Selected Publications
1. Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, and Albert Levi (2022). "Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 835-847, April 2022, doi:10.1109/TDSC.2020.3009496.
2. Monica P. Arenas, Muhammed Ali Bingol, Hüseyin Demirci, Georgios Fotiadis, and Gabriele Lenzini (2022). "A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption", In Proceedings of AfricaCrypt'22, 13th Annual International Conference on the Theory and Applications of Cryptology, to be appear in LNCS Springer.
3. Muhammed Ali Bingol, Osman Bicer, Mehmet Sabır Kiraz, and Albert Levi. (2019) “An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates”. The Computer Journal. Available at https://doi.org/10.1093/comjnl/bxy136.
4. Gildas Avoine, Muhammed Ali Bingol, Ioana Boureanu, Srdjan Capkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cedric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado-Dominguez, Kasper Bonne Rasmussen, Dave Singelee, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, (2018). “Security of Distance-Bounding: A Survey” ACM Computing Surveys (CSUR) 51 (5), 94.
5. Duygu Karaoğlan Altop, Muhammed Ali Bingol, Erkay Savaş, Albert Levi, (2017) DKEM: Secure and Efficient Distributed Key Establishment Protocol for Wireless Mesh Networks, Ad Hoc Networks 54, 53-68.
6. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2016) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, Security Comm. Networks, 9 (18), 5051-5063.
7. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Mehmet Sabır Kiraz, Hüseyin Demirci, and Albert Levi, (2015) “k-Strong Privacy for RFID Authentication Protocols Based on Physically Unclonable Functions” Wireless Communications and Mobile Computing 15 (18), 2150-2166.
8. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent, S. Berna Ors Yalçin, (2012) “Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography” IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049.
9. Muhammed Ali Bingol, Fatih Birinci, Süleyman Kardaş, Mehmet Sabır Kiraz, (2012) “Anonymous RFID Authentication for Cloud Services”, International Journal of Info. Security Science 1 (2), 32-42.
10. Gildas Avoine, Muhammed Ali Bingol, Süleyman Kardaş, Cedric Lauradoux, and Benjamin Martin, (2011) “A Framework for Analyzing RFID Distance Bounding Protocols”, Journal of Computer Security 19 (2), 289-317.
11. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpenti Süleyman Kardaş, (2013) “Deploying OSK on low-resource mobile devices”, In 9th International Workshop on RFID Security – RFIDSec’13, Graz, Austria, June 2013. Lecture Notes in Computer Science vol. 8262, pages. 3-8, Springer Berlin Heidelberg.
12. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Albert Levi, (2013) “A new security and privacy framework for RFID in cloud computing”, In 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK, December 2013, pages 171-176, IEEE Computer Society.
13. Eren Kocaağa, Bünyamin Tanıl, Muhammed Ali Bingol, Süleyman Kardaş, (2013) “Solution of A Conjecture: On 2-PCD RFID Distance Bounding Protocols”, In proceedings of 6th International Information Security & Cryptology Conference (ISCTurkey’13), Ankara, Turkey, September 2013.
14. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2013) Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements, In proceedings of International Conference BulCrypt, September 2012, Sofia, Bulgaria.
15. Mehmet Sabır Kiraz, Süleyman Kardaş, Muhammed Ali Bingol, Fatih Birinci, (2012) "Anonymous RFID Authentication Protocol Without a Trusted Party", 5th International Information Security & Cryptology Conference (ISCTurkey’12), Ankara, Turkey, May 2012.
16. Suleyman Kardas, Mehmet Sabır Kiraz, Muhammed Ali Bingol, Hüseyin Demirci, (2011) “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, In 7th International Workshop on RFID Security – RFIDSec’11, Amherst, USA, June 2011. Lecture Notes in Computer Science vol. 7055, pages. 78-93, Springer Verlag.
17. Orhun Kara, Suleyman Kardas, Muhammed Ali Bingol, Gildas Avoine, (2010) “Optimal Security Limits of RFID Distance Bounding Protocols,” In 6th International Workshop on RFID Security – RFIDSec’10, Istanbul, Turkey, June 2010. Lecture Notes in Computer Science vol. 6370, pages. 220-238, Springer Verlag.
18. Muhammed Ali Bingol, Ali Ozhan Gurel, Orhun Kara, Suleyman Kardas, (2010) "A New RFID Distance Bounding Protocol", 4th International Information Security & Cryptology Conference (ISCTurkey’10), Ankara, Turkey, May 2010.
19. Muhammed Ali Bingol, Süleyman Kardaş, Ünal Kocabaş, (2015) “Common Criteria Protection Profile for Secure Communication Module for Water Tracking System (SCM-WTS PP) - CC V3.1 r4 - EAL 2” Common Criteria Portal.