istinye
English
  • İletişim
  • Hakkımızda
    • Dekan Mesajı
    • Tarihçe
    • Vizyon-Misyon
    • Kalite
    • Araştırmalar
    • Uluslararasılaşma
    • E-Bülten
  • Yönetim
    • Fakülte Yönetimi
    • Fakülte Kurulu
    • Fakülte Yönetim Kurulu
    • Bölüm Başkanları
    • Komisyon ve Kurullar
  • Akademik Kadro
  • Bölümler
    • Bilgisayar Mühendisliği
    • Biyomedikal Mühendisliği
    • Elektrik-Elektronik Mühendisliği
    • Endüstri Mühendisliği
    • İnşaat Mühendisliği
    • Makine Mühendisliği
    • Matematik
    • Moleküler Biyoloji ve Genetik
    • Kimya
    • Yazılım Geliştirme
    • Yazılım Mühendisliği
    • Lisansüstü
  • Haberler
  • İletişim

Önerilen Aramalar

  • Akademik Takvim
  • Servis Saatleri
  • Taban Puanlar ve Sıralamalar
  • Aday Öğrenci
  • Online Ödeme
  • Duyurular
  • OİS
  • Hakkımızda
    • Dekan Mesajı
    • Tarihçe
    • Vizyon-Misyon
    • Kalite
    • Araştırmalar
    • Uluslararasılaşma
    • E-Bülten
  • Yönetim
    • Fakülte Yönetimi
    • Fakülte Kurulu
    • Fakülte Yönetim Kurulu
    • Bölüm Başkanları
    • Komisyon ve Kurullar
  • Akademik Kadro
  • Bölümler
    • Bilgisayar Mühendisliği
    • Biyomedikal Mühendisliği
    • Elektrik-Elektronik Mühendisliği
    • Endüstri Mühendisliği
    • İnşaat Mühendisliği
    • Makine Mühendisliği
    • Matematik
    • Moleküler Biyoloji ve Genetik
    • Kimya
    • Yazılım Geliştirme
    • Yazılım Mühendisliği
    • Lisansüstü
  • Haberler
  • İletişim
  • Üniversite
    • Hakkımızda
    • Kalite Güvence Sistemi
    • Stratejik Dönüşüm
    • Politikalar ve Belgeler
      • Kurumsal Özerklik ve Akademik Özgürlük
      • Kurumsallaşma ve Aidiyet Politikası
      • Psikolojik ve Cinsel Tacize Karşı Destek
      • Toplumsal Cinsiyet Eşitliği Planı
    • Toplumsal Katkı
      • Politika
      • Faaliyetler
      • Projeler
    • Sürdürülebilirlik
      • İSÜ'de Sürdürülebilirlik
      • Politikalar
    • Yönetim
      • Mütevelli Heyet
      • Akademik Yönetim
      • İdari Yönetim
  • Eğitim
    • Akademik Programlar
      • Lisans
        • Diş Hekimliği Fakültesi
        • Eczacılık Fakültesi
        • Güzel Sanatlar, Tasarım ve Mimarlık Fakültesi
        • İktisadi, İdari ve Sosyal Bilimler Fakültesi
        • İletişim Fakültesi
        • İnsan ve Toplum Bilimleri Fakültesi
        • Mühendislik ve Doğa Bilimleri Fakültesi
        • Sağlık Bilimleri Fakültesi
        • Tıp Fakültesi
      • Önlisans
        • Meslek Yüksekokulu
        • Sağlık Hizmetleri Meslek Yüksekokulu
      • Lisansüstü
      • Rektörlüğe Bağlı Bölümler
        • Yabancı Diller Bölümü
        • Temel Bilimler Bölümü
    • Eğitim ve Kariyer
      • Sürekli Eğitim Merkezi
      • ÖĞREM
      • Değişim Programları (Erasmus)
      • Kariyer Olanakları
  • Araştırma
    • İstinye'de Ar-Ge
    • Araştırma Merkezleri
    • Teknoloji Transfer Ofisi
    • Stratejik Ar-Ge
    • İstinye Lab
    • Kütüphane
    • Etik Kurullar
  • Öğrenci
    • Yeni Öğrenci
    • Uluslararası Öğrenci
    • Öğrenci İşleri
      • Kayıt ve Başvuru
      • Yönetmelik ve Yönergeler
      • Çift Anadal ve Yandal
      • Öğrenci Bilgi Sistemi
      • Akademik Takvim
    • Kampüste Yaşam
      • Sağlık Kültür ve Spor
      • Öğrenci Kulüpleri
      • Kulüp Formları
      • Öğrenci Konseyi
      • Spor
      • Psikolojik Danışmanlık Birimi
      • Engelsiz Öğrenci Birimi
      • Kütüphane
      • Şikayet Öneri Sistemi
    • Mezun
      • ISU Network Platformu
      • Kariyer Olanakları
    • Kariyer Merkezi
  • Aday
  • Uluslararası
    • Başvuru Kriterleri
    • Ücretler ve Kontenjanlar
    • Erasmus+

