# Sedat Akleylek's research while affiliated with Ondokuz Mayıs Üniversitesi and other places

**What is this page?**

This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

## Publications (93)

Randomness is an important issue for Internet of Things (IoT). The need to generate suitable random numbers for IoT devices with resource and size limitations has emerged due to the cryptographic protocols. Although random number generation approaches have been proposed considering IoT device constraints, commonly used software and hardware-based s...

The production of quantum computers with fast processing power and practical use will adversely affect the foundations of secure communication, especially for public-key cryptosystems (PKCs). Potential problems and solution scenarios are created early to design quantum-resistant PKCs. In this paper, the emergence of the concept of post-quantum cryp...

In this paper, we propose new construction structures, in other words, transposition-permutation path patterns for \(3 \times 3\) involutory and MDS permutation-equivalent matrices over \(\mathbb {F}_{2^{3}}\) and \(\mathbb {F}_{2^{4}}\). We generate \(3 \times 3\) involutory and MDS matrices over \(\mathbb {F}_{2^{3}}\) and \(\mathbb {F}_{2^{4}}\)...

Nowadays, Internet applications with different network resource requirements have been growing exponentially; therefore, the network equipment needs to be configured consistently based on application resource requirements. In this paper, Software Defined Network (SDN) is used to make the network more programmable, flexible and agile to develop the...

Nowadays, Internet applications with different network resource requirements have been growing exponentially; therefore, the network equipment needs to be configured consistently based on application resource requirements. In this paper, Software Defined Network (SDN) is used to make the network more programmable, flexible and agile to develop the...

Nowadays, many applications need varying levels of Quality of Service (QoS). The network that provides the communication service connects the servers and clients. The network traffic which is routed through the network should be engineered. Traffic Engineering (TE) is a mechanism for transferring the packets considering the different QoS level requ...

In team sports, the placement of the players before and during the competition/match is very important in terms of tactics. Wrong formation and tactics can directly cause losing the match. In certain parts of the match, the technical team can change the formation of the players according to the tactics. In addition to formation in soccer, there are...

The concept of the Internet of Things (IoT) arises due to the change in the characteristics and numbers of smart devices. Communication of things makes it important to ensure security in this interactive architecture. One of the developments that are subject to change in IoT environments is post-quantum cryptography. This evolution, which includes...

A group signature allows a group member who signs the message on behalf of the other group members. Any recipient also verifies the signature without knowing the signer. However, it is possible to reveal the signer’s identity since the group signatures have the tracing mechanism. In general, the group signature size increases the number of group me...

In this paper, the security aspects in the vehicle-to-vehicle (V2V) communication with the backbone cellular network is thoroughly investigated with the aid of a device-to-device (D2D) communication link that shares the spectral resources using the base station with multiple antennas. With assumptions of authorized user's channel state information...

IoT systems are one of the most important areas of developing technology. IoT application solutions are becoming widespread and their usage areas are expanding. Therefore, studies to develop IoT technologies are also increasing. Although the benefits of developing technology are enormous, it includes some difficulties. One of the most important cha...

In resource-constrained devices such as Subscriber Identity Module (SIM), the possibility of using authentication and key exchange methods, which include the mutual verification of two parties to ensure the security of communication, provides a significant advantage. As the cost efficient computations may not be efficiently performed on resource-co...

In this paper, we consider the problem of building lightweight maximum distance separable (MDS) linear layers for substitution permutation networks (SPNs) ciphers. We focus on the construction of \(4 \times 4\) involutory MDS matrices which can be implemented by the lightest (to the best of our knowledge) exclusive OR (XOR) count over \(\mathbb {F}...

In this study, a framework for Android malware detection based on permissions is presented. This framework uses multiple linear regression methods. Application permissions, which are one of the most critical building blocks in the security of the Android operating system, are extracted through static analysis, and security analyzes of applications...

The expansion of the Android operating system increases the interest of malware developers in this field. With the develop malicious software, the material, and moral harms are given to the users in many ways such as stealing personal data and decreasing device performance. Therefore, the need for systems that detect malware with high accuracy is i...

