Berna Ors Yalcin | Istanbul Technical University (original) (raw)
Uploads
Papers by Berna Ors Yalcin
2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Bookmarks Related papers MentionsView impact
2008 International Conference on Reconfigurable Computing and FPGAs, 2008
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2014
... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orh... more ... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orhun Kara Suleyman Kardas Timo Kasper Selcuk Kavut Yutaka Kawai Chong-Hee Kim Mehmet Sabır Kiraz Miroslav Knezevic ... 258 Elif Bilge Kavun and Tolga Yalcin Author Index ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and pr... more ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and provides protection for interviews against third parties including with service providers developed. GSM line is sensitive to human speech to be more efficient and provide more quality for transmission. In addition, a tool should be used to compress speech to transmit speech over GSM. For these reasons, speech cannot be transmitted to the GSM line directly after encrypted. In this study, the encrypted speech which is a digital data stream, formed speech like waveform by the designed coder to transmit through the GSM line. FPGA implementation of AES is used for encryption of digital data stream. Desired speech characteristics are obtained by scanning the database of NTIMIT, and then LBG algorithm is used to design codebooks which include speech parameters. A coder is designed to synthesize speech like waveforms from the encrypted digital data stream.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Lecture notes in computer …, 2004
Abstract. Since their publication in 1998, power analysis attacks have attracted significant atte... more Abstract. Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of (unpro-tected) implementations of symmetric and public-key encryption schemes. ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2016 24th Signal Processing and Communication Application Conference (SIU), 2016
Bookmarks Related papers MentionsView impact
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Bookmarks Related papers MentionsView impact
2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015
Bookmarks Related papers MentionsView impact
2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Bookmarks Related papers MentionsView impact
2008 International Conference on Application-Specific Systems, Architectures and Processors, 2008
Bookmarks Related papers MentionsView impact
IEEE Transactions on Mobile Computing, 2000
Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication pr... more Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that:(1) are based on well-established symmetric-key cryptographic building blocks;(2) require a reader complexity lower than O (N) where N is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, eg, access control in mass transportation. We describe existing protocols fulfilling these requirements ...
Bookmarks Related papers MentionsView impact
Final report, KU …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Topics in Cryptology–CT-RSA 2004, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Proceedings of the 14th ACM Great …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Field Programmable Logic …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Bookmarks Related papers MentionsView impact
2008 International Conference on Reconfigurable Computing and FPGAs, 2008
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2014
... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orh... more ... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orhun Kara Suleyman Kardas Timo Kasper Selcuk Kavut Yutaka Kawai Chong-Hee Kim Mehmet Sabır Kiraz Miroslav Knezevic ... 258 Elif Bilge Kavun and Tolga Yalcin Author Index ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and pr... more ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and provides protection for interviews against third parties including with service providers developed. GSM line is sensitive to human speech to be more efficient and provide more quality for transmission. In addition, a tool should be used to compress speech to transmit speech over GSM. For these reasons, speech cannot be transmitted to the GSM line directly after encrypted. In this study, the encrypted speech which is a digital data stream, formed speech like waveform by the designed coder to transmit through the GSM line. FPGA implementation of AES is used for encryption of digital data stream. Desired speech characteristics are obtained by scanning the database of NTIMIT, and then LBG algorithm is used to design codebooks which include speech parameters. A coder is designed to synthesize speech like waveforms from the encrypted digital data stream.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Lecture notes in computer …, 2004
Abstract. Since their publication in 1998, power analysis attacks have attracted significant atte... more Abstract. Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of (unpro-tected) implementations of symmetric and public-key encryption schemes. ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2016 24th Signal Processing and Communication Application Conference (SIU), 2016
Bookmarks Related papers MentionsView impact
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Bookmarks Related papers MentionsView impact
2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015
Bookmarks Related papers MentionsView impact
2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Bookmarks Related papers MentionsView impact
2008 International Conference on Application-Specific Systems, Architectures and Processors, 2008
Bookmarks Related papers MentionsView impact
IEEE Transactions on Mobile Computing, 2000
Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication pr... more Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that:(1) are based on well-established symmetric-key cryptographic building blocks;(2) require a reader complexity lower than O (N) where N is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, eg, access control in mass transportation. We describe existing protocols fulfilling these requirements ...
Bookmarks Related papers MentionsView impact
Final report, KU …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Topics in Cryptology–CT-RSA 2004, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Proceedings of the 14th ACM Great …, Jan 1, 2004
Bookmarks Related papers MentionsView impact
Field Programmable Logic …, Jan 1, 2004
Bookmarks Related papers MentionsView impact