istinye
Türkçe
  • Contact
  • About Us
    • Dean's Message
    • History
    • Vision-Mission
    • Quality
    • Research
    • Internationalization
  • Management
    • Faculty Management
    • Faculty Board
    • Faculty Executive Board
    • Head of the Departments
    • Commissions and Boards
  • Academic Staff
  • Departments
    • Computer Engineering
    • Biomedical Engineering
    • Electrical and Electronics Engineering
    • Industrial Engineering
    • Civil Engineering
    • Mechanical Engineering
    • Mathematics
    • Molecular Biology and Genetics
    • Chemistry
    • Software Engineering
    • Institute
  • News
  • Contact

Suggested Searches

  • Our campuses
  • About Us
    • Dean's Message
    • History
    • Vision-Mission
    • Quality
    • Research
    • Internationalization
  • Management
    • Faculty Management
    • Faculty Board
    • Faculty Executive Board
    • Head of the Departments
    • Commissions and Boards
  • Academic Staff
  • Departments
    • Computer Engineering
    • Biomedical Engineering
    • Electrical and Electronics Engineering
    • Industrial Engineering
    • Civil Engineering
    • Mechanical Engineering
    • Mathematics
    • Molecular Biology and Genetics
    • Chemistry
    • Software Engineering
    • Institute
  • News
  • Contact
  • University
    • About
    • Quality Assurance System
    • Strategic Transformation
    • Policies and Documents
      • Principles of Institutional Autonomy and Academic Freedom
      • Institutionalization and Sense of Belonging Policy
      • Support Unit Against Psychological and Sexual Harassment
      • Gender Equality Plan
    • Social Contribution
      • Policy
      • Activities
      • Projects
    • Sustainability
      • Sustainability at ISU
      • Policies
    • Management
      • Board of Trustees
      • Academic Management
      • Administrative Management
  • Academic
    • Academic Programs
      • Undergraduate
        • Faculty of Dentistry
        • Faculty of Pharmacy
        • Faculty of Fine Arts, Design and Architecture
        • Faculty of Economics, Administrative and Social Sciences
        • Faculty of Communication
        • Faculty of Humanities and Social Sciences
        • Faculty of Engineering and Natural Sciences
        • Faculty of Health Sciences
        • Faculty of Medicine
      • Associate Degree
        • Vocational School
        • Vocational School of Health Care Services
      • Postgraduate
      • Departments Under the Rectorate
        • Foreign Languages Department
        • Department of Basic Sciences
    • Education and Career
      • Exchange Programs (Erasmus)
  • Research
    • Vice Rectorate
    • Research & Development Centers
    • Technology Transfer Office (TTO)
    • Strategic Research & Development
    • Library
  • Student
    • New Student
    • International Student
    • Student Affairs Office
      • Registration and Application
      • Regulations and Directives
      • Academic Calendar
    • Life On Campus
      • Health Culture and Sport
      • Student Clubs
      • Club Forms
      • Student Council
      • Sport
      • Psychological Counseling Unit
      • Disability Support Unit
      • Library
      • Complaint and Suggestion System
    • Graduate
      • ISU Network Platform
      • Career Center
    • Career Center
  • International
    • Fees and Quotas
    • Application Criteria
    • Erasmus+