In this paper, we propose a lattice-based authentication scheme for IoT technologies such as RFID systems. The security of the proposed scheme is based on ISIS problem which helps to resist to quantum attacks. The proposed scheme satisfies zero-knowledge property. Moreover, the location privacy, unforgeability, scalability and forward secrecy prope...

There is a remarkable increase in mobile device usage in recent years. The Android operating system is by far the most preferred open-source mobile operating system around the world. Besides, the Android operating system is preferred in many devices on the Internet of Things (IoT) devices are used in many areas of daily life. Smart cities, smart en...

Android is the most preferred mobile operating system in the world. Applications are available from both official application repositories and other application stores. For these reasons, there has been a remarkable increase in malware for the Android operating system in recent years. In this study, a novel Android malware detection system is propo...

The security of lattice-based cryptosystems is based on solving hard lattice problems such as the shortest vector problem (SVP) and the closest vector problem (CVP). Various cryptanalysis algorithms such as (Pro)GaussSieve, HashSieve, ENUM, and BKZ have been proposed to solve these hard problems. Several implementations of these algorithms have bee...

In this paper, we propose a probably secure key agreement scheme based on module learning with rounding (MLWR) problem by modifying the reconciliation mechanism to obtain a shared key. In addition, compared with other schemes with the same properties, the error probability is relatively small. The detailed security analysis is provided against a pa...

We propose a new bilateral generalization inhomogeneous short integer solution (Bi-GISIS)-based key exchange protocol with reusable key feature for post-quantum IoT security. It is aimed to reduce the time consumption in the key generation of key exchange protocols to be used in IoT devices. To obtain reusable key, we define modified bilateral past...

Among the popular post-quantum schemes, lattice-based cryptosystems have received renewed interest since there are relatively simple, highly parallelizable and provably secure under a worst-case hardness assumption. However, polynomial multiplication over rings is the most time-consuming operation in most of the lattice-based cryptosystems. To furt...

With the developments in mobile and wireless technology, mobile devices have become an important part of our lives. While Android is the leading operating system in market share, it is the platform most targeted by attackers. Although many solutions have been proposed in the literature for the detection of Android malware, there is still a need for...

The eminent growth in connected devices technologies, like the Internet of Things (IoT), 5
<sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">th</sup>
generation (5G) and beyond communication systems, lead to innovations for human beings. The uninterrupted data communication services play diverse roles in...

In sports competitions, depending on the conditions such as excitement, stress, fatigue, etc. during the match, negative situations such as disability or loss of life may occur for players and spectators. Therefore, it is extremely important to constantly check their health. In addition, some strategic analyzes are made during the match. According...

Internet of Things (IoT) is a paradigm shifting technology that enables many innovative applications in the near future. Proactive measures are required to protect such architecture from cyber attacks. One of the most important security issues in this architecture is the authentication of edge nodes, which can be resolved through the deployment of...

Quantum attack–resistant cryptosystems are required for secure communication since there is a big demand to have quantum computers. Lattice‐based cryptography is one of the quantum‐secure families due to its key/ciphertext sizes and performance. NTRU‐based cryptosystems, a member of lattice‐based cryptosystems, have received much more attention. Ma...

In this paper, we propose a novel authenticated key exchange scheme based on the Bi-GISIS problem for the post-quantum world. The security of the proposed scheme is based on the hardness assumption of the Bi-GISIS problem described in [1]. The reusable key property is provided for the proposed scheme in the random oracle model by using the bilatera...

Post-quantum cryptography had attracted a lot of attentions in recent years, due to the potential threat emerged from quantum computer against traditional public key cryptography. Among all post-quantum candidates, lattice-based cryptography is considered the most promising and well studied one. The most time consuming operation in lattice-based cr...

In this paper, we propose a new matrix form to generate all 3×3 involutory and MDS matrices over F 2 m and prove that the number of all 3×3 involutory and MDS matrices over F 2 m is (2 m −1) ² ⋅(2 m −2)⋅(2 m −4), where m>2. Moreover, we give 3×3 involutory and MDS matrices over F 2 3 , F 2 4 and F 2 8 defined by the irreducible polynomials x ³ +x+1...

Identification schemes based on multivariate polynomials have been receiving attraction in different areas due to the quantum secure property. Identification is one of the most important elements for the IoT to achieve communication between objects, gather and share information with each other. Thus, identification schemes which are post-quantum se...

