Berkant Ustaoğlu

publications

Journal Publications
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations
Sanjit Chatterjee, Berkant Ustaoğlu,
in Advances of Mathematics of Communications, 2019
doi
A practical privacy-preserving targeted advertising scheme for IPTV users
Leyli Javid Khayati, Cengiz Ogrencik, Erkay Savas, Berkant Ustaoğlu,
in International Journal of Information Security, 2016
BibTeX, doi, view pdf
id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoğlu, Kazuki Yoneyama
in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2013
BibTeX, electronic link
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2013
BibTeX, electronic link
Anonymity and one-way authentication in key exchange protocols
Ian Goldberg, Douglas Stebila, Berkant Ustaoğlu,
in Designs, Codes and Cryptography, 2012
BibTeX, doi
Strongly Secure Authenticated Key Exchange without NAXOS' approach under Computational Diffie-Hellman Assumption
Minkyu Kim, Atsushi Fujioka, Berkant Ustaoğlu,
in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2012
BibTeX, electronic link
Integrating identity-based and certificate-based authenticated key exchange protocols
Berkant Ustaoğlu,
in International Journal of Information Security, 2011
BibTeX, doi
On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols
Alfred Menezes, Berkant Ustaoğlu,
in International Journal of Applied Cryptography (IJACT), 2010
BibTeX, doi, pdf
Invalid-Curve Attacks on (Hyper)elliptic Curve Cryptosystems
Koray Karabina, Berkant Ustaoğlu,
in Advances of Mathematics of Communications, 2010
BibTeX, doi, pdf
Comparing the Pre- and Post-specified Peer Models for Key Agreement
Alfred Menezes, Berkant Ustaoğlu,
in International Journal of Applied Cryptography (IJACT), 2009
BibTeX, doi, pdf
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoğlu,
in Designs, Codes and Cryptography, 2008
BibTeX, doi, pdf, extended version, about
Peer Reviewed Conference and Workshop Publications
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
in Information Security and Privacy -- ACISP 2012
BibTeX, doi
A Generic Variant of NIST’s KAS2 Key Agreement Protocol
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
in Information Security and Privacy -- ACISP 2011
BibTeX, doi
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
in Progress in Cryptology -- INDOCRYPT 2010
BibTeX, doi
Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu,
in Pairing-Based Cryptography -- Pairing 2010
BibTeX, doi
Reusing Static Keys in Key Agreement Protocols
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
in Progress in Cryptology -- INDOCRYPT 2009
BibTeX, doi, extended version
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
in Information Security and Cryptology -- ICISC 2009
BibTeX, doi, pdf
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
Berkant Ustaoğlu,
in Provable Security: Third International Conference, ProvSec 2009
BibTeX, doi, extended version
Multi-party Off-the-Record Messaging
Ian Goldberg, Berkant Ustaoğlu, Matthew Van Gundy, Hao Chen,
in CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security
BibTeX, doi, ACM Author-izer (pdf)
Strongly Secure Authenticated Key Exchange without NAXOS' approach
Minkyu Kim, Atsushi Fujioka, Berkant Ustaoğlu,
in International Workshop on Security -- IWSEC2009
BibTeX, doi, pdf
Towards Denial-of-Service-Resilient Key Agreement Protocols
Douglas Stebila, Berkant Ustaoğlu,
in Information Security and Privacy -- ACISP 2009
BibTeX, doi, pdf
Comparing the Pre- and Post-specified Peer Models for Key Agreement
Alfred Menezes, Berkant Ustaoğlu,
in Information Security and Privacy -- ACISP 2008
BibTeX, doi, extended version
Security arguments for the UM key agreement protocol in the NIST SP800-56A standard
Alfred Menezes, Berkant Ustaoğlu,
in ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, Computer and Communications Security
BibTeX, doi, ACM Author-izer (pdf)
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Alfred Menezes, Berkant Ustaoğlu,
in Progress in Cryptology -- INDOCRYPT 2006
BibTeX, doi, pdf
Miscellaneous non-refereed publications
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity based key agreement protocols
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu,
Cryptology ePrint Archive, Report 2009/423
BibTeX, pdf
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
Berkant Ustaoğlu,
Cryptology ePrint Archive, Report 2009/353
BibTeX, pdf
Efficient Key Exchange with Tight Security Reduction
Jiang Wu, Berkant Ustaoğlu,
Cryptology ePrint Archive, Report 2009/288
BibTeX, pdf
Obtaining a secure and effcient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoğlu,
Cryptology ePrint Archive, Report 2007/123
BibTeX, pdf