Breadcrumb

  1. Home Page
  2. Faculty of Engineering and Natural Sciences
  3. Academic Members
Academic Member

Prof. Sedat Akleylek

Bilgisayar Mühendisliği

Articles

  • Systematic literature review on bootstrapping procedure of FHE schemes ,2024
  • Post-quantum PAKE over lattices revised: Smaug-T.PAKE for mobile devices ,2026
  • PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge ,2025
  • Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets ,2025
  • İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması ,2019
  • Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme ,2021
  • Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures ,2026
  • PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT ,2025
  • A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems ,2025
  • Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation ,2025
  • A Novel Model for E-Book Borrowing Management System ,2018
  • A Novel IoT-based Health and Tactical Analysis Model with Fog Computing ,2021
  • Quantum Secure Communication Between Service Provider and SIM ,2022
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
  • A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security ,2024
  • Anomaly Detection With API Calls by Using Machine Learning: Systematic Literature Review ,2024
  • Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography ,2018
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
  • Efficient methods to generate cryptographically significant binary diffusion layers ,2017
  • Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT ,2025
  • Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
  • SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
  • Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems ,2024
  • Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications ,2024
  • Anomaly detection system for ADS-B data: Attack vectors and machine learning models ,2025
  • A Review Of Machine Learning And Deep Learning Models Used For IoT Security ,2021
  • A Systematic Literature Review on Host-Based Intrusion Detection Systems ,2024
  • A new hybrid method combining search and direct based construction ideas to generate all 4 x 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields ,2019
  • A new lattice-based password authenticated key exchange scheme with anonymity and reusable key ,2024
  • Password authenticated key exchange-based on Kyber for mobile devices ,2024
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • Kuantum Sonrası Güvenli Dijital Kripto Cüzdan ,2024
  • Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol ,2024
  • SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
  • A novel permission-based Android malware detection system using feature selection based on linear regression ,2023
  • MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication ,2023
  • Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism ,2023
  • A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE ,2023
  • Classification of random number generator applications in IoT: A comprehensive taxonomy ,2022
  • A survey of quantum secure group signature schemes: Lattice-based approach ,2023
  • A novel Android malware detection system: adaption of filter-based feature selection methods ,2023
  • Modified graph-based algorithm to analyze security threats in IoT ,2023
  • Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited ,2023
  • A new method for vulnerability and risk assessment of IoT ,2023
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
  • Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
  • Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
  • Taxonomy of traffic engineering mechanisms in software-defined networks: a survey ,2022
  • Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey ,2022
  • Module learning with rounding based key agreement scheme with modified reconciliation ,2022
  • Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security ,2021
  • A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys ,2020
  • LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers ,2022
  • A new lattice-based authentication scheme for IoT ,2022
  • A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model ,2022
  • Security enhancement in cellular networks employing D2D friendly jammer for V2V communication ,2022
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
  • Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks ,2022
  • Permission-based Android malware analysis by using dimension reduction with PCA and LDA ,2021
  • Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation ,2021
  • On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection ,2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
  • Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography ,2021
  • A modified algorithm for peer-to-peer security ,2007
  • A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes ,2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
  • Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi ,2020
  • A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications ,2017
  • Efficient GeMSS Based Ring Signature Scheme ,2020
  • NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA ,2020
  • KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA ,2020
  • JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES ,2020
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
  • MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU ,2020
  • Parola Tabanlı SIMSec Protokolü ,2020
  • IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma ,2019
  • New Signature Algorithm Based on Concatenated Rank Codes ,2019
  • A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials ,2019
  • A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT ,2019
  • Securty of online Learning ,2005
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye ,2007
  • Open Source UTM Alternative ClearOS ,2010
  • A note on Knapsack Cryptosystems ,2007
  • qTESLA: Efficient and Post-Quantum Secure Lattice-Based Signature Scheme ,2017
  • ÜÇ TERİMLİ POLİNOMLAR İÇİN KARATSUBA BENZERİ ÇARPMA YÖNTEMLERİNİN ARAŞTIRILMASI ,2017
  • Generating binary diffusion layers with maximum high branch numbers and low search complexity ,2016
  • Sparse polynomial multiplication for lattice based cryptography with small complexity ,2016
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • A New Short Signature Scheme with Random Oracle from Bilinear Pairings ,2011
  • Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity ,2010
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • Efficient interleaved Montgomery modular multiplication for lattice based cryptography ,2014
  • New methods for public key cryptosystems based on XTR ,2015
  • Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity ,2012
  • On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions ,2014
  • A Modified Algorithm for Peer to Peer Security ,2007
  • On the Polynomial Multiplication in Chebyshev Form ,2012
  • On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication ,2013
  • On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity ,2014

