Graduate School of Applied Mathematics, Thesis

Browse
Search within this collection:

Filters

Entity Type
Thesis (412)

Has File(s)
Yes (401)
No (11)

Author
Akcengiz, Ziya (2)
Akleylek, Sedat (2)
Akman, Tuğba (2)
Altıntan, Derya (2)
Animoku, Abdulwahab (2)

Subject
Natural Sciences (61)
Cryptography. (55)
Engineering and Technology (39)
Data encryption (Computer science). (30)
Finance. (28)

Date Issued
2004 - 2009 (74)
2010 - 2019 (229)
2020 - 2024 (109)

Item Type
Master Thesis (287)
Ph.D. Thesis (125)

Recent Submissions

Proba: privacy-preserving, robust and accessible blockchain-powered helios
Kocaman, Sermin; Doğanaksoy, Ali; Sulak, Fatih; Department of Cryptography (2024-1-26)
Helios is the first web-based and open-audit voting system. The open-audit feature allows anyone to track the voting process, thus providing easy verifiability in all stages of the elections. Despite many advantages, Helio...
VERIFIABLE ACCOUNTABLE SUBGROUP MULTI-SIGNATURES
Ağırtaş, Ahmet Ramazan; Yayla, Oğuz; Department of Cryptography (2024-1-22)
In this thesis, we introduce an accountable subgroup multi-signature (ASM) framework. The framework comprises three novel pairing-based ASM schemes, i.e., vASM, ASMwSA and ASMwCA, each designed to be secure against chosen-...
A STRATEGY BASED ON STATISTICAL MODELLING AND MULTI-OBJECTIVE OPTIMIZATION TO DESIGN A DISHWASHER CLEANING CYCLE
ANAPA, KORKUT; Yücel, Hamdullah; Bayraktar, Songül; Department of Scientific Computing (2023-12-22)
This thesis proposes a novel approach based on statistical learning and multi-objective optimization to reduce the need for experiments during the design phase of new cleaning cycles for household dishwashers. First, regre...
MULTIPLE CONNECTIVITY APPROACH TO NETWORK FORMATION GAMES
Çam, Can Deniz; Gaygısız Lajunen, Esma; Yücel, Hamdullah; Department of Scientific Computing (2023-12-11)
The analyses of network structures, formations and stability characteristics are gaining importance and attracting increasing attention. This thesis establishes a specific network formation game and suggests a network stab...
ANALYSIS OF TWO VERSATILE MPC FRAMEWORKS MP-SPDZ AND MPYC
Aykurt, Fatih; Yayla, Oğuz; Department of Cryptography (2023-12-07)
Using secure multi-party computing protocols (MPC), a group of participants who distrust one another can securely compute any function of their shared secret inputs. Participants exchange these inputs in a manner similar t...
A STUDY ON CRYSTALS-KYBER AND ITS MASKED IMPLEMENTATIONS
Özeren, Sıla; Yayla, Oğuz; Department of Cryptography (2023-10)
As we transition into the quantum computing era, the security of widely-used cryptographic algorithms is facing significant challenges. This is attributable to Shor's algorithm, enabling quantum computers to break conventi...
Flexible hardware design for elliptic curve method of integer factorization
Solmaz, Mustafa Hakan; Akyıldız, Ersan; Department of Cryptography (2023-9-27)
In most of the electronic communication devices that surround us, advanced cryp- tographic algorithm needs are implemented on special hardware. These specialized hardware are divided into application-specific integrated ci...
A NEW EFFICIENT TMVP ALGORITHM AND AN APPLICATION FOR POST-QUANTUM CRYPTOGRAPHY
Gökce, Anıl Burak; Yayla, Oğuz; Department of Cryptography (2023-9-25)
With the advancements in quantum computing, traditional cryptography is considered to have little life in the future. That's why NIST initiated a Post-quantum cryptography-related project in order to standardize quantum-se...
Secure Model Verification and Privacy Preservation with ZK-SNARKs and Neural Networks
Seriner Gerenli, Dursun Oylum; Özbudak, Ferruh; Department of Cryptography (2023-9-11)
Neural networks are widely used learning models to achieve successful results in many application areas today. However, proving and sharing the accuracy and reliability of these networks is often limited due to privacy and...
Homomorphic Encryption: A Comprehensive Study of Types, Techniques, and Real-world Applications
Tekin, Ezgi Naz; Özbudak, Ferruh; Department of Cryptography (2023-9-11)