Sayfa yolu

  1. Ana Sayfa
  2. Mühendislik ve Doğa Bilimleri Fakültesi
  3. Akademik Kadro
Akademik Personel

Prof. Dr. Sedat Akleylek

Bilgisayar Mühendisliği

Makaleler

  • Systematic literature review on bootstrapping procedure of FHE schemes ,2024
  • Post-quantum PAKE over lattices revised: Smaug-T.PAKE for mobile devices ,2026
  • PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge ,2025
  • Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets ,2025
  • İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması ,2019
  • Denetleyici Alan Ağının Güvenliğinin Sağlanması için Derin Öğrenme Tabanlı Saldırı Tespit Sistemleri Üzerine Bir Derleme ,2021
  • Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures ,2026
  • PPLBB: a novel privacy-preserving lattice-based blockchain platform in IoMT ,2025
  • A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems ,2025
  • Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation ,2025
  • A Novel Model for E-Book Borrowing Management System ,2018
  • A Novel IoT-based Health and Tactical Analysis Model with Fog Computing ,2021
  • Quantum Secure Communication Between Service Provider and SIM ,2022
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
  • A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security ,2024
  • Anomaly Detection With API Calls by Using Machine Learning: Systematic Literature Review ,2024
  • Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography ,2018
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
  • Efficient methods to generate cryptographically significant binary diffusion layers ,2017
  • Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT ,2025
  • Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
  • SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
  • Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems ,2024
  • Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications ,2024
  • Anomaly detection system for ADS-B data: Attack vectors and machine learning models ,2025
  • A Review Of Machine Learning And Deep Learning Models Used For IoT Security ,2021
  • A Systematic Literature Review on Host-Based Intrusion Detection Systems ,2024
  • A new hybrid method combining search and direct based construction ideas to generate all 4 x 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • A new matrix form to generate all 3 × 3 involutory MDS matrices over Binary Fields ,2019
  • A new lattice-based password authenticated key exchange scheme with anonymity and reusable key ,2024
  • Password authenticated key exchange-based on Kyber for mobile devices ,2024
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • Kuantum Sonrası Güvenli Dijital Kripto Cüzdan ,2024
  • Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol ,2024
  • SoK of Machine Learning and Deep Learning Based Anomaly Detection Methods for Automatic Dependent Surveillance- Broadcast ,2024
  • A novel permission-based Android malware detection system using feature selection based on linear regression ,2023
  • MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication ,2023
  • Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism ,2023
  • A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE ,2023
  • Classification of random number generator applications in IoT: A comprehensive taxonomy ,2022
  • A survey of quantum secure group signature schemes: Lattice-based approach ,2023
  • A novel Android malware detection system: adaption of filter-based feature selection methods ,2023
  • Modified graph-based algorithm to analyze security threats in IoT ,2023
  • Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited ,2023
  • A new method for vulnerability and risk assessment of IoT ,2023
  • A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions ,2023
  • On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form ,2023
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
  • Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude ,2023
