Yazar "At, Nuray" için Makale Koleksiyonu listeleme
-
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (IEEE-Inst Electrical Electronics Engineers Inc, 2014)The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and ... -
Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs
San, İsmail; At, Nuray (2012)Cryptographic hash functions play a crucial role in networking and communication security, including their use for data integrity and message authentication. Keccak hash algorithm is one of the finalists in the next ... -
Convergence analysis of central and minimax algorithms in scalar regressor models
Akçay, Hüseyin; At, Nuray (Springer London LTD, 2006)In this paper, the estimation of a scalar parameter is considered with given lower and upper bounds of the scalar regressor. We derive non-asymptotic, lower and upper bounds on the convergence rates of the parameter estimate ... -
Efficient paillier cryptoprocessor for privacy-preserving data mining
San, İsmail; At, Nuray; Yakut, İbrahim; Polat, Hüseyin (Wiley-Hindawi, 2016)Paillier cryptosystem is extensively utilized as a homomorphic encryption scheme to ensure privacy requirements in many privacy-preserving data mining schemes. However, overall performance of the applications employing ... -
Improvements on deinterleaving of radar pulses in dynamically varying signal environments
Gençol, Kenan; Kara, Alpagutli; At, Nuray (Academic Press Inc Elsevier Science, 2017)An electronic support system receiver which is a passive receiver picks up an interleaved stream of pulses and extracts their pulse parameters. These parameters are sent to a deinterleaving subsystem which sorts them and ... -
Improving the computational efficiency of modular operations for embedded systems
San, İsmail; At, Nuray (Elsevier, 2014)Security protocols such as IPSec, SSL and VPNs used in many communication systems employ various cryptographic algorithms in order to protect the data from malicious attacks. Thanks to public-key cryptography, a public ... -
A low-area unified hardware architecture for the AES and the cryptographic hash function Grostl
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (Academic Press Inc Elsevier Science, 2017)This article describes the design of a compact 8-bit coprocessor for the Advanced Encryption standard (AES) (encryption, decryption, and key expansion) and the cryptographic hash function Grostl. Our Arithmetic and Logic ... -
Membership set identification with periodic inputs and orthonormal regressors
Akçay, Hüseyin; At, Nuray (Elsevier Science BV, 2006)In this paper, we study the central and the projection algorithms in membership-set estimation with periodic input signals and orthonormal basis functions for the special case that the number of the estimated parameters ... -
A wavelet-based feature set for recognizing pulse repetition interval modulation patterns
Gençol, Kenan; At, Nuray; Kara, Alpagutli (Tubitak Scientific & Technical Research Council Turkey, 2016)This paper presents a new feature set for the problem of recognizing pulse repetition interval (PRI) modulation patterns. The recognition is based upon the features extracted from the multiresolution decomposition of ...