Ahmet Sinak

Ahmet Sinak
Middle East Technical University | METU · Institute of Applied Mathematics "IAM"

About

19
Publications
911
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
261
Citations

Publications

Publications (19)
Article
The construction of (minimal) linear codes from functions has received much attention in the literature. In this paper, we derive several minimal codes from the sets of pre-images of weakly regular plateaued and bent functions over the odd characteristic finite fields. Based on the recent construction method, we obtain six-weight and seven-weight m...
Article
Minimal linear codes have diverse applications in many areas such as secret sharing schemes and secure two-party computation. There are several construction methods for these codes, one of which is based on functions over finite fields. In this paper, to construct minimal codes with few weights, we make use of weakly regular plateaued balanced func...
Article
Full-text available
Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common problems in blockchain systems. In the literature, some types of secret sharing schemes are employed t...
Preprint
Linear codes have diverse applications in secret sharing schemes, secure two-party computation, association schemes, strongly regular graphs, authentication codes and communication. There are a large number of linear codes with few weights in the literature, but a little of them are minimal. In this paper, we are using for the first time weakly reg...
Article
Minimal linear codes have significant applications in secret sharing schemes and secure twoparty computation. There are several methods to construct linear codes, one of which is based on functions over finite fields. Recently, many construction methods for linear codes from functions have been proposed in the literature. In this paper, we generali...
Article
Full-text available
Linear codes, the most significant class of codes in coding theory, have diverse applications in secret sharing schemes, authentication codes, communication, data storage devices and consumer electronics. The main objectives of this paper are twofold: to construct three-weight linear codes from plateaued functions over finite fields, and to analyze...
Preprint
The paper provides the first constructions of strongly regular graphs and association schemes from weakly regular plateaued functions over finite fields of odd characteristic. We generalize the construction method of strongly regular graphs from weakly regular bent functions given by Chee et al. in [Journal of Algebraic Combinatorics, 34(2), 251-26...
Preprint
Full-text available
Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on functions over finite fields. Recently, many construction methods of linear codes based on functions have been proposed in the literature. In this paper, we gene...
Article
Full-text available
Plateaued functions play a significant role in cryptography, sequences for communications, and the related combinatorics and designs. Comparing to their importance, those functions have not been studied in detail in a general framework. Our motivation is to bring further results on the characterizations of bent and plateaued functions, and to intro...
Chapter
Partially bent and plateaued functions over finite fields have significant applications in cryptography, sequence theory, coding theory, design theory and combinatorics. They have been extensively studied due to their various desirable cryptographic properties. In this paper, we study on characterizations of partially bent and plateaued functions o...
Article
Plateaued and bent functions play a significant role in cryptography, sequence theory, coding theory and combinatorics. In 1997, Coulter and Matthews redefined bent functions over any finite field Fq where q is a prime power, and established their properties. The objective of this work is to redefine the notion of plateaued functions over Fq, and t...
Article
Full-text available
Linear codes with few weights have many applications in secret sharing schemes, authentication codes, communication and strongly regular graphs. In this paper, we consider linear codes with three weights in arbitrary characteristic. To do this, we generalize the recent contribution of Mesnager given in [Cryptography and Communications 9(1), 71-84,...
Conference Paper
Plateaued (vectorial) functions have an important role in the sequence and cryptography frameworks. Given their importance, they have not been studied in detail in general framework. Several researchers found recently results on their characterizations and introduced new tools to understand their structure and to design such functions. In this work...
Article
Full-text available
Representation of a field element plays a crucial role in the efficiency of field arithmetic. If an efficient representation of a field element in one basis exists, then field arithmetic in the hardware and/or software implementations becomes easy. Otherwise, a basis conversion to an efficient one is searched for easier arithmetic. However, this co...
Conference Paper
Bent and plateaued functions play a significant role in cryptography since they can have various desirable cryptographic properties. In this work, we first provide the characterizations of plateaued functions in terms of the moments of their Walsh transforms. Next, we generalize the characterizations of Boolean bent and plateaued functions in terms...
Conference Paper
Vectorial Boolean functions are used as substitution boxes in cryptosystems. Designing inequivalent functions resistant to known attacks is one of the challenges in cryptography. In doing this, finding a fast technique for determining whether two given functions are equivalent is a significant problem. A special class of the equivalence called rest...

Network

Cited By