Koç UniversityComputer EngineeringCrypto Search
ENTR
  • People
  • Work with Us
  • Research
    • Publications
    • Projects
    • Patents
  • Lectures and Videos
    • Proofs in Cryptography
    • Pathway to Crypto
    • Presentations
    • Computation and Complexity
    • Kuulfact
    • Crypto Puzzles
    • Interesting Papers
    • Must-See Videos
  • Download
  • Events and Announcements
  • People
  • Work with Us
  • Research
  • Publications
  • Projects
  • Patents
  • Lectures and Videos
  • Proofs in Cryptography
  • Pathway to Crypto
  • Presentations
  • Computation and Complexity
  • Kuulfact
  • Crypto Puzzles
  • Interesting Papers
  • Must-See Videos
  • Download
  • Events and Announcements
Type the word you want to search for and press ENTER.
A-Z Content, Page Guide
ABC-ÇDEFGHI-İJKLMNO-ÖPQRS-ŞTU-ÜW
[
[Deadline Approaching, July 10] 15th International Workshop on Data Privacy Management (DPM 2020)
A
ACM Security and Privacy ConferenceACM CPSS’16 Call For PapersAnkara'da TOBB ETÜ Siber Güvenlik Günü (Cyber Security Day in Ankara)
B
Brownie CashlibBar-Ilan Winter School on Cryptography - Secure Key ExchangeBilkent Dergi (Türkçe)BTK Eğitsel Temalı Dijital Oyun Maratonu Yarışması 2018Bilim Şenliği (Türkçe)British Academy announces first recipients of prestigious Newton Advanced FellowshipsBilinear Pairings in CryptographyBasic FTP Password AttackBalkanCryptSec 2014BalkanCryptSec 2015
C-Ç
Computation and ComplexityCryptography-Security-PrivacyCircleCrypto PuzzlesCrypto for CloudCloud ComputationCurrent ProjectsCyber-Physical Security Education (CPS Ed) Workshop 2017Cryptographic Engineering Course: June 19-23, 2017CRYPTO@KU Game Theory ExperimentCall for Papers: Financial Cryptography and Data Security (FC'21), submit by Sep 24CHES 2013Cross-Site request forgery (CSRF)COST Action IC1306 School on Cryptographic AttacksCall for Papers: UBMK 2021Call for Papers: DPM2021 - Data Privacy Management International Workshop [ESORICS-2021]CHIST-ERA Conference 2015Call for Papers: ISC 2019 (Information Security Conference)Chinese University of Hong Kong Ph.D. FellowshipsCrossFyre 2016 (mainly for female phd students)Call for Papers: SINCONF 2021- 14th International Conference on Security of Information and Networks December 15th – 17thCall for Papers: SİU 2022
D
Divisible by 6DownloadDETIPS 2020 Interdisciplinary WorkshopData Privacy Management International Workshop (DPM) 2019
E
Events and AnnouncementsEurocrypt 2013ECC 2016: Workshop on Elliptic Curve Cryptography & Computational Algebraic Number Theory School
F
Future ProjectsFair ExchangeFast Software Encryption 2015Future of Cryptographic Engineering WebinarFung Graduate Fellowships for Academic Year 2016-17 for PhD students from China or Hong Kong
G
Going from 2011 to 2012Genetic Authentication on the CloudGelecekte kriptolu iş modelleri gençlere ne söz veriyor? / What are the promises of crypto business models to young people in the future?
H
Hidden Message
I-İ
Interesting PapersIEEE UBMK 2017IEEE International Conference on Computer Science and Engineering UBMK 2018IEEE SecDev 2018I. TUBITAK Blockchain Workshop 2018IEEE Global Communications Conference 2018International Conference on Smart Grid 2018IEEE Computing NowIACR EprintINET IstanbulISDFS 2014International Conference on Provable Security (ProvSec 2014)IEEE BigData Conference Scalable Cloud Data Management Workshop 2014International Conference on Provable Security (ProvSec 2015)IC1206 De-Identification for Privacy Protection in Multimedia Content Training SchoolISCTürkiye 2015 ConferenceInternational Cyber Security Workshop at İstanbul Gelişim University between May 23 and 27 , 2016IEEE BigData Workshop on Scalable Cloud Data Management 2016
J
Join
K
KuulfactKripto Zirvesi (Türkçe)Koç University Frontier Magazine Issue 8 Page 41Koç University Frontier Magazine Issue 7 Pages 21-23KeyID ScholarshipKriptoloji Yaz OkuluKripto Zirvesi
L
