CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain MY Kubilay, MS Kiraz, HA Mantar Computers & Security 85, 333-352, 2019 | 145 | 2019 |
A protocol issue for the malicious case of Yao’s garbled circuit construction M Kiraz, B Schoenmakers 27th Symposium on Information Theory in the Benelux, 283-290, 2006 | 85 | 2006 |
A novel RFID distance bounding protocol based on physically unclonable functions S Kardaş, MS Kiraz, MA Bingöl, H Demirci RFIDSec 2011- 7th International Workshop, 78-93, 2012 | 69 | 2012 |
Still Wrong Use of Pairings in Cryptography MS Kiraz, O Uzunkol Elsevier-Applied Mathematics and Computation 333, 467–479, 2018 | 61* | 2018 |
Examination of a New Defense Mechanism: Honeywords. ZA Genc, S Kardas, MS Kiraz Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013 | 61* | 2013 |
Policy specification and verification for blockchain and smart contracts in 5G networks D Unal, M Hammoudeh, MS Kiraz ICT Express 6 (1), 43-47, 2020 | 54 | 2020 |
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations MS Kiraz, O Uzunkol International Journal of Information Security, 1-19, 2015 | 48 | 2015 |
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems S Kardaş, M Akgün, MS Kiraz, H Demirci 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011 | 47 | 2011 |
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system C Karabat, MS Kiraz, H Erdogan, E Savas EURASIP Journal on Advances in Signal Processing Editorial Team, 2015 | 42 | 2015 |
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing MS Kiraz Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016 | 36 | 2016 |
Secure and Fair Two-Party Computation MS Kiraz Proc. of EUROCRYPT 3, 2008 | 26 | 2008 |
Efficient committed oblivious transfer of bit strings MS Kiraz, B Schoenmakers, J Villegas Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 26 | 2007 |
An efficient protocol for fair secure two-party computation MS Kiraz, B Schoenmakers Cryptographers’ Track at the RSA Conference, 88-105, 2008 | 25 | 2008 |
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates O Biçer, MA Bingöl, MS Kiraz, A Levi https://doi.org/10.1093/comjnl/bxy136 62 (4), 598–613, 2019 | 23* | 2019 |
Anonymous RFID authentication for cloud services M Kiraz, M Bingöl, S Kardaş, F Birinci international journal of information security science 1 (2), 32-42, 2012 | 21 | 2012 |
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity O Biçer, MA Bingöl, MS Kiraz, A Levi IEEE Transactions on Dependable and Secure Computing 2020 (https://doi.org …, 2020 | 20* | 2020 |
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer MS Kiraz, ZA Genç, S Kardaş Security and Communication Networks, 2015 | 18 | 2015 |
Secure database in cloud computing-cryptdb revisited Z Dayıoğlu International Journal of Information Security Science 3 (1), 129-147, 2014 | 17 | 2014 |
Bitcoin'de mahremiyeti sağlama yöntemleri S Kardaş, M KİRAZ Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 4 (1), 1-9, 2018 | 15 | 2018 |
Detecting large integer arithmetic for defense against crypto ransomware MS Kiraz, ZA Genç, E Öztürk Cryptology ePrint Archive, 2017 | 14 | 2017 |