|
Print Staff CV |
|
Print Staff CV |
G. Tuncay, F.B. Sakallı, M.P. Kurt, G.G. Yılmazgüç, S. Akleylek, M.T. Sakallı 2023. A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions. PeerJ Comput. Sci. 9:e1577 DOI 10.7717/peerj-cs.1577 (August 2023) |
M. K. Pehlivanoğlu, F. B. Sakallı, S. Akleylek, M. T. Sakallı, On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form, IEEE Access, 11 (2023), 32708-32715, doi: 10.1109/ACCESS.2023.3262924 (April 2023) |
B. Aslan, F.Y. Aslan, M.T. Sakallı, Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications , Security and Communication Networks, vol. 2020, Article ID 8837671, 15 pages, 2020. doi:10.1155/2020/8837671 (November 2020) |
M.T. Sakallı, S. Akleylek, K. Akkanat, V. Rijmen, On the automorphisms and isomorphisms of MDS matrices and their efficient implementations, Turkish Journal of Electrical Engineering & Computer Sciences 28 (1) (2020) 275-287, doi:10.3906/elk-1906-151 (January 2020) |
G.G. Güzel, M.T. Sakallı, S. Akleylek, V. Rijmen, Y. Çengellenmiş, A new matrix form to generate all 3x3 involutory MDS matrices over F_{2^m}, 147 (2019) 61-68, Information Processing Letters, 10.1016/j.ipl.2019.02.013 (March 2019) |
M.K. Pehlivanoğlu, M.T. Sakallı, S. Akleylek, N. Duru, V. Rijmen, Generalization of Hadamard Matrix to Generate Involutory MDS Matrices for Lightweight Cryptography, 12 (4) (2018) 348-355, IET Information Security, doi: 10.1049/iet-ifs.2017.0156 (January 2018) |
S. Akleylek, V. Rijmen, M.T. Sakallı, E. Öztürk, Efficient Methods to Generate Cryptographically Significant Binary Diffusion Layers, IET Information Security, 11 (4) (2017) 177-187, doi: 10.1049/iet-ifs.2016.0085 (August 2016) |
S. Akleylek, M.T. Sakallı, E. Öztürk, A.Ş. Mesut, G. Tuncay, Generating binary diffusion layers with maximum/high branch numbers and low search complexity, Security and Communication Networks, 9 (16) (2016) 3558-3569,doi: 10.1002/sec.1561 (June 2016) |
M. T. Sakallı, S. Akleylek, B. Aslan, E. Buluş, F. B. Sakallı, On the Construction of 20x20 and 24x24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions, Mathematical Problems in Engineering, vol. 2014, Article ID 540253, 12 pages, 2014. doi:10.1155/2014/540253 (November 2014) |
M.T. Sakallı, B. Aslan, On the algebraic construction of cryptographically good 32×32 binary linear transformations, Journal of Computational and Applied Mathematics 259 (2014) 485-494 (May 2013) |
O. Karaahmetoğlu, M.T. Sakallı, E. Buluş, I. Tutanescu, A new method to determine algebraic expression of power mapping based S-boxes, Information Processing Letters 113 (7) (2013) 229-235 (April 2013) |
M.K. Pehlivanoğlu, S. Akleylek, M.T. Sakallı, N. Duru, On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers, Uluslararası Bilgisayar Bilimleri ve Mühendisliği Konferansı (UBMK 2017), Antalya-Turkey (October 2017) |
M.K. Pehlivanoğlu, N. Duru, M.T. Sakallı, Sonlu Cisimler Teorisine Dayalı Gri Seviye Görüntü İşleme, Bilecik Şeyh Edebali Fen Bilimleri Dergisi, 3(2): 10-17 (December 2016) |
A.Şahin, E.Buluş, M.T.Sakallı, 24-Bit Renkli Resimler Üzerinde En Önemsiz Bite Ekleme Yöntemini Kullanarak Bilgi Gizleme, Trakya Üniversitesi Fen Bilimleri Dergisi, 17-22, Edirne-Türkiye (June 2006) |
O. Karaahmetoğlu, M.T. Sakallı, E. Buluş, AES S-kutusuna Benzer S-kutularının Cebirsel İfadelerini Elde Etmek İçin Yeni Bir Yöntem, 3. Ağ ve Bilgi Güvenliği Sempozyumu, Booklet of Abstracts Page 12, Ankara-Türkiye (February 2010) |
A.Ş. Mesut, A. Mesut, M.T. Sakallı, Görüntü Steganografide Gizlilik Paylaşım Şemalarının Kullanılması ve Güvenliğe Etkileri, 3. Ağ ve Bilgi Güvenliği Sempozyumu, Booklet of Abstracts Page 13, Ankara-Türkiye (February 2010) |
O. Karaahmetoğlu, M.T. Sakallı, E.Buluş, GF(2^8) de Tasarlanan Bir S-kutusunun Cebirsel İfadesinin Lagrange İnterpolasyonu Yöntemiyle Elde Edilmesi, IV. İletişim Teknolojileri Ulusal Sempozyumu (İTUSEM), 53-58, Adana-Türkiye (October 2009) |
B. Aslan, M.T. Sakallı, S-Kutularının Kriptografik Özellikleri, Elektrik - Elektronik- Bilgisayar Mühendisliği Sempozyumu (ELECO 2008), Bursa-Türkiye (November 2008) |
A.Ş.Mesut, E. Buluş, M.T. Sakallı, H.N. Buluş, RQP Steganalizde Renk Çiftleri Arasındaki Yakınlık Derecesi Seçiminin Resmin İçindeki Gizli Bilginin Sezilmesine Etkisi, 2. Ağ ve Bilgi Güvenliği Ulusal Sempozyumu (ABG 2008), 1-5, Girne-Kıbrıs (May 2008) |
M.T. Sakallı, Kriptografik Test Yöntemleri ve Kriptoanaliz, Book Chapter, BGD Siber Güvenlik ve Kitap Serisi 2 kapsamında Siber Güvenlik ve Savunma: Problemler ve Çözümler. (June 2019) |
IEEE Transactions on Very Large Scale Integration Systems (May 2017) |
IET Information Security (January 2016) |
Turkish Journal of Electrical Engineering & Computer Sciences (January 2016) |
Turkish Journal of Electrical Engineering & Computer Sciences (April 2015) |
Technical Gazette (March 2015) |
Turkish Journal of Electrical Engineering & Computer Sciences (March 2015) |
The Computer Journal (March 2015) |
Technical Gazette (February 2015) |
IEEE Transactions on Education (February 2015) |
Security and Communication Networks (SCI-E), Wiley (January 2015) |
TUBITAK-Panelist |
Security and Communication Networks (SCI-E), Wiley (December 2014) |
TÜBİTAK-External Consultancy |
Computer Applications in Engineering Education (SCI-E), Wiley (May 2013) |
International Journal of Physical Sciences (March 2013) |
Concurency and Computation: Practice and Experience (SCI), Wiley (August 2012) |
Security and Communication Networks (SCI-E), Wiley (April 2012) |