Reports

  • Work Accident Analysis with Machine Learning Techniques - ŞAHİN DURMUŞ ÖZKAN,Şirin Burçe,AKLEYLEK SEDAT,KILIÇ ERDAL
  • A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,SAĞIROĞLU ŞEREF,AKLEYLEK SEDAT
  • On the Construction of 4x4 Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Detection of Malware and Benign Samples in AWSCTD Dataset with Kolmogorov-Arnold Networks - YAZAR BİLGE KAĞAN,SATILMIŞ HAMİ,ŞAHİN VAROL,AKLEYLEK SEDAT
  • A lightweight post-quantum authentication framework for next-generation satellite communication standards - SEYHAN KÜBRA,AKLEYLEK SEDAT,Vazquez Castro Angeles
  • Adaptive PageRank for systemic risk evaluation in interconnected PNT systems - ARAT FERHAT,AKLEYLEK SEDAT
  • A New Optimized Implementation of SMAUG-T for Lightweight Devices - Narlı Oğuz,KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT
  • A survey on security threats and authentication approaches in wireless sensor networks - AKLEYLEK SEDAT,KARAKAYA AYKUT
  • PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices - Karacan Engin,AKLEYLEK SEDAT,KARAKAYA AYKUT
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m - KURT PEHLİVANOĞLU MELTEM, DEMİR MEHMET ALİ, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - DEMİR MEHMET ALİ,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
  • On the design strategies of diffusion layers and key schedule in lightweight block ciphers - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED - AKLEYLEK SEDAT, AYDOĞMUŞ EBUBEKİR, SINAK AHMET
  • Anomaly Detection with Machine Learning Models Using API Calls - ŞAHİN VAROL,SATILMIŞ HAMİ,YAZAR BİLGE KAĞAN,AKLEYLEK SEDAT
  • A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,SAĞIROĞLU ŞEREF,AKLEYLEK SEDAT
  • A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules - SEYHAN KÜBRA,AKLEYLEK SEDAT
  • Smaug Kem to Smaug-PAKE: A Generic Lattice-Based Password Authenticated Key Exchange - SEYHAN KÜBRA,AKLEYLEK SEDAT
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • A SURVEY ON DIGITAL RIGHTS MANAGEMENT - AKLEYLEK SEDAT,SOYSALDI MERYEM,KARHAN ZEHRA,ŞAHİN DURMUŞ ÖZKAN
  • Comparison of Regression Methods in Permission Based Android Malware Detection - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers - KURT PEHLİVANOĞLU MELTEM, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA, DURU NEVCİHAN
  • On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m - KURT PEHLİVANOĞLU MELTEM, Demir Mehmet Ali, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması - AKLEYLEK SEDAT, SOYSALDI ŞAHİN MERYEM
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc) - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • A Novel Lattice-Based Threshold Ring Signature Scheme - AKLEYLEK SEDAT, SOYSALDI MERYEM
  • Post-Quantum Cryptography: A Snapshot of Standardization Efforts - AKLEYLEK SEDAT, SEYHAN KÜBRA
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • A Lattice-based Group Signature Scheme with Applications in Blockchain - SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
  • A novel identification scheme for post-quantum secure digital right management - AKLEYLEK SEDAT, SOYSALDI MERYEM
  • Challenges and Opportunities in Cryptography - AKLEYLEK SEDAT
  • New results on permission based static analysis for android malware - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
  • Survey on Implementation of Lattice-based Identification Schemes - Murzaeva Azhar, SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
  • IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C - Murzaeva Azhar, AKLEYLEK SEDAT
  • A Systematic Survey on Mobile Internet of Things Security - ARAT FERHAT, AKLEYLEK SEDAT
  • HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE - SEYHAN KÜBRA, AKLEYLEK SEDAT, KILIÇ ERDAL, ORUÇ YALÇIN
  • GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda - AKLEYLEK SEDAT, Koyutürk Ramazan, KUTUCU HAKAN
  • Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network - KURAL OĞUZ EMRE, ŞAHİN DURMUŞ ÖZKAN, AKLEYLEK SEDAT, KILIÇ ERDAL, Ömüral Murat
  • TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER,AKLEYLEK SEDAT,ÖZÇELİK İBRAHİM
  • CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS - AKLEYLEK SEDAT