LinksLectures and VideosLight Blue Touchpaper by the Computer Laboratory Security Group, University of Cambridge
M
Must-See VideosMODAP 2011Malware 2019 CFP - Deadline for submission almost here
N
Nine-Point Circle Theorem
O-Ö
Online Articles and OpinionsOutsourced Databases
P
Publicity (News)Past ProjectsPassword-based AuthenticationPresentationsPathway to CryptoPeopleProofs in CryptographyPrivacy Enhancing Technologies Symposium (PETS / PoPETs 2018)PETS 2018PublicationsPET Award 2008 Runner-UpPatentsProjectsProvable Security 2015 (ProvSec)ProvSec 2016
Q
QWERTY
R
Reading GroupResearchReal World Cryptography Workshop 2015Real World Cryptography Conference RWC 2017
S-Ş
Sleep Sort (22/06/2011)SphereString Around the EarthStrictly IsoscelesSecurity and AttacksSearchable EncryptionSecure Cloud StorageSiber Güvenlik Platformu (Türkçe)Science Academy BAGEP 2016 Young Scientist AwardSecure Your Virtual Existence!Siber Güvenlik Çalıştayı 2011Siber Güvenlik Konferansı 2012Second International Workshop on Lightweight Cryptography for Security & PrivacySession Stealing over KUAIS (Koç University Academic Information System)Summer School on Mathematical and Practical Aspects of Fully Homomorphic Encryption and Multi-Linear MapsSummer School on Bitcoin and Blockchain Technologies in Greece
T
Thousands of linksThe Duties of Professors at Colleges and UniversitiesThe Health InsuranceTOBB ETU Security Research Group Online SeminarsTHE 26th IEEE SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE 2018The 6th International Symposium on Digital Forensic and Security 2018The FinancialTop cited security paperTest PageThe 10th BIU Winter School on Cryptography - Information Theoretic CryptographyThe 4th International Conference on Information and Communication SystemsTÜBİTAK - BİLGEM UEKAE Kriptoloji Yaz OkuluThe 6th Bar-Ilan Winter School on Cryptography
U-Ü
UBMK-20 Bildiri Gönderme Tarihi Uzatıldı
W
Work with UsWorkshop on De-identification for privacy protection in multimediaWorkshop on Applied Crypto & Hardware Security
I-İ
0.99999...
1
17th Cryptology And Network Security Conference (CANS2018)19th International Conference on Cryptology and Network Security (CANS 2020) is calling for papers1st CRYPTO@KU Workshop
2
20112. Ulusal Blokzincir Çalıştayı2020 ACM Cloud Computing Security (CCSW) at CCS - 10th Anniversary Edition2nd International CRYPTO@KU Workshop2015 Winter School on Cryptography at Bar-Ilan University2. Ulusal Kripto Günleri Çalıştayı2019 ACM Cloud Computing Security Workshop (CCSW) at CCS - 10th Anniversary Edition2019 IEEE Global Communications Conference: Communication & Information Systems Security2021 ACM Cloud Computing Security (CCSW) at CCS
3
3rd Workshop on Scalable Cloud Data Management
4
4. Ağ ve Bilgi Güvenliği Sempozyumu
5
5th Fibonacci
6
6th International Conference on Information Security and Cryptology
7
7th Bar-Ilan Winter School on Cryptography - Differential Privacy

Posts navigation

1 2 … 4 Next →

    Search

    Recent Posts

    • On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages
    • A Scalable Blockchain Based Digital Rights Management System
    • GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers
    • Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model
    • Exploring Lightweight Efficiency of ForkAES

    Recent Comments

      Archives

      • October 2019
      • September 2019
      • August 2019
      • July 2019
      • June 2019
      • May 2019
      • April 2019
      • March 2019
      • February 2019
      • December 2018
      • November 2018
      • August 2018

      Categories

      • IACR Eprint

      Meta

      • Log in
      • Entries feed
      • Comments feed
      • WordPress.org
    Download Our Mobile App
    Contact

    Rumelifeneri Yolu 34450
    Sarıyer, İstanbul / Türkiye

    gsse@ku.edu.tr
    Phone (central): 0212 338 1000 Fax: +90 212 338 15 48
    Access to Campuses and
    Transportation Services
    © 2023 Koç University