  • GOALALERT: A novel real-time technical team alert approach using machine learning on an IoT-based system in sports ,2022
  • Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme ,2022
  • Taxonomy of traffic engineering mechanisms in software-defined networks: a survey ,2022
  • Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey ,2022
  • Module learning with rounding based key agreement scheme with modified reconciliation ,2022
  • Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security ,2021
  • A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys ,2020
  • LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers ,2022
  • A new lattice-based authentication scheme for IoT ,2022
  • A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model ,2022
  • Security enhancement in cellular networks employing D2D friendly jammer for V2V communication ,2022
  • Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ,2022
  • Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks ,2022
  • Permission-based Android malware analysis by using dimension reduction with PCA and LDA ,2021
  • Novel Post-quantum MQ-based Signature Scheme for Internet of Things with Parallel Implementation ,2021
  • On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection ,2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
  • Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography ,2021
  • A modified algorithm for peer-to-peer security ,2007
  • A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes ,2021
  • Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA ,2021
  • Kafes-Tabanlı Anahtar Değişim/Paketleme Protokollerinde Kullanılan Uzlaşma Yöntemlerine Ait Bileşenlerin Analizi ,2020
  • A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications ,2017
  • Efficient GeMSS Based Ring Signature Scheme ,2020
  • NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA ,2020
  • KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA ,2020
  • JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES ,2020
  • On the automorphisms and isomorphisms of MDS matrices and their efficient implementations ,2020
  • MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU ,2020
  • Parola Tabanlı SIMSec Protokolü ,2020
  • IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma ,2019
  • New Signature Algorithm Based on Concatenated Rank Codes ,2019
  • A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials ,2019
  • A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT ,2019
  • Securty of online Learning ,2005
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye ,2007
  • Open Source UTM Alternative ClearOS ,2010
  • A note on Knapsack Cryptosystems ,2007
  • qTESLA: Efficient and Post-Quantum Secure Lattice-Based Signature Scheme ,2017
  • ÜÇ TERİMLİ POLİNOMLAR İÇİN KARATSUBA BENZERİ ÇARPMA YÖNTEMLERİNİN ARAŞTIRILMASI ,2017
  • Generating binary diffusion layers with maximum high branch numbers and low search complexity ,2016
  • Sparse polynomial multiplication for lattice based cryptography with small complexity ,2016
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • A New Short Signature Scheme with Random Oracle from Bilinear Pairings ,2011
  • Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity ,2010
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials ,2013
  • Efficient interleaved Montgomery modular multiplication for lattice based cryptography ,2014
  • New methods for public key cryptosystems based on XTR ,2015
  • Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity ,2012
  • On the Construction of 20 20 and 24 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions ,2014
  • A Modified Algorithm for Peer to Peer Security ,2007
  • On the Polynomial Multiplication in Chebyshev Form ,2012
  • On the Generalisation of Special Moduli for Faster Interleaved Montgomery Modular Multiplication ,2013
  • On the Arithmetic Operations over Finite Fields of Characteristic Three with Low Complexity ,2014