  • Support Vector Machines: From Classical Version to Quantum - Decadjevi Gildas, AKLEYLEK SEDAT, Abdiu Gazmor, Halabi Omar
  • Efficient Implementations of Gauss-Based Sieving Algorithms - SATILMIŞ HAMİ,AKLEYLEK SEDAT
  • Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography - SATILMIŞ HAMİ,AKLEYLEK SEDAT
  • An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem - DURGUT RAFET,KUTUCU HAKAN,AKLEYLEK SEDAT
  • The Third International Conference onProblems of Cybernetics and Informatics - NURIYEV URFAT, EMMUNGİL LEVENT, AKLEYLEK SEDAT
  • A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale - AKLEYLEK SEDAT, KARAGÖL SERAP, KUTUCU HAKAN, MOHAMMADI RAMIN
  • TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER, AKLEYLEK SEDAT, ÖZÇELİK İBRAHİM
  • Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms - AKLEYLEK SEDAT,SATILMIŞ HAMİ
  • Stocks Prices Prediction with Long Short-term Memory - AKŞEHİR ZİNNET DUYGU,KILIÇ ERDAL,AKLEYLEK SEDAT,Döngül Mesut,Coşkun Burak
  • A New 3-pass Zero-knowledge Lattice-based Identification Scheme - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • Permission Weighting Approaches in Permission Based Android Malware Detection - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,KILIÇ ERDAL
  • New Signature Algorithm Based on Concatenated Rank Codes - Mahdjoubi Roumaissa,AKLEYLEK SEDAT,Kenza Guenda
  • Efficient GeMSS Based Ring Signature Scheme - Demircioğlu Murat,AKLEYLEK SEDAT,CENK MURAT
  • Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme - Lee Wai Kong,AKLEYLEK SEDAT,Yap Wun She,Goi Bok Min
  • Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols - AKLEYLEK SEDAT,SEYHAN KÜBRA
  • Formal Analysis of MaTRU Cryptosystem - AKLEYLEK SEDAT,çevik nurşah
  • Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları - AKLEYLEK SEDAT,Koyutürk Ramazan
  • Open Source UTM Alternative ClearOS - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
  • A note on Knapsack Cryptosystems - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye - EMMUNGİL LEVENT,AKLEYLEK SEDAT,NURIYEV URFAT
  • Securty of online Learning - NURIYEV URFAT,ÖZARSLAN SÜLEYMAN,AKLEYLEK SEDAT
  • Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme - AKLEYLEK SEDAT,SEYHAN KÜBRA
  • A Bayesian Networks Application in Occupational Health and Safety - PEKEL EBRU,AKŞEHİR ZİNNET DUYGU,meto bilal,AKLEYLEK SEDAT,KILIÇ ERDAL
  • An Automated Vulnerable Website Penetration - Murzaeva Azhar,AKLEYLEK SEDAT
  • An Overview for the National Cyber Security Strategy - Ataç Cihan,AKLEYLEK SEDAT
  • GUI Based Ring Signature Scheme - AKLEYLEK SEDAT,Demircioğlu Murat,CENK MURAT
  • Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era - Lee Wai Kong,Goi Bok Min,Yap Wun She,Wong Denis Chee Keong,AKLEYLEK SEDAT
  • On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques - AKŞEHİR ZİNNET DUYGU,oruç yalçın,Elibol Ahmet,AKLEYLEK SEDAT,KILIÇ ERDAL
  • New quantum secure key exchange protocols based on MaTRU - AKLEYLEK SEDAT,Kaya Nurşah
  • New results on permission based static analysis for Android malware - ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE,AKLEYLEK SEDAT,KILIÇ ERDAL
  • Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
  • The Trend of Business Intelligence Adoption and Maturity - Qushem Umar Bin,Zeki Akram,Abubakar Adamu,AKLEYLEK SEDAT
  • Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow - AKLEYLEK SEDAT,ENGİN EMRE
  • Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması - AKLEYLEK SEDAT,Kaya Nurşah
  • Computing Square Roots in Prime Fields via Singular Elliptic Curves - AKLEYLEK SEDAT,KIRLAR BARIŞ BÜLENT
  • Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology - AKLEYLEK SEDAT,KUTUCU HAKAN,MOHAMMADI RAMIN
  • Strassen-like 2x2 Matrix Squaring Revisited - AKLEYLEK SEDAT,ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE
  • Strassen-like 2x2 Matrix Squaring Revisited - AKLEYLEK SEDAT,ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE
  • Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
  • An Efficient Lattice Based Signature Scheme with Provably Secure Instantiation - AKLEYLEK SEDAT,Bindel Nina,Buchmann Johannes,Kramer Juliane,Marson Giorgia
