Search Results - attila+yavuz

16 Results Sort By:
Efficient, Scalable and Post-Quantum Authentication for Real-time Next Generation Networks with Probabilistic Data Structures
Advantages: 4x to 6x faster key generation and up to 5x faster signature verification than existing methods Works on low-power devices like drones, smartwatches, and medical implants Post-quantum secure and designed for real-time communication needs Scales easily across large systems with many devices and users Summary: Modern wireless systems...
Published: 4/16/2025   |   Inventor(s): Attila Yavuz, Kiarash Sedghighadikolaei
Keywords(s):  
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Computer Science > C/S Cybersecurity
Privacy-Preserving and Post-Quantum Secure Counter Denial of Service
Advantages: Post-quantum secure protection against DoS and DDoS attacks Privacy-preserving spectrum access with location and identity anonymity Efficient puzzle outsourcing via Private Spectrum Bastions (PSBs) Flexible deployment options: hash-based, lattice-based, and blockchain-integrated Compliance-ready with FCC standards and NIST-approved...
Published: 5/7/2025   |   Inventor(s): Attila Yavuz, SALEH DARZI
Keywords(s): Cryptography and Intrusion Detection, Telecommunication / Wireless Communication
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Electronics > Electronics Telecommunications
Post-Quantum Forward-Secure Signatures with Hardware-Support for Internet of Things
­Advantages: HASES ensures robust and scalable authentication for IoT applications, safeguarding against compromise risks. HASES offers forward security without the need for expensive specialized hardware, making it practical for low-end IoT devices. HASES outperforms existing alternatives, achieving significantly faster speeds and greater...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT
Category(s): Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics > Electronics Sensors, Technology Classifications > Electronics > Nanotechnology
Graphene Based Scheme for IoT and Forensic Applications
Competitive Advantages This Graphene based scheme is profoundly lightweight but offers strong features, which make it ideal for resource-restricted IoT applications. This scheme provides a solution for application where it requires the minimal expense and wide organization of sensors, like in smart cities, and combat zones, wherein forward-security...
Published: 3/6/2025   |   Inventor(s): Attila Yavuz
Keywords(s): Health Tech, Internet of Things / IoT, Medical Devices
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Engineering > Computer Engineering, Technology Classifications > Medical > Cybersecurity, Technology Classifications > Medical > Medical Devices
System and Method for Cryptographic Forensic Audits on Lightweight IoT and Digital Archives
­­­Competitive Advantages: Our solution solves the problem of bottleneck by converting it into logarithmic seed storage overhead, which helps in offering the service to different categories of end devices In terms of cryptographic audit data and time-combined performance, the suggested OPAS schemes achieve outstanding performance...
Published: 9/3/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Internet of Things / IoT, Medical Devices, Medical Imaging, Sensor
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Sensors
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations, Telecommunication and Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Electronics, Technology Classifications > Computer Science > C/S Cybersecurity
A System And Method For Lightweight Post-Quantum Authentication For The Internet Of Things And Systems
Competitive Advantages Less memory is required for the signature and communication, as it does not require the signer to store and send the public key. Meets the NIST post-quantum cryptography standard with faster and memory-efficient processing on the signer’s side. The algorithm does not require any repetition of the signing algorithm....
Published: 7/12/2023   |   Inventor(s): Rouzbeh Behnia, Attila Yavuz
Keywords(s): Authentication and Biometric Systems, Cryptography and Intrusion Detection, Internet of Things / IoT
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications > Computer Science, Technology Classifications > Data/AI, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Medical > Medical Devices, Technology Classifications > Medical > Medical Sensors
Hardware Supported Authentication and Signatures For Wireless, Distributed and Blockchain Systems
Competitive Advantages Energy-aware authentication protocol suitable for IoT devices and embedded devices Provable Security standards to the level of upcoming post-quantum security breaches in cryptosystems Scalable security architecture support for massive IoT applications Summary IoT devices play a central role in the distributed systems for...
Published: 8/16/2024   |   Inventor(s): Attila Yavuz, Saif Nouma
Keywords(s): Blockchain, Cryptography and Intrusion Detection, Cybersecurity
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Network Systems
A Method for Forward Secure, Append-only and Distributed Audit Log Protection
Competitive Advantages Post quantum security Achieves non-repudiation Broad applicability Minimal computational overhead Summary USF inventors have developed a mechanism to create a new cryptographic secure audit logging scheme which is also post-quantum secure. This invention ensures that an active adversary cannot generate authentication...
Published: 9/7/2022   |   Inventor(s): Attila Yavuz
Keywords(s):  
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science
Quantum Secure Cryptographic Methods for Digital Auditing
Competitive Advantages Optimal efficiency Breach resilient auditing Post quantum security Secure multi party computation Summary USF inventors have devised a cryptographic mechanisms with extended properties that can achieve scalability and non repudiation in a highly efficient manner. The main idea is to achieve optimal efficiency and post...
Published: 9/7/2022   |   Inventor(s): Attila Yavuz
Keywords(s):  
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > C/S Cybersecurity
1 2