Bildiriler

  • Work Accident Analysis with Machine Learning Techniques - ŞAHİN DURMUŞ ÖZKAN,Şirin Burçe,AKLEYLEK SEDAT,KILIÇ ERDAL
  • A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,SAĞIROĞLU ŞEREF,AKLEYLEK SEDAT
  • On the Construction of 4x4 Lightweight Involutory MDS Matrices Over $$\mathbb {F}_{2^{8}}$$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Detection of Malware and Benign Samples in AWSCTD Dataset with Kolmogorov-Arnold Networks - YAZAR BİLGE KAĞAN,SATILMIŞ HAMİ,ŞAHİN VAROL,AKLEYLEK SEDAT
  • A lightweight post-quantum authentication framework for next-generation satellite communication standards - SEYHAN KÜBRA,AKLEYLEK SEDAT,Vazquez Castro Angeles
  • Adaptive PageRank for systemic risk evaluation in interconnected PNT systems - ARAT FERHAT,AKLEYLEK SEDAT
  • A New Optimized Implementation of SMAUG-T for Lightweight Devices - Narlı Oğuz,KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT
  • A survey on security threats and authentication approaches in wireless sensor networks - AKLEYLEK SEDAT,KARAKAYA AYKUT
  • PQ-FLAT: A New Quantum-Resistant And Lightweight Authentication Approach for M2M Devices - Karacan Engin,AKLEYLEK SEDAT,KARAKAYA AYKUT
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • On the Construction of $4 \times 4$ Lightweight Involutory MDS Matrices Over $\mathbb {F}_{2^{8}}$ - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m - KURT PEHLİVANOĞLU MELTEM, DEMİR MEHMET ALİ, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - DEMİR MEHMET ALİ,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • Binary Finite Field Extensions for Diffusion Matrices over the Finite Field F2m - KURT PEHLİVANOĞLU MELTEM, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
  • On the design strategies of diffusion layers and key schedule in lightweight block ciphers - KURT PEHLİVANOĞLU MELTEM,AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA,DURU NEVCİHAN
  • A New Analysis Tool for Confusion and Diffusion Layers of Block Ciphers - Demir Mehmet Ali,KURT PEHLİVANOĞLU MELTEM,SAVAŞTÜRK PINAR,ÖZTÜRK EMİR,SAKALLI MUHARREM TOLGA,AKLEYLEK SEDAT
  • CODE-BASED CRYPTOSYSTEMS MCNIE REVISITED - AKLEYLEK SEDAT, AYDOĞMUŞ EBUBEKİR, SINAK AHMET
  • Anomaly Detection with Machine Learning Models Using API Calls - ŞAHİN VAROL,SATILMIŞ HAMİ,YAZAR BİLGE KAĞAN,AKLEYLEK SEDAT
  • A study on the use of quantum computers, risk assessment and security problems - ARSLAN BİLGEHAN,ÜLKER MEHTAP,SAĞIROĞLU ŞEREF,AKLEYLEK SEDAT
  • A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules - SEYHAN KÜBRA,AKLEYLEK SEDAT
  • Smaug Kem to Smaug-PAKE: A Generic Lattice-Based Password Authenticated Key Exchange - SEYHAN KÜBRA,AKLEYLEK SEDAT
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • Formal specification and model checking of Saber lattice-based key encapsulation mechanism in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • A SURVEY ON DIGITAL RIGHTS MANAGEMENT - AKLEYLEK SEDAT,SOYSALDI MERYEM,KARHAN ZEHRA,ŞAHİN DURMUŞ ÖZKAN
  • Comparison of Regression Methods in Permission Based Android Malware Detection - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - AKLEYLEK SEDAT, SEYHAN KÜBRA, DURSUN AHMET FARUK
  • On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers - KURT PEHLİVANOĞLU MELTEM, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA, DURU NEVCİHAN
  • On the Construction Structures of 3 × 3 Involutory MDS Matrices over F2^m - KURT PEHLİVANOĞLU MELTEM, Demir Mehmet Ali, BÜYÜKSARAÇOĞLU SAKALLI FATMA, AKLEYLEK SEDAT, SAKALLI MUHARREM TOLGA
  • Kuantum Sonrası Güvenilir Yeni Kimlik Doğrulama Şeması - AKLEYLEK SEDAT, SOYSALDI ŞAHİN MERYEM
