What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Oguzhan Ersoy
Google Scholar
16
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ndss
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
Gorka Abad
Oguzhan Ersoy
Stjepan Picek
Aitor Urbieta
2024
conf/dsn
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks.
Xiaoyun Xu
Oguzhan Ersoy
Behrad Tajalli
Stjepan Picek
2023
conf/fc
Get Me Out of This Payment! Bailout: An HTLC Re-routing Protocol.
Oguzhan Ersoy
Pedro Moreno-Sanchez
Stefanie Roos
2023
conf/fc
Extras and Premiums: Local PCN Routing with Redundancy and Fees.
Yu Shen
Oguzhan Ersoy
Stefanie Roos
2023
conf/sp
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Xianrui Qin
Shimin Pan
Arash Mirzaei
Zhimei Sui
Oguzhan Ersoy
Amin Sakzad
Muhammed F. Esgin
Joseph K. Liu
Jiangshan Yu
Tsz Hon Yuen
2023
conf/sp
On Feasibility of Server-side Backdoor Attacks on Split Learning.
Behrad Tajalli
Oguzhan Ersoy
Stjepan Picek
2023
conf/eurosp
Watermarking Graph Neural Networks based on Backdoor Attacks.
Jing Xu
Stefanos Koffas
Oguzhan Ersoy
Stjepan Picek
2023
conf/asiaccs
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Muhammed F. Esgin
Oguzhan Ersoy
Veronika Kuchta
Julian Loss
Amin Sakzad
Ron Steinfeld
Xiangwen Yang
Raymond K. Zhao
2022
conf/ccs
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets.
Gorka Abad
Oguzhan Ersoy
Stjepan Picek
Víctor Julio Ramírez-Durán
Aitor Urbieta
2021
conf/sp
Bitcoin-Compatible Virtual Channels.
Lukas Aumayr
Matteo Maffei
Oguzhan Ersoy
Andreas Erwig
Sebastian Faust
Siavash Riahi
Kristina Hostáková
Pedro Moreno-Sanchez
2021
conf/asiacrypt
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.
Lukas Aumayr
Oguzhan Ersoy
Andreas Erwig
Sebastian Faust
Kristina Hostáková
Matteo Maffei
Pedro Moreno-Sanchez
Siavash Riahi
2020
conf/fc
How to Profit from Payments Channels.
Oguzhan Ersoy
Stefanie Roos
Zekeriya Erkin
2020
conf/esorics
Post-Quantum Adaptor Signatures and Payment Channel Networks.
Muhammed F. Esgin
Oguzhan Ersoy
Zekeriya Erkin
2019
conf/eurosp
TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication.
Oguzhan Ersoy
Zekeriya Erkin
Reginald L. Lagendijk
2016
conf/lightsec
Impossible Differential Cryptanalysis of 16/18-Round Khudra.
Ferhat Karakoç
Öznur Mut Sagdiçoglu
Mehmet Emin Gönen
Oguzhan Ersoy
2016
conf/asiacrypt
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.
Aslí Bay
Oguzhan Ersoy
Ferhat Karakoç
Coauthors
Aitor Urbieta
(2)
Amin Sakzad
(2)
Andreas Erwig
(2)
Arash Mirzaei
(1)
Aslí Bay
(1)
Behrad Tajalli
(2)
Ferhat Karakoç
(2)
Gorka Abad
(2)
Jiangshan Yu
(1)
Jing Xu
(1)
Joseph K. Liu
(1)
Julian Loss
(1)
Kristina Hostáková
(2)
Lukas Aumayr
(2)
Matteo Maffei
(2)
Mehmet Emin Gönen
(1)
Muhammed F. Esgin
(3)
Oguzhan Ersoy
(16)
Öznur Mut Sagdiçoglu
(1)
Pedro Moreno-Sanchez
(3)
Raymond K. Zhao
(1)
Reginald L. Lagendijk
(1)
Ron Steinfeld
(1)
Sebastian Faust
(2)
Shimin Pan
(1)
Siavash Riahi
(2)
Stefanie Roos
(3)
Stefanos Koffas
(1)
Stjepan Picek
(5)
Tsz Hon Yuen
(1)
Veronika Kuchta
(1)
Víctor Julio Ramírez-Durán
(1)
Xiangwen Yang
(1)
Xianrui Qin
(1)
Xiaoyun Xu
(1)
Yu Shen
(1)
Zekeriya Erkin
(3)
Zhimei Sui
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to