Berna Ors Yalcin | Istanbul Technical University (original) (raw)

Uploads

Papers by Berna Ors Yalcin

Research paper thumbnail of Design of core blocks and implementation on a programmable logic controller for a train signalization system

2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m)

2008 International Conference on Reconfigurable Computing and FPGAs, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Radio Frequency Identification: Security and Privacy Issues

Lecture Notes in Computer Science, 2014

... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orh... more ... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orhun Kara Suleyman Kardas Timo Kasper Selcuk Kavut Yutaka Kawai Chong-Hee Kim Mehmet Sabır Kiraz Miroslav Knezevic ... 258 Elif Bilge Kavun and Tolga Yalcin Author Index ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure voice communication via GSM network

ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and pr... more ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and provides protection for interviews against third parties including with service providers developed. GSM line is sensitive to human speech to be more efficient and provide more quality for transmission. In addition, a tool should be used to compress speech to transmit speech over GSM. For these reasons, speech cannot be transmitted to the GSM line directly after encrypted. In this study, the encrypted speech which is a digital data stream, formed speech like waveform by the designed coder to transmit through the GSM line. FPGA implementation of AES is used for encryption of digital data stream. Desired speech characteristics are obtained by scanning the database of NTIMIT, and then LBG algorithm is used to design codebooks which include speech parameters. A coder is designed to synthesize speech like waveforms from the encrypted digital data stream.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of NESSIE, New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of European project IST-1999-12324: New European schemes for signatures, integrity, and encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance of optimized implementations of the NESSIE primitives

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Power Analysis of an FPGA (Implementation of Rijndael: Is Pipelining a DPA Countermeasure?)

Lecture notes in computer …, 2004

Abstract. Since their publication in 1998, power analysis attacks have attracted significant atte... more Abstract. Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of (unpro-tected) implementations of symmetric and public-key encryption schemes. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reliability analysis of MIPS-32 microprocessor register files designed with different fault tolerant techniques

2016 24th Signal Processing and Communication Application Conference (SIU), 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of RPL version number attacks: In-depth study

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fault tolerant register file design for MIPS AES-crypto microprocessor

2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Internet-of-Things security: Denial of service attacks

2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Low-cost implementations of NTRU for pervasive security

2008 International Conference on Application-Specific Systems, Architectures and Processors, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography

IEEE Transactions on Mobile Computing, 2000

Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication pr... more Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that:(1) are based on well-established symmetric-key cryptographic building blocks;(2) require a reader complexity lower than O (N) where N is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, eg, access control in mass transportation. We describe existing protocols fulfilling these requirements ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security and performance analysis of ARIA

Final report, KU …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Flexible hardware design for RSA and elliptic curve cryptosystems

Topics in Cryptology–CT-RSA 2004, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An FPGA implementation of an elliptic curve processor GF (2 m)

Proceedings of the 14th ACM Great …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Power analysis attacks against FPGA implementations of the DES

Field Programmable Logic …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of core blocks and implementation on a programmable logic controller for a train signalization system

2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m)

2008 International Conference on Reconfigurable Computing and FPGAs, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Radio Frequency Identification: Security and Privacy Issues

Lecture Notes in Computer Science, 2014

... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orh... more ... Dominikus Ozgur Ergul Albert Fernndez-Mir Flavio Garcia Yoshikazu Hanatani Michael Hutter Orhun Kara Suleyman Kardas Timo Kasper Selcuk Kavut Yutaka Kawai Chong-Hee Kim Mehmet Sabır Kiraz Miroslav Knezevic ... 258 Elif Bilge Kavun and Tolga Yalcin Author Index ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure voice communication via GSM network

ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and pr... more ABSTRACT In this study, a system is developed which communicates through GSM mobile phones and provides protection for interviews against third parties including with service providers developed. GSM line is sensitive to human speech to be more efficient and provide more quality for transmission. In addition, a tool should be used to compress speech to transmit speech over GSM. For these reasons, speech cannot be transmitted to the GSM line directly after encrypted. In this study, the encrypted speech which is a digital data stream, formed speech like waveform by the designed coder to transmit through the GSM line. FPGA implementation of AES is used for encryption of digital data stream. Desired speech characteristics are obtained by scanning the database of NTIMIT, and then LBG algorithm is used to design codebooks which include speech parameters. A coder is designed to synthesize speech like waveforms from the encrypted digital data stream.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of NESSIE, New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Final report of European project IST-1999-12324: New European schemes for signatures, integrity, and encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance of optimized implementations of the NESSIE primitives

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Power Analysis of an FPGA (Implementation of Rijndael: Is Pipelining a DPA Countermeasure?)

Lecture notes in computer …, 2004

Abstract. Since their publication in 1998, power analysis attacks have attracted significant atte... more Abstract. Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of (unpro-tected) implementations of symmetric and public-key encryption schemes. ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of New European Schemes for Signatures, Integrity, and Encryption

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reliability analysis of MIPS-32 microprocessor register files designed with different fault tolerant techniques

2016 24th Signal Processing and Communication Application Conference (SIU), 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of RPL version number attacks: In-depth study

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fault tolerant register file design for MIPS AES-crypto microprocessor

2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Internet-of-Things security: Denial of service attacks

2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Low-cost implementations of NTRU for pervasive security

2008 International Conference on Application-Specific Systems, Architectures and Processors, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography

IEEE Transactions on Mobile Computing, 2000

Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication pr... more Abstract In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that:(1) are based on well-established symmetric-key cryptographic building blocks;(2) require a reader complexity lower than O (N) where N is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, eg, access control in mass transportation. We describe existing protocols fulfilling these requirements ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Security and performance analysis of ARIA

Final report, KU …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Flexible hardware design for RSA and elliptic curve cryptosystems

Topics in Cryptology–CT-RSA 2004, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An FPGA implementation of an elliptic curve processor GF (2 m)

Proceedings of the 14th ACM Great …, Jan 1, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Power analysis attacks against FPGA implementations of the DES

Field Programmable Logic …, Jan 1, 2004

Bookmarks Related papers MentionsView impact