Graduate School of Applied Mathematics, Thesis

Browse
Search within this collection:

Filters

Entity Type
Thesis (354)

Has File(s)
Yes (342)
No (12)

Author
Akcengiz, Ziya (2)
Akleylek, Sedat (2)
Akman, Tuğba (2)
Altıntan, Derya (2)
Animoku, Abdulwahab (2)

Subject
Cryptography. (55)
Data encryption (Computer science). (30)
Finance. (28)
Natural Sciences (21)
Stock exchanges. (21)

Date Issued
2004 - 2009 (74)
2010 - 2019 (229)
2020 - 2022 (51)

Item Type
Master Thesis (253)
Ph.D. Thesis (101)

Recent Submissions

Radix-3 NTT-Based Polynomial Multiplication for Lattice-Based Cryptography
Hassan, Chenar Abdulla; Yayla, Oğuz; Department of Cryptography (2022-5-31)
The lattice-based cryptography is considered as a strong candidate amongst many other proposed quantum-safe schemes for the currently deployed asymmetric cryptosystems that do not seem to stay secure when quantum computers...
EXAMINATION OF BOND RISK PREMIA FROM THE BANKING PERSPECTIVE
Orhan, Selim; Danışoğlu, Seza; Department of Financial Mathematics (2022-5-10)
Banks are considered as the marginal and sophisticated investors of financial markets. This is evident in the Haddad and Sraer (2020) study that examines the US government bond excess returns. This study extends the Haddad...
HYBRID ANALYSIS OF TMVP FOR MODULAR POLYNOMIAL MULTIPLICATION IN CRYPTOGRAPHY
Efe, Giray; Cenk, Murat; Department of Cryptography (2022-3-07)
Polynomial multiplication on the quotient ring Z[x]/<x^n+-1> is one of the most fundamental, general-purpose operations frequently used in cryptographic algorithms. Therefore, a possible improvement over a multiplication a...
Stabilized Finite Element Simulations of Multispecies Inviscid Hypersonic Flows in Thermochemical Nonequilibrium
Cengizci, Süleyman; Uğur, Ömür; Tezduyar , Tayfun E.; Department of Scientific Computing (2022-3)
For both military and civil aviation purposes, rockets, missiles, and spacecraft moving at hypersonic speeds are being utilized in recent years. While these vehicles move at speeds five times the speed of sound or more, th...
Analyzes of Block Recombination and Lazy Interpolation Methods and Their Applications to Saber
Aksoy, Berkin; Cenk, Murat; Department of Cryptography (2022-2-28)
Since the beginning of the National Institute of Standards and Technology (NIST), The Post-Quantum Cryptography (PQC) Standardization Process, efficient implementations of lattice-based algorithms have been studied extensi...
SEISMIC FIRST ARRIVAL TRAVELTIME INVERSION HARNESSING PHYSICS INFORMED NEURAL NETWORKS
Yıldırım, İsa Eren; Uğur, Ömür; Waheed, Umair bin; Department of Scientific Computing (2022-2-11)
In Seismic prospecting, huge amounts of data are collected and processed to infer the structural and lithological composition of the subsurface. The key step in this procedure is velocity model building. First arrival trav...
Quality Enhancement of Computed Tomography Images of Porous Media Using Convolutional Neural Networks
Yıldırım, Ertuğrul Umut; Uğur, Ömür; Glatz, Guenther; Department of Scientific Computing (2022-2-11)
Computed tomography has been widely used in clinical and industrial applications as a non-destructive visualization technology. The quality of computed tomography scans has a strong effect on the accuracy of the estimated ...
INVESTOR ATTENTION AND STOCK PERFORMANCE: A SEARCH ENGINE OPTIMIZATION APPROACH
Gül, Abdullah Efe; Danışoğlu, Seza; Department of Financial Mathematics (2022-2-11)
This thesis proposes two new measures of investor attention: Search Traffic (ST) and Click Per Search (CPS). These two measures as well as the commonly used Google Search Volume Index (SVI) measure are constructed using a ...
Competing labels: a heuristic approach to pseudo-labeling in deep semi-supervised learning
Bayrak, Hamdi Burak; Ertekin Bolelli, Şeyda; Yücel, Hamdullah; Department of Scientific Computing (2022-2-10)
Semi-supervised learning is one of the dominantly utilized approaches to reduce the reliance of deep learning models on large-scale labeled data. One mostly used method of this approach is pseudo-labeling. However, pseudo-...
Analysis and Comparison of Fully Homomorphic Encryption Approaches Over Integers
