Graduate School of Applied Mathematics

Browse
Search within this community and its collections:
Collections in this community

Filters

Entity Type
Publication (633)
Thesis (412)
Project (87)
Researcher (28)
Open Course (1)

Has File(s)
No (598)
Yes (561)

Author
Weber, Gerhard Wilhelm (197)
Karasözen, Bülent (95)
Kestel, Sevtap Ayşe (88)
Uğur, Ömür (52)
Cenk, Murat (43)

Subject
Natural Sciences (61)
Cryptography. (55)
Applied Mathematics (41)
Engineering and Technology (39)
Management Science and Operations Research (37)

Date Issued
1991 - 1999 (10)
2000 - 2009 (176)
2010 - 2019 (636)
2020 - 2024 (337)

Item Type
Journal Article (416)
Master Thesis (287)
Conference Paper (148)
Ph.D. Thesis (125)
Project (70)

Recent Submissions

Location–allocation problem for green efficient two-stage vehicle-based logistics system: A type-2 neutrosophic multi-objective modeling approach
Das, Soumen Kumar; Yu, Vincent F.; Roy, Sankar Kumar; Weber, Gerhard Wilhelm (2024-03-15)
In recent decades, global climate change has become one of the most critical environmental issues, leading to increased environmental and social concerns about the sustainability of logistics networks. This study proposes ...
Proba: privacy-preserving, robust and accessible blockchain-powered helios
Kocaman, Sermin; Doğanaksoy, Ali; Sulak, Fatih; Department of Cryptography (2024-1-26)
Helios is the first web-based and open-audit voting system. The open-audit feature allows anyone to track the voting process, thus providing easy verifiability in all stages of the elections. Despite many advantages, Helio...
VERIFIABLE ACCOUNTABLE SUBGROUP MULTI-SIGNATURES
Ağırtaş, Ahmet Ramazan; Yayla, Oğuz; Department of Cryptography (2024-1-22)
In this thesis, we introduce an accountable subgroup multi-signature (ASM) framework. The framework comprises three novel pairing-based ASM schemes, i.e., vASM, ASMwSA and ASMwCA, each designed to be secure against chosen-...
The Impact of Renewable Energy Incentives on Carbon Prices in the USA
ÇOŞKUN, ESİN HİLAL; Kestel, Sevtap Ayşe; DALKIR, SERDAR (Springer, 2024-01-01)
A STRATEGY BASED ON STATISTICAL MODELLING AND MULTI-OBJECTIVE OPTIMIZATION TO DESIGN A DISHWASHER CLEANING CYCLE
ANAPA, KORKUT; Yücel, Hamdullah; Bayraktar, Songül; Department of Scientific Computing (2023-12-22)
This thesis proposes a novel approach based on statistical learning and multi-objective optimization to reduce the need for experiments during the design phase of new cleaning cycles for household dishwashers. First, regre...
MULTIPLE CONNECTIVITY APPROACH TO NETWORK FORMATION GAMES
Çam, Can Deniz; Gaygısız Lajunen, Esma; Yücel, Hamdullah; Department of Scientific Computing (2023-12-11)
The analyses of network structures, formations and stability characteristics are gaining importance and attracting increasing attention. This thesis establishes a specific network formation game and suggests a network stab...
Methods for Masking CRYSTALS-Kyber Against Side-Channel Attacks
ÖZEREN, SILA; Yayla, Oğuz (2023-12-11)
Stop-loss reinsurance pricing and exposure curves under jump influence
Mert, Özenç Murat; Kestel, Sevtap Ayşe (2023-12-07)
ANALYSIS OF TWO VERSATILE MPC FRAMEWORKS MP-SPDZ AND MPYC
Aykurt, Fatih; Yayla, Oğuz; Department of Cryptography (2023-12-07)
Using secure multi-party computing protocols (MPC), a group of participants who distrust one another can securely compute any function of their shared secret inputs. Participants exchange these inputs in a manner similar t...
Direct and inverse problems for a 2D heat equation with a Dirichlet–Neumann–Wentzell boundary condition
Ismailov, Mansur I.; Türk, Önder (2023-12-01)