  • End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc) - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • QUANTUM SECURE INSTANT MESSAGING: REVISITED - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices - DURSUN AHMET FARUK, SEYHAN KÜBRA, AKLEYLEK SEDAT
  • On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • A Novel Lattice-Based Threshold Ring Signature Scheme - AKLEYLEK SEDAT, SOYSALDI MERYEM
  • Post-Quantum Cryptography: A Snapshot of Standardization Efforts - AKLEYLEK SEDAT, SEYHAN KÜBRA
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • Formal specification and model checking of lattice-based key encapsulation mechanisms in Maude - Tran Duong Dinh, Ogata Kazuhiro, Escobar Santiago, AKLEYLEK SEDAT, Otmani Ayoub
  • A Three-Party Lattice-Based Hybrid PAKE Protocol with Anonymity - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları - SEYHAN KÜBRA, AKLEYLEK SEDAT
  • A Lattice-based Group Signature Scheme with Applications in Blockchain - SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
  • A novel identification scheme for post-quantum secure digital right management - AKLEYLEK SEDAT, SOYSALDI MERYEM
  • Challenges and Opportunities in Cryptography - AKLEYLEK SEDAT
  • New results on permission based static analysis for android malware - ŞAHİN DURMUŞ ÖZKAN, KURAL OĞUZ EMRE, AKLEYLEK SEDAT, KILIÇ ERDAL
  • Survey on Implementation of Lattice-based Identification Schemes - Murzaeva Azhar, SOYSALDI ŞAHİN MERYEM, AKLEYLEK SEDAT
  • IMPLEMENTATION OF LATTICE-BASED IDENTIFICATION SCHEMES IN C - Murzaeva Azhar, AKLEYLEK SEDAT
  • A Systematic Survey on Mobile Internet of Things Security - ARAT FERHAT, AKLEYLEK SEDAT
  • HARD PROBLEMS IN LATTICE-BASED CRYPTOGRAPHY: X-LWE - SEYHAN KÜBRA, AKLEYLEK SEDAT, KILIÇ ERDAL, ORUÇ YALÇIN
  • GPU Implementation of Quantum Secure ABC Cryptosystem on Cuda - AKLEYLEK SEDAT, Koyutürk Ramazan, KUTUCU HAKAN
  • Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network - KURAL OĞUZ EMRE, ŞAHİN DURMUŞ ÖZKAN, AKLEYLEK SEDAT, KILIÇ ERDAL, Ömüral Murat
  • TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER,AKLEYLEK SEDAT,ÖZÇELİK İBRAHİM
  • CHALLENGES AND OPPORTUNITIES IN CRYPTOGRAPHY: LATTICE-BASED AND CODE-BASED CRYPTOGRAPHY IN THE QUANTUM ERA WITH FORMAL ANALYSIS - AKLEYLEK SEDAT
  • Support Vector Machines: From Classical Version to Quantum - Decadjevi Gildas, AKLEYLEK SEDAT, Abdiu Gazmor, Halabi Omar
  • Efficient Implementations of Gauss-Based Sieving Algorithms - SATILMIŞ HAMİ,AKLEYLEK SEDAT
  • Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography - SATILMIŞ HAMİ,AKLEYLEK SEDAT
  • An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem - DURGUT RAFET,KUTUCU HAKAN,AKLEYLEK SEDAT
  • The Third International Conference onProblems of Cybernetics and Informatics - NURIYEV URFAT, EMMUNGİL LEVENT, AKLEYLEK SEDAT
  • A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale - AKLEYLEK SEDAT, KARAGÖL SERAP, KUTUCU HAKAN, MOHAMMADI RAMIN
  • TRCyberLab: An infrastructure for future internet and security studies - ÖZÇELİK İLKER, AKLEYLEK SEDAT, ÖZÇELİK İBRAHİM
  • Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms - AKLEYLEK SEDAT,SATILMIŞ HAMİ
  • Stocks Prices Prediction with Long Short-term Memory - AKŞEHİR ZİNNET DUYGU,KILIÇ ERDAL,AKLEYLEK SEDAT,Döngül Mesut,Coşkun Burak
  • A New 3-pass Zero-knowledge Lattice-based Identification Scheme - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • Permission Weighting Approaches in Permission Based Android Malware Detection - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,KILIÇ ERDAL
  • New Signature Algorithm Based on Concatenated Rank Codes - Mahdjoubi Roumaissa,AKLEYLEK SEDAT,Kenza Guenda