Bozkurt, Cansu; Cenk, Murat; Betin Onur, Cansu; Department of Cryptography (2022-2-10)
The time period after the mid-20th century was named as information age or digital age. In that age, the world is being digitalized very fastly. The amount of data transferred and processed online is increasing rapidly. As...
Incorporation of Foreign Exchange Risk to Fama-French Factor Model: A Study on Borsa İstanbul
Höçük, Furkan; Gaygısız Lajunen, Esma; Department of Financial Mathematics (2022-2-10)
This empirical study compares the relative performances of the Fama-French five-factor model without foreign exchange risk and the five-factor model incorporating foreign exchange risk on capturing portfolio returns in Bor...
Performance of Electrical Power Flow Solvers: Case Studies
Ceylan, Özgün Ada; Uğur, Ömür; Department of Scientific Computing (2022-2-9)
Advancing technologies in distributed electrical generation and increasing amount of required electricity make electrical systems more complicated. Thus, the number of buses has increased and the size of incidence matrix f...
NEW EFFICIENT CHARACTERISTIC THREE POLYNOMIAL MULTIPLICATION ALGORITHMS AND THEIR APPLICATIONS TO NTRU PRIME
Yeniaras, Esra; Cenk, Murat; Department of Cryptography (2022-1-21)
Some of the post-quantum cryptographic protocols require polynomial multiplication in characteristic three fields, thus the efficiency of such multiplication algorithms gain more importance recently. In this thesis, we pro...
Stochastic Momentum Methods For Optimal Control Problems Governed By Convection-diffusion Equations With Uncertain Coefficients
Toraman, Sıtkı Can; Yücel, Hamdullah; Department of Scientific Computing (2022-1-6)
Many physical phenomena such as the flow of an aircraft, heating process, or wave propagation are modeled mathematically by differential equations, in particular partial differential equations (PDEs). Analytical solutions ...
The effect of focus versus diversification On bank performance: does ethical structure matter?
Çalı, Gizem; Danışoğlu, Seza; Department of Financial Mathematics (2021-12-27)
Financial institutions pursue a tradeoff model in order to reduce risk and maximize profitability and performance. Ethical practices, like those of any other profit-maximizing firm, must pursue profit. For banks that targe...
MDS Matrices Over Rings For Designing Lightweight Block Cİpher
Yetişer, Gökçe; Yayla, Oğuz; Department of Cryptography (2021-9-30)
The primary intention of this thesis is to generate lightened Maximum Distance Separable (MDS) matrices so as not to have a high implementation cost while providing solid diffusion to a cipher. In this direction, lightweig...
SOME STUDIES ON c-DIFFERENTIAL UNIFORMITY OF SWAPPED INVERSE FUNCTION
ÜNVER, BETÜL; ÖZBUDAK, FERRUH; Department of Cryptography (2021-9-28)
Lately, Ellingsen et al created a new concept by making minor changes on the old concept of (multiplicative) differential. This new definition which has potential to be capable of extending differential cryptanalysis in a ...
Some Studies on CCZ-Equivalence of the Inverse Function
Fidan, Mehtap; ÖZBUDAK, Ferruh; Department of Cryptography (2021-9-28)
Most cryptographic systems, like block ciphers, depend heavily on vectorial Boolean functions. A function with good cryptological properties should have low differential uniformity which is invariant under some equivalence...
Cryptographic Misuse Detection Tools
Koru, Emine Selin; Cenk, Murat; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2021-9-24)
Today digital devices are an inevitable part of our lives. We use these devices for things like sharing photos, communicating with friends, and exchanging money. All these actions need privacy. In fact, properly used crypt...
ANALYSIS AND IMPLEMENTATION OF BINARY POLYNOMIAL MULTIPLICATION
OLUDO, Mary Achieng; Cenk, Murat; Department of Cryptography (2021-9-09)
N. Koblitz and V. Miller originally proposed the concept of elliptic curve cryptography in 1985. It is fast gaining popularity in public key cryptosystems as it boasts of an advantage over current public key cryptosystems,...
Citation Formats