Identification schemes are used to verify identities of parties and signatures. Recently, systems based on multivariate polynomials have been preferred in identification schemes due to their resistance against quantum attacks. In this paper, we propose a quantum secure 3-pass identification scheme based on multivariate quadratic polynomials. We com...

In recent years, lightweight cryptography has become essential especially for the resource-constrained devices to ensure data protection and security. The selection of suitable cryptographic algorithm which is directly linked to requirements of the system will have dynamically effect on following such metrics like performance of the device, hardwar...

In this paper, we deal with the static weapon target assignment (WTA) problem which is a hard combinatorial optimization problem having some industrial applications. The aim of the WTA problem is to find an assignment of weapons to targets with the minimum total survival value of the targets. The WTA problem is known to be NP-complete problem. In t...

In this study a modified learning vector quantization (LVQ) algorithm is proposed. For this purpose, relevance LVQ (RLVQ) algorithm is efficiently combined with a reinforcement mechanism. In this mechanism, it is shown that the proposed algorithm is not affected constantly by both relevance-irrelevance input dimensions and the winning of the same n...

Electronic learning is one of the most popular topics of today's technology and education. The development in technology forces universities, colleges and other education institutes to transfer their materials into digitized environment. Moreover, this new education system allows students to attend lessons from their computers located out of campus...

In this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, ( BHwC ) t, m and ( BCwC ) q, m types, which are a combination of Hadamard a...

In this paper, we propose a new method to generate n × n binary matrices (for n = k·2t where k and t are positive integers) with a maximum/high of branch numbers and a minimum number of fixed points by using 2t×2t Hadamard (almost) maximum distance separable matrices and k × k cyclic binary matrix groups. By using the proposed method, we generate n...

In view of the expected progress in cryptanalysis it is important to find alternatives for currently used signature schemes such as RSA and ECDSA. The most promising lattice-based signature schemes to replace these schemes are (CRYPTO 2013) and GLP (CHES 2012). Both come with a security reduction from a lattice problem and have high performance. Ho...

In this paper, we propose efficient modular polynomial multiplication methods with applications in lattice-based cryptography. We provide a sparse polynomial multiplication to be used in the quotient ring (Formula presented.). Then, we modify this algorithm with sliding window method for sparse polynomial multiplication. Moreover, the proposed meth...

Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is based on ideal lattices. Thus, any efficiency improvement on this building block has great impact on the practicability of lattice-based cryptography. In this work, we investigate several algorithms for polynomial multiplication on a graphical proce...

In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes based on an effective and compact subgroup trace representation cryptosystem to handle with the problem of secure and efficient communication between the server and resource-constrained device. The proposed schemes use the hardness of the Trace-discrete...

In this chapter, the aim is to discuss computational aspects of lattice-based cryptographic schemes focused on NTRU in view of the time complexity on a graphical processing unit (GPU). Polynomial multiplication algorithms, having a very important role in lattice-based cryptographic schemes, are implemented on the GPU using the compute unified devic...

In this paper, we give modified version of interleaved Montgomery modular multiplication method for lattice-based cryptography. With the proposed algorithms, we improve the multiplication complexity and embed the conversion operation into the algorithm with almost free cost. We implement the proposed methods for the quotient ring (Z/qZ)[x]/(x(n) -...

We present an algebraic construction based on state transform matrix (companion matrix) for
n
×
n
(where
n
≠
2
k
,
k
being a positive integer) binary matrices with high branch number and low number of fixed points. We also provide examples for
20
×
20
and
24
×
24
binary matrices having advantages on implementation issues in lightweight...

The demand to lattice-based cryptographic schemes has been inreasing. Due to processing unit having multiple processors, there is a need to implements such protocols on these platforms. Graphical processing units (GPU) have attracted so much attention. In this paper, polynomial multiplication algorithms, having a very important role in lattice-base...

In this paper, the Hermite polynomial representation is adapted as a new way to represent certain finite fields of characteristic three. We give the multiplication method to multiply two elements of F"3"^"n in the Hermite polynomial representation with subquadratic computational complexity by using a divide-and-conquer idea. We show that in some ca...