  • Efficient GeMSS Based Ring Signature Scheme - Demircioğlu Murat,AKLEYLEK SEDAT,CENK MURAT
  • Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme - Lee Wai Kong,AKLEYLEK SEDAT,Yap Wun She,Goi Bok Min
  • Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols - AKLEYLEK SEDAT,SEYHAN KÜBRA
  • Formal Analysis of MaTRU Cryptosystem - AKLEYLEK SEDAT,çevik nurşah
  • Kuantum Sonrası Güvenilir ABC Şifreleme Sisteminin Farklı Platformlardaki Uygulamaları - AKLEYLEK SEDAT,Koyutürk Ramazan
  • Open Source UTM Alternative ClearOS - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
  • A note on Knapsack Cryptosystems - AKLEYLEK SEDAT,EMMUNGİL LEVENT,NURIYEV URFAT
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye - EMMUNGİL LEVENT,AKLEYLEK SEDAT,NURIYEV URFAT
  • Securty of online Learning - NURIYEV URFAT,ÖZARSLAN SÜLEYMAN,AKLEYLEK SEDAT
  • Blok Zinciri Bileşenleri ve Uygulamaları Üzerine Bir Derleme - AKLEYLEK SEDAT,SEYHAN KÜBRA
  • A Bayesian Networks Application in Occupational Health and Safety - PEKEL EBRU,AKŞEHİR ZİNNET DUYGU,meto bilal,AKLEYLEK SEDAT,KILIÇ ERDAL
  • An Automated Vulnerable Website Penetration - Murzaeva Azhar,AKLEYLEK SEDAT
  • An Overview for the National Cyber Security Strategy - Ataç Cihan,AKLEYLEK SEDAT
  • GUI Based Ring Signature Scheme - AKLEYLEK SEDAT,Demircioğlu Murat,CENK MURAT
  • Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era - Lee Wai Kong,Goi Bok Min,Yap Wun She,Wong Denis Chee Keong,AKLEYLEK SEDAT
  • On the Analysis of Work Accidents Data by Using Data Preprocessing and Statistical Techniques - AKŞEHİR ZİNNET DUYGU,oruç yalçın,Elibol Ahmet,AKLEYLEK SEDAT,KILIÇ ERDAL
  • New quantum secure key exchange protocols based on MaTRU - AKLEYLEK SEDAT,Kaya Nurşah
  • New results on permission based static analysis for Android malware - ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE,AKLEYLEK SEDAT,KILIÇ ERDAL
  • Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
  • The Trend of Business Intelligence Adoption and Maturity - Qushem Umar Bin,Zeki Akram,Abubakar Adamu,AKLEYLEK SEDAT
  • Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow - AKLEYLEK SEDAT,ENGİN EMRE
  • Kuantum Sonrası Güvenilir Dijital Hak Yönetimi İçin Yeni Kimlik Doğrulama Protokolü - AKLEYLEK SEDAT,SOYSALDI MERYEM
  • Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması - AKLEYLEK SEDAT,Kaya Nurşah
  • Computing Square Roots in Prime Fields via Singular Elliptic Curves - AKLEYLEK SEDAT,KIRLAR BARIŞ BÜLENT
  • Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology - AKLEYLEK SEDAT,KUTUCU HAKAN,MOHAMMADI RAMIN
  • Strassen-like 2x2 Matrix Squaring Revisited - AKLEYLEK SEDAT,ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE
  • Strassen-like 2x2 Matrix Squaring Revisited - AKLEYLEK SEDAT,ŞAHİN DURMUŞ ÖZKAN,KURAL OĞUZ EMRE
  • Modified Arithmetic Circuits for Galois Rings - KURAL OĞUZ EMRE,ŞAHİN DURMUŞ ÖZKAN,AKLEYLEK SEDAT,ALKIM ERDEM
  • An Efficient Lattice Based Signature Scheme with Provably Secure Instantiation - AKLEYLEK SEDAT,Bindel Nina,Buchmann Johannes,Kramer Juliane,Marson Giorgia
  • A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks - AKLEYLEK SEDAT,Mohammadi Ramin
  • Some Results on MDS Matrices - AKLEYLEK SEDAT,SAKALLI MUHARREM TOLGA
  • Speeding up Number Theoretic Transform Lazy Reductions Explained - AKLEYLEK SEDAT,ALKIM ERDEM
  • Efficient Methods for Lattice based Cryptography - AKLEYLEK SEDAT
  • Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography - AKLEYLEK SEDAT
  • Post Quantum Cryptography An Introduction - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice Based Cryptography - AKLEYLEK SEDAT