In this paper we present the inverse problem of determining a time dependent heat source in a two-dimensional heat equation accompanied with Dirichlet–Neumann–Wentzell boundary conditions. The model is of significant pract...
On the information content of implied liquidity measure: Evidence from the S&P 500 index options
Yerli, Cigdem; Eksi-Altay, Zehra; Kestel, Sevtap Ayşe (2023-11-01)
This paper aims to unfold the information content of the implied liquidity measure, which is introduced through the Conic Finance theory and considered a proxy for the market liquidity level. We propose a partial informati...
Mathematical encouragement of companies to cooperate by using cooperative games with fuzzy approach
Özcan, Ismail; Sledzinski, Jacek Dominik; Gök, Sırma Zeynep Alparslan; Butlewski, Marcin; Weber, Gerhard Wilhelm (2023-10-01)
In this paper, we will analyze the phenomenon of strategic cooperation between companies competing with each other so far. The analysis will concern the real situation of establishing a strategic alliance between companies...
A STUDY ON CRYSTALS-KYBER AND ITS MASKED IMPLEMENTATIONS
Özeren, Sıla; Yayla, Oğuz; Department of Cryptography (2023-10)
As we transition into the quantum computing era, the security of widely-used cryptographic algorithms is facing significant challenges. This is attributable to Shor's algorithm, enabling quantum computers to break conventi...
Quasi-twisted codes as contractions of quasi-cyclic codes
Özkaya, Buket; Özbudak, Ferruh (2023-10-01)
Flexible hardware design for elliptic curve method of integer factorization
Solmaz, Mustafa Hakan; Akyıldız, Ersan; Department of Cryptography (2023-9-27)
In most of the electronic communication devices that surround us, advanced cryp- tographic algorithm needs are implemented on special hardware. These specialized hardware are divided into application-specific integrated ci...
A NEW EFFICIENT TMVP ALGORITHM AND AN APPLICATION FOR POST-QUANTUM CRYPTOGRAPHY
Gökce, Anıl Burak; Yayla, Oğuz; Department of Cryptography (2023-9-25)
With the advancements in quantum computing, traditional cryptography is considered to have little life in the future. That's why NIST initiated a Post-quantum cryptography-related project in order to standardize quantum-se...
Forecasting Gold Price Returns: A Time Series Analysis
Cansu, Ceylan; Gaygısız Lajunen, Esma; Department of Financial Mathematics (2023-9-11)
Gold is a valuable metal that has historically been highly regarded by civilizations. It has been used in jewellery industries, decorative purposes and mainly in finance. Especially in uncertain financial environment inves...
Secure Model Verification and Privacy Preservation with ZK-SNARKs and Neural Networks
Seriner Gerenli, Dursun Oylum; Özbudak, Ferruh; Department of Cryptography (2023-9-11)
Neural networks are widely used learning models to achieve successful results in many application areas today. However, proving and sharing the accuracy and reliability of these networks is often limited due to privacy and...
Homomorphic Encryption: A Comprehensive Study of Types, Techniques, and Real-world Applications
Tekin, Ezgi Naz; Özbudak, Ferruh; Department of Cryptography (2023-9-11)
Homomorphic encryption (HE), which enables computations on encrypted data without first decrypting it, is a ground-breaking advancement in the cryptographic area. In this study, many HE schemes such as partially, somewhat,...
Differential and Linear Cryptanalysis of Lightweight Block Ciphers with MILP Approach
İlter, Murat Burhan; Doğanaksoy, Ali; Selçuk, Ali Aydın; Department of Cryptography (2023-9-8)
The security of block ciphers can be evaluated using cryptanalysis methods. The use of Mixed-Integer Linear Programming (MILP) has gained prominence due to its effectiveness in analyzing the security aspects of block ciphe...
Citation Formats