Yazar "Buluş, Ercan" için Çorlu Mühendislik Fakültesi Koleksiyonu listeleme
-
Cipher with AES
Buluş, Ayin; Buluş, Ercan (IEEE, 2018)After the DES (Data Encryption Standart) algorithm was unreliable, a content was held in September 1997 by the US National Institude of Standards and Technology (NEST) to designate a cryptographic algorithm for national ... -
Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions
Aslan, Bora; Sakallı, Muharrem Tolga; Buluş, Ercan (Springer-Verlag Berlin, 2008)S-boxes are vital elements in the design of symmetric ciphers. To date, the techniques for the construction of S-boxes have included pseudo-random generation, finite field inversion, power mappings and heuristic techniques. ... -
Derin Sinir Ağları Yardımıyla Fotomontaj Tespiti
Özmen, Nihat Eren; Buluş, Ercan (2020)Son yıllarda hızla gelişen teknoloji ile birlikte verilerin sağlıklı bir şekildeelde edilmesi, elde edilen verilerin korunması ve elde edilen verilerin özgünolması büyük önem taşımaktadır. Özgünlüğün tespiti özellikle ... -
Designing attacks for SMTP servers
Buluş, Ercan (C R L Publishing Ltd, 2011)Electronic mail is today's most widely used method of communication. In recent years, if e-mail had not been there, communication would not have been possible. Because of SMTP (Simple Mail Transfer Protocol) is an old ... -
Fixing distortions on images
Akkoca, Engin; Buluş, Ercan (Institute of Electrical and Electronics Engineers Inc., 2020)People have long desired editing the defects on images and, removing or altering the corrupt regions of image data in a way that would not be detected by the neutral observer unaware of the original copy. Utilizing computers ... -
Infrastructure of a Wireless Local Area Network: T.Ü. Mehmet Akif Ersoy lecture center
Gezgin, Deniz Mertkan; Buluş, Ercan (Fac Teacher Education, 2012)Wireless Local Area Networks (WLAN), is a network structure which is used primarily for establishing connections between servers, printers and other endpoint devices found within smaller scale areas, such as a building or ... -
Kablosuz Ağlar İçin Bir DoS Saldırısı Tasarımı
Gezgin, Deniz Mertkan; Buluş, Ercan (2013)Kablosuz ağların gelişimi ve kullanımlarının artışı ile bu ağların güvenliğinin sağlanması hususu ön plana çıkmıştır. Kablolu ağlarda bu güne dek kullanılagelmiş olan çeşitli saldırı tipleri, aynı şekilde kablosuz ağlarda ... -
A new method to determine algebraic expression of power mapping based S-boxes
Karaahmetoglu, Osman; Sakallı, Muharrem Tolga; Buluş, Ercan; Tutanescu, Ion (Elsevier Science Bv, 2013)Power mapping based S-boxes, especially those with finite field inversion, have received significant attention by cryptographers. S-boxes designed by finite field inversion provide good cryptographic properties and are ... -
On the algebraic expression of the AES S-box like S-boxes
Sakallı, Muharrem Tolga; Aslan, Bora; Buluş, Ercan; Mesut, Andaç Şahin; Büyüksaraço?lu, Fatma; Karaahmeto?lu, Osman (2010)In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of ... -
On the Construction of 20 x 20 and 24 x 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions
Sakallı, Muharrem Tolga; Akleylek, Sedat; Aslan, Bora; Buluş, Ercan; Büyüksaraçoğlu Sakallı, Fatma (Hindawi Ltd, 2014)We present an algebraic construction based on state transform matrix (companion matrix) for n x n (where n + 2(k), k being a positive integer) binary matrices with high branch number and low number of fixed points. We also ... -
Telea ve Naiver Stokes Algoritmaları Kullanılarak Görüntülerdeki Bozulmaları Düzeltme
Buluş, Ercan; Akleylek, Sedat (2021)Görseller üzerindeki bozulmaları düzeltmek veya görsel üzerindeki istenilmeyen bazı kısımları, görselin orijinal halini bilmeyen kişilerin algılayamayacağı şekilde kaldırmak veya değiştirmek insanların çok uzun zamandır ...