Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Alptekin Küpçü"'
Efficient ECC Processor Designs for IoT Using Edwards Curves and Exploiting FPGA Embedded Components
Publikováno v:
IEEE Access, Vol 12, Pp 167183-167200 (2024)
Elliptic Curve Cryptography (ECC) provides high security with shorter key sizes and higher performance. Internet of Things (IoT) is the interconnected network where a vast number of connected devices require high security to ensure data integrity and
Externí odkaz:
https://doaj.org/article/c6c60468d2a641a8863e0415140b5b59
Training deep neural networks often forces users to work in a distributed or outsourced setting, accompanied with privacy concerns. Split learning aims to address this concern by distributing the model among a client and a server. The scheme supposed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7eee24824b59aeccd1c5b43f1e3ead79
https://hdl.handle.net/11693/111765
https://hdl.handle.net/11693/111765
Distributed deep learning frameworks such as split learning provide great benefits with regards to the computational cost of training deep neural networks and the privacy-aware utilization of the collective data of a group of data-holders. Split lear
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::34d8e901f4058e85f4f3060386a33c74
https://hdl.handle.net/11693/111764
https://hdl.handle.net/11693/111764
Autor:
Osman Biçer, Alptekin Küpçü
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 4, Pp 196-219 (2020)
E-cash and cryptocurrency schemes have been a focus of applied cryptography for a long time. However, we acknowledge the continuing need for a cryptographic protocol that provides global scale, decentralized, secure, and fair delivery of donations. S
Autor:
Mohammad Etemad, Alptekin Küpçü
Publikováno v:
ACM Computing Surveys
Ateniese et aL proposed the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data and called it the Dynamic Provable Data Possession (DPDP) model. The idea is that a client outsour
Publikováno v:
Turkish Journal of Electrical Engineering and Computer Sciences
Since its proposal by Eyal and Sirer (CACM '13), selfish mining attacks on proof-of-work blockchains have been studied extensively. The main body of this research aims at both studying the extent of its impact and defending against it. Yet, before an
Autor:
Alptekin Küpçü, Reihaneh Safavi-Naini
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030939434
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a1de3d2368eabaa865c5202db2aa3c8
https://doi.org/10.1007/978-3-030-93944-1_16
https://doi.org/10.1007/978-3-030-93944-1_16
Autor:
ALPTEKİN KÜPÇÜ, MOHAMMAD SADEQ DOUSTI
Publikováno v:
Turkish Journal of Electrical Engineering and Computer Sciences
In distributed computations and cryptography, it is desirable to record events on a public ledger, such that later alterations are computationally infeasible. An implementation of this idea is called blockchain, which is a distributed protocol that a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e653e18130e22483db7c27703f1ec3ae
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10454
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10454
Publikováno v:
2021 12th International Conference on Information and Communication Systems (ICICS).
In this work, an elliptic curve cryptography (ECC) processor is proposed. The ECC processor has been designed based on Edwards curves defined over the finite prime field GF((2(13)-1)(13)). Modular multiplication in the proposed ECC processor is carri
Autor:
Handan Kılınç Alper, Alptekin Küpçü
Publikováno v:
Lecture Notes in Computer Science
Applied Cryptography and Network Security ISBN: 9783030783716
ACNS (1)
Applied Cryptography and Network Security ISBN: 9783030783716
ACNS (1)
Multi-party fair exchange (MFE) considers scenarios where fairness means that either all exchanges as agreed upon between multiple parties take place, or no item changes hands. The two-party case was widely studied starting with the seminal work of A
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::27f9399736d93b59a9774d837937d467
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/9801
http://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/9801