

Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Domain-Specific Pseudonymous Signatures for the German Identity Card.
Proceedings of the Information Security - 15th International Conference, 2012

The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
Proceedings of the Financial Cryptography and Data Security, 2012

Extended Security Arguments for Signature Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
S-FSB: An Improved Variant of the FSB Hash Family.
Proceedings of the Information Security and Assurance - International Conference, 2011

Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Random Oracles in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Random Oracles in a Quantum World
CoRR, 2010

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010

Parallel Enumeration of Shortest Lattice Vectors.
Proceedings of the Euro-Par 2010 - Parallel Processing, 16th International Euro-Par Conference, Ischia, Italy, August 31, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...