Homomorphic encryption (HE), which enables computations on encrypted data without first decrypting it, is a ground-breaking advancement in the cryptographic area. In this study, many HE schemes such as partially, somewhat,...
Differential and Linear Cryptanalysis of Lightweight Block Ciphers with MILP Approach
İlter, Murat Burhan; Doğanaksoy, Ali; Selçuk, Ali Aydın; Department of Cryptography (2023-9-8)
The security of block ciphers can be evaluated using cryptanalysis methods. The use of Mixed-Integer Linear Programming (MILP) has gained prominence due to its effectiveness in analyzing the security aspects of block ciphe...
DEEP ENSEMBLES APPROACH FOR ENERGY FORECASTING
Enginar, Onur; Uğur, Ömür; Department of Financial Mathematics (2023-9-5)
In this thesis study, we develop a novel deep ensembles based architecture that en- ables transfer learning to reduce the time requirement of deep ensembles without compromising the model’s accuracy. We apply our model to ...
A HYBRID APPROACH IN CONSTRUCTING AN INTERNAL SOLVENCY MODEL
Hasgül, Etkin; Kestel, Sevtap Ayşe; Department of Financial Mathematics (2023-9-04)
This thesis presents a innovative hybrid approach combining Time Series, Artificial Neural Network (ANN), and Copula models for calculating the Solvency Capital Requirement (SCR) concerning Non-Life Premium Risk across mul...
Extracting market expectations for monetary policy stance using overnight index swap: evidence from Türkiye
Özbek, İbrahim; Gaygısız Lajunen, Esma; Department of Financial Mathematics (2023-9-04)
This thesis analyzes the monetary policy expectations of various market-based instruments and investigates which financial instrument best estimates monetary policy expectations for different periods in Türkiye. A new appr...
Modeling Exchange Rate Volatility Using ARMA-GARCH Aproach with Non-Gaussian Distributions
Girgin, Yeşim; Kestel, Sevtap Ayşe; Türker Bayrak, Özlem; Department of Financial Mathematics (2023-9)
Modeling exchange rate volatility is a major concern for researchers, investors, and policymakers since it has a wide-ranging impact on the country’s economy, includ- ing inflation, interest, investment, production, and fo...
On Plateaued Functions, Linear Structures, Permutation Polynomials and c-Differential Uniformity
Kaytancı, Kübra; Özbudak, Ferruh; Department of Cryptography (2023-8-31)
A desired goal in designing good cryptosystems is to construct boolean functions with good cryptographic properties, such as having high nonlinearity, balancedness, high correlation immunity, and high algebraic immunity. I...
Classification of Distinct Maximal Flag Codes of a Prescriped Type and Related Results
Karakaş, Zeynelabidin; Özbudak, Ferruh; Department of Cryptography (2023-8-31)
In this thesis, we aim to improve the current bounds for a certain type of code and not only find the number of distinct codes but also characterize them for some parameters. Flag codes have applications in network coding...
Faster Secure Matrix Multiplication Using the Strassen Algorithm
Öner Şimşek, Dilek; AKYILDIZ, Ersan; CENK, Murat; Department of Cryptography (2023-8-29)
In the cloud, private data is open to security problems. Homomorphic encryption of fers a solution for addressing privacy concerns by enabling calculations on encrypted data. These computations may be statistical analysis ...
Verifiable Timed Commitments Explored Timed Signature Schemes and an Application to Sealed-bid Auctions
Özden, Duygu; Yayla, Oğuz; Department of Cryptography (2023-7-27)
Timed commitments are cryptographic primitives that allow one party to commit to a value for a specific duration of time while providing proof of the committed value's existence and integrity. This thesis explores the conc...
A STUDY ON SPACE-HARD WHITE-BOX CRYPTOGRAPHY
Güner, Hatice Kübra; Yayla, Oğuz; Mangır, Ceyda; Department of Cryptography (2023-7-20)
Protecting secret keys from malicious observers is a major problem for cryptographic algorithms in untrusted environments. White-box cryptography suggests hiding the key in the cipher code with an appropriate method such t...
Citation Formats