Selected Publications

  1. Monica Arenas, Muhammed Ali Bingol, Huseyin Demirci, and Gabriele Lenzini (2022) “A Secure Authentication Protocol for Cholesteric SphericalReflectors based on Homomorphic Encryption” (to be published in Proceedings of AfricaCrypt 2022, Springer LNCS)
  2. Osman Bicer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, and Albert Levi (2022). Highly Efficient and Reusable Private Function Evaluation with Linear Complexity. IEEE Transaction on Dependable and Secure Computing (IEEE TDSC) vol. 19, no. 2, pp. 835-847, 1 March-April 2022, doi: 10.1109/TDSC.2020.3009496.
  3. Muhammed Ali Bingöl, Osman Bicer, Mehmet Sabır Kiraz, and Albert Levi. (2019) “An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates”. The Computer Journal. Available at https://doi.org/10.1093/comjnl/bxy136.
  4. Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cedric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado-Dominguez, Kasper Bonne Rasmussen, Dave Singelee, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, (2018). “Security of Distance-Bounding: A Survey” ACM Computing Surveys (CSUR) 51 (5), 94.
  5. Duygu Karaoğlan Altop, Muhammed Ali Bingöl, Erkay Savaş, Albert Levi, (2017) DKEM: Secure and Efficient Distributed Key Establishment Protocol for Wireless Mesh Networks, Ad Hoc Networks 54, 53-68.
  6. Muhammed Ali Bingöl, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2016) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, Security Comm. Networks, 9 (18), 5051-5063.
  7. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingöl, Mehmet Sabır Kiraz, Hüseyin Demirci, and Albert Levi, (2015) “k-Strong Privacy for RFID Authentication Protocols Based on Physically Unclonable Functions” Wireless Communications and Mobile Computing 15 (18), 2150-2166.
  8. Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, S. Berna Ors Yalçin, (2012) “Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography” IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049.
  9. Muhammed Ali Bingöl, Fatih Birinci, Süleyman Kardaş, Mehmet Sabır Kiraz, (2012) “Anonymous RFID Authentication for Cloud Services”, International Journal of Info. Security Science 1 (2), 32-42.
  10. Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardaş, Cedric Lauradoux, and Benjamin Martin, (2011) “A Framework for Analyzing RFID Distance Bounding Protocols”, Journal of Computer Security 19 (2), 289-317.
  11. Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpenti Süleyman Kardaş, (2013) “Deploying OSK on low-resource mobile devices”, In 9th International Workshop on RFID Security – RFIDSec’13, Graz, Austria, June 2013. Lecture Notes in Computer Science vol. 8262, pages. 3-8, Springer Berlin Heidelberg.
  12. Süleyman Kardaş, Serkan Çelik Muhammed Ali Bingöl, Albert Levi, (2013) “A new security and privacy framework for RFID in cloud computing”, In 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK, December 2013,  pages 171-176, IEEE Computer Society.
  13. Eren Kocaağa, Bünyamin Tanıl, Muhammed Ali Bingöl, Süleyman Kardaş, (2013) “Solution of A Conjecture: On 2-PCD RFID Distance Bounding Protocols”, In proceedings of 6th International Information Security & Cryptology Conference (ISCTurkey’13), Ankara, Turkey, September 2013.
  14. Muhammed Ali Bingöl, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2013) Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements, In proceedings of International Conference BulCrypt, September 2012, Sofia, Bulgaria.
  15. Mehmet Sabır Kiraz, Süleyman Kardaş, Muhammed Ali Bingöl, Fatih Birinci, (2012) “Anonymous RFID Authentication Protocol Without a Trusted Party”, 5th International Information Security & Cryptology Conference (ISCTurkey’12), Ankara, Turkey, May 2012.
  16. Suleyman Kardas, Mehmet Sabır Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci, (2011) “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, In 7th International Workshop on RFID Security – RFIDSec’11, Amherst, USA, June 2011. Lecture Notes in Computer Science vol. 7055, pages. 78-93, Springer Verlag.
  17. Orhun Kara, Suleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine, (2010) “Optimal Security Limits of RFID Distance Bounding Protocols,” In 6th International Workshop on RFID Security – RFIDSec’10, Istanbul, Turkey, June 2010.  Lecture Notes in Computer Science vol. 6370, pages. 220-238,  Springer Verlag.
  18. Muhammed Ali Bingöl, Ali Ozhan Gurel, Orhun Kara, Suleyman Kardas, (2010) “A New RFID Distance Bounding Protocol”, 4th International Information Security & Cryptology Conference (ISCTurkey’10), Ankara, Turkey, May 2010.
  19. Suleyman Kardas, Muhammed Ali Bingöl, (2010) “Attacks on a Mutual Authentication Scheme Conforming to EPCglobal C1-GEN2 RFID System,” 4th International Information Security & Cryptology Conference – ISCTurkey’10, Ankara, Turkey, May 2010.

Standardization

  1. Muhammed Ali Bingöl, Süleyman Kardaş, Ünal Kocabaş, (2015) “Common Criteria Protection Profile for Secure Communication Module for Water Tracking System (SCM-WTS PP) – CC V3.1 r4 – EAL 2” Common Criteria Portal. Accepted in 15.10.2015.  Available at:  https://www.commoncriteriaportal.org/files/ppfiles/ProtectionProfile(SCM-WTS)%20v1.5.pdf Certification Report: https://www.commoncriteriaportal.org/files/ppfiles/SCM_WTS%20Certification%20Report.pdf