  • Efficient Arithmetic for Lattice Based Cryptography on GPU Using CUDA - AKLEYLEK SEDAT,Yüce Tok Zaliha
  • Data Storage of Electronic Exams - Ölçüoğlu Lütfi Tarkan,AKLEYLEK SEDAT
  • Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers - AKLEYLEK SEDAT,Diker Yücel Melek
  • Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta - AKLEYLEK SEDAT,YILDIRIM HAMDİ MURAT,Yüce Zaliha
  • Elliptic Curves in Cryptography - Akleylek Sedat, Akyıldız Ersan
  • E imza ve Kayıtlı Elektronik Posta - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice Based Cryptography - AKLEYLEK SEDAT
  • Arithmetic Operations in Lattice based Cryptography - AKLEYLEK SEDAT
  • Multiplication in a Galois Ring - AKLEYLEK SEDAT,ÖZBUDAK FERRUH
  • On the Efficiency of Polynomial Multiplication for Lattice Based Cryptography on GPUs using CUDA - AKLEYLEK SEDAT,Özgür Dağdelen,Zaliha Tok Yüce
  • Polynomials over Finite Fields and Some Applications in Cryptography - AKLEYLEK SEDAT
  • Bilgi ve İletişim Güvenliğinde Matematik Kriptografi - Akleylek Sedat, Akyıldız Ersan
  • SMS PGP Şifreli ve e imzalı Mobil SMS Uygulaması - Akleylek Sedat, Özcan Ahmet Ertuğrul
  • SMS Yönlendiren Casus Yazılım Uygulaması - Akleylek Sedat, Başal Mehmet, Hamzaçebi Ensar, Kara Burak
  • Steganography and New Implementation of Steganography - Akleylek Sedat, Nuriyev Urfat
  • Kriptolojideki Gelişmeler - Akyıldız Ersan, Akleylek Sedat
  • Kriptografi ve Siber Güvenlik - Akleylek Sedat, Yüce Zaliha
  • Atutor Öğrenme İçerik Yönetim Sistemi - Akleylek Sedat, Emmungil Levent
  • Groups Used in Diffie Hellman Key Agreement - Akyıldız Ersan, Akleylek Sedat
  • Improving the Security of Open Source Learning Content Management Systems - Akleylek Sedat, Emmungil Levent
  • Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Turkey - Akleylek Sedat, Emmungil Levent, Nuriyev Urfat
  • PKI Lite A PKI System with Limited Resources - Akleylek Sedat, Yayla Oğuz
  • Technical Requirements for Online Education Support - Akleylek Sedat, Emmungil Levent
  • Pairing Based Cryptography A Survey - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Arithmetic on Pairing Friendly Fields - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Short Signature Scheme from Bilinear Pairings 1 - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Short Signature Scheme from Bilinear Pairings - Akleylek Sedat, Kırlar Barış Bülent, Sever Ömer, Yüce Zaliha
  • Modified Discrete Fourier Transform for Efficient Polynomial Multiplication - Akleylek Sedat, Cenk Murat, Özbudak Ferruh
  • Speeding Up Montgomery Modular Multiplication For Prime Fields - Akleylek Sedat, Cenk Murat
  • A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication - Akleylek Sedat, Cenk Murat, Özbudak Ferruh
  • Open Source UTM Alternative - Akleylek Sedat, Emmungil Levent, Nuriyev Urfat
  • Hermite Polynomial Representation for Finite Fields of Characteristic Three - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • Charlier Polynomial Representation for Finite Fields of Characteristic Three - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • On the Multiplication over Finite Fields of Characteristic Three in Hermite Polynomial Representation - Akleylek Sedat, Özbudak Ferruh, Özel Canan
  • Kriptografik Modüllerin Güvenlik Gereksinimleri - Akleylek Sedat, Karaalan Halil
  • On the Security Requirements of Cryptographic Modules - Akleylek Sedat, Karaalan Sedat
  • New classes of permutation polynomials over finite fields of odd characteristic - Akleylek Sedat, Saygı Zülfükar
  • RSA Kriptosisteminin Güvenlik Analizi Üzerine Bir Derleme - Öncül Ali Burak, Akleylek Sedat

