If you made any changes in Pure these will be visible here soon.

Fingerprint

Dive into the research topics where Z. Erkin is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Efficient joint random number generation for secure multi-party computation

    Hoogerwerf, E., van Tetering, D., Bay, A. & Erkin, Z., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 436-443 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Multi-party private set intersection protocols for practical applications

    Bay, A., Erkin, Z., Alishahi, M. & Vos, J., 2021, Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021. di Vimercati, S. D. C. & Samarati, P. (eds.). SciTePress, p. 515-522 8 p. (Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Privacy-Preserving Data Aggregation with Probabilistic Range Validation

    Dekker, F. W. & Erkin, Z., 2021, International Conference on Applied Cryptography and Network Security. Sako, K. & Tippenhauer, N. O. (eds.). 19 ed. Kamakura, Japan: Springer Nature, Vol. 2. p. 79-98 20 p. (Lecture Notes in Computer Science; vol. 12727, no. 1).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    49 Downloads (Pure)
  • How to profit from payments channels

    Ersoy, O., Roos, S. & Erkin, Z., 2020, Proceedings of the 24th Financial Cryptography and Data Security, Kota Kinabalu, Sabah, Malaysia. Bonneau, J. & Heninger, N. (eds.). Cham: Springer, p. 284-303 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    File
    2 Citations (Scopus)
    68 Downloads (Pure)
  • Post-quantum adaptor signatures and payment channel networks

    Esgin, M. F., Ersoy, O. & Erkin, Z., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings: 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Part II ed. Cham: Springer, p. 378-397 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Downloads (Pure)