- Journal Publications
-
- Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations
- Sanjit Chatterjee, Berkant Ustaoğlu,
- in Advances of Mathematics of Communications, 2019
- doi
- A practical privacy-preserving targeted advertising scheme for IPTV users
- Leyli Javid Khayati, Cengiz Ogrencik, Erkay Savas, Berkant Ustaoğlu,
- in International Journal of Information Security, 2016
- BibTeX, doi, view pdf
- id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
- Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoğlu, Kazuki Yoneyama
- in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2013
- BibTeX, electronic link
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
- Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
- in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2013
- BibTeX, electronic link
- Anonymity and one-way authentication in key exchange protocols
- Ian Goldberg, Douglas Stebila, Berkant Ustaoğlu,
- in Designs, Codes and Cryptography, 2012
- BibTeX, doi
- Strongly Secure Authenticated Key Exchange without NAXOS' approach under Computational Diffie-Hellman Assumption
- Minkyu Kim, Atsushi Fujioka, Berkant Ustaoğlu,
- in IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 2012
- BibTeX, electronic link
- Integrating identity-based and certificate-based authenticated key exchange protocols
- Berkant Ustaoğlu,
- in International Journal of Information Security, 2011
- BibTeX, doi
- On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols
- Alfred Menezes, Berkant Ustaoğlu,
- in International Journal of Applied Cryptography (IJACT), 2010
- BibTeX, doi, pdf
- Invalid-Curve Attacks on (Hyper)elliptic Curve Cryptosystems
- Koray Karabina, Berkant Ustaoğlu,
- in Advances of Mathematics of Communications, 2010
- BibTeX, doi, pdf
- Comparing the Pre- and Post-specified Peer Models for Key Agreement
- Alfred Menezes, Berkant Ustaoğlu,
- in International Journal of Applied Cryptography (IJACT), 2009
- BibTeX, doi, pdf
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Berkant Ustaoğlu,
- in Designs, Codes and Cryptography, 2008
- BibTeX, doi, pdf, extended version, about
- Peer Reviewed Conference and Workshop Publications
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
- Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
- in Information Security and Privacy -- ACISP 2012
- BibTeX, doi
- A Generic Variant of NIST’s KAS2 Key Agreement Protocol
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
- in Information Security and Privacy -- ACISP 2011
- BibTeX, doi
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
- in Progress in Cryptology -- INDOCRYPT 2010
- BibTeX, doi
- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities
- Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu,
- in Pairing-Based Cryptography -- Pairing 2010
- BibTeX, doi
- Reusing Static Keys in Key Agreement Protocols
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoğlu,
- in Progress in Cryptology -- INDOCRYPT 2009
- BibTeX, doi, extended version
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
- Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu,
- in Information Security and Cryptology -- ICISC 2009
- BibTeX, doi, pdf
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols
- Berkant Ustaoğlu,
- in Provable Security: Third International Conference, ProvSec 2009
- BibTeX, doi, extended version
- Multi-party Off-the-Record Messaging
- Ian Goldberg, Berkant Ustaoğlu, Matthew Van Gundy, Hao Chen,
- in CCS 2009: Proceedings of the 16th ACM conference on Computer and communications security
- BibTeX, doi, ACM Author-izer (pdf)
- Strongly Secure Authenticated Key Exchange without NAXOS' approach
- Minkyu Kim, Atsushi Fujioka, Berkant Ustaoğlu,
- in International Workshop on Security -- IWSEC2009
- BibTeX, doi, pdf
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Douglas Stebila, Berkant Ustaoğlu,
- in Information Security and Privacy -- ACISP 2009
- BibTeX, doi, pdf
- Comparing the Pre- and Post-specified Peer Models for Key Agreement
- Alfred Menezes, Berkant Ustaoğlu,
- in Information Security and Privacy -- ACISP 2008
- BibTeX, doi, extended version
- Security arguments for the UM key agreement protocol in the NIST SP800-56A standard
- Alfred Menezes, Berkant Ustaoğlu,
- in ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, Computer and Communications Security
- BibTeX, doi, ACM Author-izer (pdf)
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
- Alfred Menezes, Berkant Ustaoğlu,
- in Progress in Cryptology -- INDOCRYPT 2006
- BibTeX, doi, pdf
- Miscellaneous
non-refereed publications
- Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity based key agreement protocols
- Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu,
- Cryptology ePrint Archive, Report 2009/423
- BibTeX, pdf
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
- Berkant Ustaoğlu,
- Cryptology ePrint Archive, Report 2009/353
- BibTeX, pdf
- Efficient Key Exchange with Tight Security Reduction
- Jiang Wu, Berkant Ustaoğlu,
- Cryptology ePrint Archive, Report 2009/288
- BibTeX, pdf
- Obtaining a secure and effcient key agreement protocol from (H)MQV and NAXOS
- Berkant Ustaoğlu,
- Cryptology ePrint Archive, Report 2007/123
- BibTeX, pdf