  • A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks - AKLEYLEK SEDAT,Mohammadi Ramin
  • Some Results on MDS Matrices - AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA
  • Speeding up Number Theoretic Transform Lazy Reductions Explained - AKLEYLEK SEDAT,ALKIM ERDEM
  • Efficient Methods for Lattice based Cryptography - AKLEYLEK SEDAT
  • Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography - AKLEYLEK SEDAT
  • Post Quantum Cryptography An Introduction - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice Based Cryptography - AKLEYLEK SEDAT
  • Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA - AKLEYLEK SEDAT,Yüce Tok Zaliha
  • Data Storage of Electronic Exams - Ölçüoğlu Lütfi Tarkan,AKLEYLEK SEDAT
  • Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers - AKLEYLEK SEDAT,Diker Yücel Melek
  • Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta - AKLEYLEK SEDAT,YILDIRIM HAMDİ MURAT,Yüce Zaliha
  • Elliptic Curves in Cryptography - Akleylek Sedat, Akyıldız Ersan
  • E imza ve Kayıtlı Elektronik Posta - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice Based Cryptography - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice based Cryptography - AKLEYLEK SEDAT
  • Multiplication in a Galois Ring - AKLEYLEK SEDAT,ÖZBUDAK FERRUH
  • On the Efficiency of Polynomial Multiplication for Lattice Based Cryptography on GPUs using CUDA - AKLEYLEK SEDAT,Özgür Dağdelen,Zaliha Tok Yüce
  • Polynomials over Finite Fields and Some Applications in Cryptography - AKLEYLEK SEDAT
  • Bilgi ve İletişim Güvenliğinde Matematik Kriptografi - Akleylek Sedat, Akyıldız Ersan
  • SMS PGP Şifreli ve e imzalı Mobil SMS Uygulaması - Akleylek Sedat, Özcan Ahmet Ertuğrul
  • SMS Yönlendiren Casus Yazılım Uygulaması - Akleylek Sedat, Başal Mehmet, Hamzaçebi Ensar, Kara Burak
  • Steganography and New Implementation of Steganography - Akleylek Sedat, Nuriyev Urfat
  • Kriptolojideki Gelişmeler - Akyıldız Ersan, Akleylek Sedat
  • Kriptografi ve Siber Güvenlik - Akleylek Sedat, Yüce Zaliha
  • Atutor Öğrenme İçerik Yönetim Sistemi - Akleylek Sedat, Emmungil Levent
  • Groups Used in Diffie Hellman Key Agreement - Akyıldız Ersan, Akleylek Sedat
  • Improving the Security of Open Source Learning Content Management Systems - Akleylek Sedat, Emmungil Levent
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Turkey - Akleylek Sedat, Emmungil Levent, Nuriyev Urfat
  • PKI Lite A PKI System with Limited Resources - Akleylek Sedat, Yayla Oğuz
  • Technical Requirements for Online Education Support - Akleylek Sedat, Emmungil Levent
  • Pairing Based Cryptography A Survey - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Arithmetic on Pairing Friendly Fields - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Short Signature Scheme from Bilinear Pairings 1 - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Short Signature Scheme from Bilinear Pairings - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Modified Discrete Fourier Transform for Efficient Polynomial Multiplication - Akleylek Sedat, Cenk Murat, Özbudak Ferruh
  • Speeding Up Montgomery Modular Multiplication For Prime Fields - Akleylek Sedat, Cenk Murat
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication - Akleylek Sedat, Cenk Murat, Özbudak Ferruh
  • Open Source UTM Alternative - Akleylek Sedat, Emmungil Levent, Nuriyev Urfat
  • Hermite Polynomial Representation for Finite Fields of Characteristic Three - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • Charlier Polynomial Representation for Finite Fields of Characteristic Three - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • On the Multiplication over Finite Fields of Characteristic Three in Hermite Polynomial Representation - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • Kriptografik Modüllerin Güvenlik Gereksinimleri - Akleylek Sedat, Karaalan Halil
  • On the Security Requirements of Cryptographic Modules - Akleylek Sedat, Karaalan Sedat
  • New classes of permutation polynomials over finite fields of odd characteristic - Akleylek Sedat, Saygı Zülfükar
  • RSA Kriptosisteminin Güvenlik Analizi Üzerine Bir Derleme - Öncül Ali Burak, Akleylek Sedat

