Topic: PhD Theses
PhD Theses by IAM. 
Publications for topic "PhD Theses"
2016
Randomness Properties of Some Vector Sequences Generated by Multivarıate Polynomial Iterations, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2016  ,

Secure Electronic Exam, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2016  ,
Server Notaries: A Complementary Approach to the Web Pki Trust Model, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2016  ,
2015
Advences in Robust Identification of Spline Models and Networks by Robust Conic Optimization, with Applications to Different Sectors, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Constant Proportion Portfolio Insurance in DefinedContribution Pension Plan Management, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Discontinuous Galerkin Finite Elements Method With Structure Preserving Time Integrators for Gradient Flow Equations, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Electricity Market Modeling Using Stochastic and Robust Optimization, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Local Improvements to ReducedOrder Approximations of PdeConstrained Optimization Problems, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Modeling Correlation Structure for Collateralized Debt Obligations and Determining the Underlying Credit Default Swap Spread Equations, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
On Constructions and Enumeration of Bent and SemiBent Functions, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Particle Mcmc For a Time Changed Levy Process, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
Pricing and Risk Minimizing Hedging Strategies for Multiple Life Unit Linked Insurance Policies Using Constant Proportion Portfolio Insurance Approach, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2015  ,
2014
Drbem Applications in Fluid Dynamics Problems and Dqm Solutions of Hyperbolic Equations, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

Early Warning on Stock Market Bubbles Via Ellipsoidal Clustering and Inverse Problems, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

Fem Solutions Of Magnetohydrodynamic and Bionagnetic Fluid Flows in Channels, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

Improbable Differential Cryptanalysis, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

Modeling Stochastic Hybrid Systems With Memory With an Application to Immune Response of Cancer Dynamics, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2014  ,
On Nonlinearity and Hamming Weight Preserving Bijective Mappings Acting on Boolean Functions, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

On Obtaınıng Regular, Weakly Regular and NonWeakly Regular Bent Functıons Over Finite Fields and Ring of Integers modulo PM, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2014  ,

2013
A MultiPerıod Stochastic Portfolio Optimization and Hedging Model Applied for the Aviation Sector in the Eu Ets, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

Analysis of Boolean Functions with Respect to Walsh Spectrum, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,
Computing Cryptographic Properties of Boolean Functions From the Algebraic Normal Form Representatıon, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

Construction of Cryptographically Strong Boolean Functions Well Suited for Symmetric Cryptosystems, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

FPGA Based Cryptography Computation Platform and the Basis Conversion in Composite Finite Fields, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

HFE Based MultiVarıate Quadratic Cryptosystems and Dembowski Ostrom Polynomials, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

On Secure Electronic Auction Process of Government Domestic Debt Securities in Turkey, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

On the Trace Based Public Key Cryptosystems Over Finite Fields, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

Refinements, Extensions and Modern Applications of Conic Multivariate Adaptive Regression Splines, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2013  ,
RESULTS ON THE MULTIPLICATION IN FINITE FIELDS OF CHARACTERISTIC THREE USING MODIFIED POLYNOMIAL REPRESENTATION AND NORMAL ELEMENTS IN BINARY FIELDS, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

Security Analysis of Electronic Sıgnature Applications and Test Suite Study, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2013  ,

2012
Adaptive Discontinuous Galerkın Methods for Convection Dominated Optimal Control Problems, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

Analysis of Three Block Cipher Based Hash Functions: Whirlpool, Grostl and Grindahl, Middle East Technical University, 2012  ,

Existence Problem of Almost pAry Perfect And Nearly Perfect Sequences, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

On Provable Security Of Some Public Key Encryption Schemes, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

RepeatedRoot Cylic Codes and Matrix Product Codes, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

Risk Measurement, Management And Option Pricing Via a New LogNormal Sum Approxımation Method, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

Stochastic Modeling Of Electricity Markets, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2012  ,

2011
An Extension to the Varıational Iteration Method for Systems and HigherOrder Differential Equations, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

Continuous Time Mean Variance Optimal Portfolios, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

Neural Networks With Piecewise Constant Argument and Impact Activation, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

On Decoding Interleaved ReedSolomon Codes, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

Pricing and Hedging of Constant Proportion Debt Obligations, Financial Mathematics, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

Statistical Analysis of Block Ciphers and Hash Functions, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2011  ,

2010
Elliptic Curve PairingBased Cryptography, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2010  ,

New Approaches to Desirability Functions by Nonsmooth and Nonlinear Optimization, Scientific Computing, Institute of Applied Mathematics, Middle East Technical University, 2010  ,

On the Representation of Finite Fields, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2010  ,

Some Generalized Multipartite Access Structures, Cryptography, Institute of Applied Mathematics, Middle East Technical University, 2010  ,
