Graduate School of Applied Mathematics, Conference / Seminar

Browse
Search within this collection:

Filters

Entity Type
Publication (155)

Has File(s)
No (146)
Yes (9)

Author
Weber, Gerhard Wilhelm (26)
Kestel, Sevtap Ayşe (23)
Cenk, Murat (16)
Karasözen, Bülent (16)
Yücel, Hamdullah (16)

Subject
Elliptic curve cryptography (4)
Clustering (3)
Continuous optimization (3)
Post-quantum cryptography (3)
Algorithm (2)

Date Issued
1998 - 1999 (1)
2000 - 2009 (28)
2010 - 2019 (90)
2020 - 2023 (36)

Item Type
Conference Paper (138)
Conference (1)
Presentation (1)

Recent Submissions

Improving Performance in Space-Hard Algorithms
Güner, Hatice Kübra; Mangır, Ceyda; Yayla, Oğuz (2023-01-01)
Protecting secret keys from malicious observers is a major problem for cryptographic algorithms in untrusted environments. White-box cryptography suggests hiding the key in the cipher code with an appropriate method such t...
Verifiable Timed Commitments f or Fair Sealed-bid Auctions
Ozden, Duygu; Yayla, Oğuz (2023-01-01)
Timed commitment is a type of commitment scheme that allows the recipient to open the committed value in the future without needing a committer. It has found widespread use where 'time dependency' is essential. Fair contra...
Solving Optimal Control Problems Containing Uncertainty
Yücel, Hamdullah; Çiloğlu, Pelin (2022-08-29)
Modeling the Dependency in the Turkish Stock Market via the Dynamic Vine-Garch Model
Evkaya, Ozan; Poyraz, Gülden; Yıldırım Külekci, Bükre; Gür, İsmail (2022-07-15)
The dependence on financial instruments has always been an interesting topic considering their economic and political effects. To measure the change in such instruments over time and interaction between them, the stock pr...
Optimal Dynamic Ruin Probabilities for Heavy-Tailed Losses Under Reinsurance Strategies
Yıldırım Külekci, Bükre; Korn, Ralf; Kestel, Sevtap Ayşe (2022-07-12)
In recent years, extreme events are appearing to increase both in frequency and severity in many different areas. Insurance mechanism provides safe protection for extreme losses in the frame of risk management solutions. ...
Numerical Modeling of Hypersonic Air and Carbon Dioxide Flows in Thermochemical Non-Equilibrium with SU2-NEMO Solver
Çelik, Mutlu; Uğur, Ömür; Eyi, Sinan (2022-06-23)
Modeling of hypersonic aerothermodynamics in non-equilibrium flow is a challenging problem of aircraft design. Especially, prediction of atmospheric reentry and other planet’s entry heat loads are significant for aerospace...
Solving PDE-constrained optimization problems containing random coefficients
Yücel, Hamdullah (2022-05-18)
Modelling dependence among Turkish financial institutions using dynamic Vine copula
Gür, İsmail; Evkaya, Ozan; Yıldırım Külekci, Bükre; Poyraz, Gülden (2022-05-15)
The utilization of multivariate copulas to model the dependence is mainly limited to elliptical and Archimedean copulas. By nature, both classes are quite restrictive concerning the symmetry and tail dependencies. Moreov...
Stochastic Discontinuous Galerkin Methods for Robust Deterministic Control of Convection Diffusion Equations with Uncertain Coefficients,
Çiloğlu, Pelin; Yücel, Hamdullah (2022-04-12)
Solving Optimal Control Problems Containing Uncertain Coefficients with Stochastic Discontinuous Galerkin Methods
Çiloğlu, Pelin; Yücel, Hamdullah (2022-04-08)
Stochastic Discontinuous Galerkin Methods for Robust Deterministic Optimal Control
Çiloğlu, Pelin; Yücel, Hamdullah (2022-03-25)
Analysis of Block Recombination and Lazy Interpolation Methods and Their Applications to Saber
Aksoy, Berkin; Cenk, Murat (2022-01-01)
Since the beginning of the National Institute of Standards and Technology (NIST), The Post-Quantum Cryptog-raphy (PQC) Standardization Process, efficient implementations of lattice-based algorithms have been studied extens...
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf
Kara, Gizem; Yayla, Oğuz (2022-01-01)
A number of arithmetization-oriented ciphers emerge for use in advanced cryptographic protocols such as secure multi-party computation (MPC), fully homomorphic en-cryption (FHE) and zero-knowledge proofs (ZK) in recent yea...
Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime
Yeniaras, Esra; Cenk, Murat (2022-01-01)
This paper introduces a new polynomial multiplication algorithm which decreases the arithmetic complexity and another modified algorithm that speeds up the implementation run-time over the characteristic three fields. We f...
Stochastic Discontinuous Galerkin Methods with Low-Rank Solvers for Convection Diffusion Equations
Çiloğlu, Pelin; Yücel, Hamdullah (2021-09-06)
To simulate complex kinds of behavior in physical systems, one makes predictions and hypotheses about certain outputs of interest with the help of simulation of mathematical models. However, due to the lack of knowledge or...
Ruin Probability in Heavy-Tailed Claims with Extreme Value Theory
Yıldırım Külekci, Bükre; Karabey, Uğur; Kestel, Sevtap Ayşe (2021-09-05)
Residual based a posteriori error estimation for Dirichlet boundary control problems
Yücel, Hamdullah (2021-09-01)
We study a residual–based a posteriori error estimate for the solution of Dirichlet boundary control problem governed by a convection diffusion equation on a two dimensional convex polygonal domain, using the local discont...
Time Dependent Stop-Loss Reinsurance and Exposure Curves
Mert, Özenç Murat; Kestel, Sevtap Ayşe (2021-07-09)
Impact of Outliers in Mortality Rates on the Valuation of Life Annuities
Yavrum, Cem; Kestel, Sevtap Ayşe (2021-07-09)
Annuity pricing is essential to insurance companies for their financial liabilities. Therefore, one of the purposes of companies is to adjust the annuity prices using a forecasting model that fits their historical data ...
Time Dependent Stop-Loss Reinsurance and Exposure Curves
Mert, Özenç Murat; Kestel, Sevtap Ayşe (2021-07-09)
Citation Formats