Books

  • Communications in Computer and Information Science – Springer Nature Link
  • Futuristic Computational Systems and Advanced Engineering for the Society – Springer, Cham
  • A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems – Springer, Cham
  • Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer Cham
  • Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer International Publishing
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer International Publishing
  • Handbook of Formal Analysis and Verification in Cryptography – Taylor Francis CRC Press
  • Siber Güvenlik ve Savunma Problemler ve Çözümler – GrafikerYayın
  • Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi) – PALME YAYINCILIK
  • Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems – IOS Press Ebooks
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji – Nobel
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
  • Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji – Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti.
  • PROCEEDINGS OF 14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY – IEEE
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • proceedings of the 13th international conference on information security and cryptography – ieee
  • PROCEEDINGS OF 13TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY – IEEE
  • SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • 12. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANSI BİLDİRİ KİTABI – BİLGİ GÜVENLİĞİ DERNEĞİ
  • SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER – GRAFİKER
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
  • Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
  • Proceedings of ISCTURKEY 2016 – Bilgi Güvenliği Derneği
  • Cryptography and Information Security in the Balkans – Springer
  • Algoritmalara Giriş – Palme Yayınevi
  • Handbook of Codes and Sequences with Applications in Communication Computing and Information Security – Chapman and Hall/CRC
  • Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
  • Improving Information Security Practices through Computational Intelligence – IGI Global
  • Computer and Information Sciences – Springer

Awards

  • Yılın Tezi Ödülü – 2012
  • Misafir Araştırmacı – 2012
  • Yurtdışı Araştırma – 2012
  • Yayın Teşvik – 2012
  • Yayın Teşvik – 2013
  • COST Action IC1306 School on Cryptographic Attacks katılım bursu – 2014
  • TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık – 2014
  • Yılın Genç Bilim İnsanı – 2011
  • Yurt Dışı Doktora Sonrası Araştırma – 2014
  • Yayın Teşvik – 2014
  • YayınTeşvik – 2014
  • Yayın Teşvik – 2015
  • Best Paper Award – 2016
  • CSAW Applied Research Competition – 2016
  • ODTÜ Yılın Tezi Ödülü (Tez Danışmanı) – 2017
  • En İyi Bildiri Ödülü – 2017
  • CSAW MENA Finalist – 2017
  • OMÜ Yılın Tezi Ödülü (Tez Danışmanı) – 2025
Prof. Sedat Akleylek - İstinye Üniversitesi
sedat.akleylekistinye.edu.tr

Research Areas

  • Mühendislik Temel Alanı
  • Bilgisayar Bilimleri ve Mühendisliği
  • Bilgisayar-Bilişim Bilimleri ve Mühendisliği

0850 283 60 00

info@istinye.edu.tr

         
ISU

Dipnot

  • STUDENT
    • Academic Calendar
    • Shuttle Hours
    • Announcements
    • Student Information
  • PROSPECTIVE STUDENTS
    • Associate Degree
    • Undergraduate
    • Graduate Programs
    • Continuous Education
  • ISTINYE
    • Press Kit
    • Istinye Post
    • Our campuses

0850 283 60 00

info@istinye.edu.tr

         
app_store google_play

© All rights reserved, İstinye University.

  • MLPCARE
  • istinye medicalPark
  • W Hospital