Kitaplar

  • Communications in Computer and Information Science – Springer Nature Link
  • Futuristic Computational Systems and Advanced Engineering for the Society – Springer, Cham
  • A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems – Springer, Cham
  • Siber Güvenlik ve Savunma Biyometrik ve Kriptografik Uygulamalar – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer Cham
  • Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer International Publishing
  • Smart Applications with Advanced Machine Learning and Human-Centred Problem Design – Springer International Publishing
  • Handbook of Formal Analysis and Verification in Cryptography – Taylor Francis CRC Press
  • Siber Güvenlik ve Savunma Problemler ve Çözümler – GrafikerYayın
  • Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi) – PALME YAYINCILIK
  • Cybersecurity for Critical Infrastructure Protection via Reflection of Industrial Control Systems – IOS Press Ebooks
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Siber Güvenlik ve Savunma: Siber Güvenlik Ontolojisi, Tehditler ve Çözümler – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji – Nobel
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
  • Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji – Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti.
  • PROCEEDINGS OF 14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY – IEEE
  • Siber Güvenlik ve Savunma: Blokzincir ve Kriptoloji – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • proceedings of the 13th international conference on information security and cryptography – ieee
  • PROCEEDINGS OF 13TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY – IEEE
  • SİBER GÜVENLİK VE SAVUNMA : BİYOMETRİK VE KRİPTOGRAFİK UYGULAMALAR – NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ.
  • 12. ULUSLARARASI BİLGİ GÜVENLİĞİ VE KRİPTOLOJİ KONFERANSI BİLDİRİ KİTABI – BİLGİ GÜVENLİĞİ DERNEĞİ
  • SİBER GÜVENLİK VE SAVUNMA : PROBLEMLER ÇÖZÜMLER – GRAFİKER
  • Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II – Grafiker Yayınları
  • Authentication Technologies for Cloud Technology, IoT, and Big Data – The Institution of Engineering and Technology (The IET)
  • Proceedings of ISCTURKEY 2016 – Bilgi Güvenliği Derneği
  • Cryptography and Information Security in the Balkans – Springer
  • Algoritmalara Giriş – Palme Yayınevi
  • Handbook of Codes and Sequences with Applications in Communication Computing and Information Security – Chapman and Hall/CRC
  • Şifrelerin Matematiği Kriptografi – ODTÜ Geliştirme Vakfı Yayıncılık
  • Improving Information Security Practices through Computational Intelligence – IGI Global
  • Computer and Information Sciences – Springer

Ödüller

  • Yılın Tezi Ödülü – 2012
  • Misafir Araştırmacı – 2012
  • Yurtdışı Araştırma – 2012
  • Yayın Teşvik – 2012
  • Yayın Teşvik – 2013
  • COST Action IC1306 School on Cryptographic Attacks katılım bursu – 2014
  • TÜBİTAK 2242 Yazılım Projeleri Yarışması Sosyal Yaşam ve Eğlence Uygulamaları alanında ikincilik ödülü alan “SMS-PGP Mobil Uygulaması” başlıklı projeye akademik danışmanlık – 2014
  • Yılın Genç Bilim İnsanı – 2011
  • Yurt Dışı Doktora Sonrası Araştırma – 2014
  • Yayın Teşvik – 2014
  • YayınTeşvik – 2014
  • Yayın Teşvik – 2015
  • Best Paper Award – 2016
  • CSAW Applied Research Competition – 2016
  • ODTÜ Yılın Tezi Ödülü (Tez Danışmanı) – 2017
  • En İyi Bildiri Ödülü – 2017
  • CSAW MENA Finalist – 2017
  • OMÜ Yılın Tezi Ödülü (Tez Danışmanı) – 2025
Prof. Dr. Sedat Akleylek - İstinye Üniversitesi
sedat.akleylekistinye.edu.tr

Çalışma Alanları

  • Mühendislik Temel Alanı
  • Bilgisayar Bilimleri ve Mühendisliği
  • Bilgisayar-Bilişim Bilimleri ve Mühendisliği

0850 283 60 00

info@istinye.edu.tr

         
google_play
ISU

Dipnot

  • ÖĞRENCİ
    • Akademik Takvim
    • Servis Saatleri
    • Duyurular
    • Öğrenci Bilgi Sistemi
  • ADAY
    • Ön Lisans Programları
    • Lisans Programları
    • Lisansüstü
    • Sürekli Eğitim Merkezi
  • İSTİNYE
    • Basın Kiti
    • İhaleler
    • İstinye Post
    • Kampüslerimiz

0850 283 60 00

info@istinye.edu.tr

         
app_store google_play

© Tüm hakları saklıdır, İstinye Üniversitesi

  • MLPCARE
  • istinye medicalPark
  • W Hospital