Altay Yavuz, PhD
LLC, North America
Research And Technology Center (RTC3)
Work Address: 2835 East Carson St., Suite
210, Pittsburgh, PA 15203.
Personal: 3245 Beechwood Blvd, Apt C-22, Pittsburgh, PA
I am a research scientist
within the security and privacy research group of Robert Bosch Research
and Technology Center
. I conduct applied
cryptography and network security
research. My current focus is
to develop and execute a
research agenda to address the security and privacy requirements of big
data technologies (e.g., cloud computing, data outsourcing and
analysis) and smart infrastructures (e.g., internet of things and
systems, cyber-physical systems).
University of Pittsburgh, School of Information Sciences, Pittsburgh,
Carolina State University, Raleigh, North Carolina USA
- PhD, Computer Science, January 2007-August
Efficient, Compromise Resilient and Compact Cryptographic Constructions
for Digital Forensics,
- Advisor: Prof. Dr. Peng Ning
Reiter (University of North Carolina at Chapel Hill).
University, Istanbul, Turkey
- M.S., Computer Science, September
- Thesis: Novel
Methods for Security Protocols and Key Management Techniques in MANETs
based on Signcryption and Hybrid Cryptography,
- Advisor: Prof.
Dr. Fatih Alagoz and Prof. Dr. Emin Anarim.
Technical University, Istanbul, Turkey
Computer Science and Engineering, 2004,
Implementation of a Large Number Arithmetic and RSA Digital Signature
I am interested in design, analysis and application of cryptographic
tools and protocols to enhance the security of computer networks and
systems. My current research focuses on the following topics: Privacy
enhancing technologies (e.g., dynamic symmetric and public key based
searchable encryption), security in cloud computing, authentication and
integrity mechanisms for resource-constrained devices and
large-distributed systems, efficient cryptographic protocols for
wireless sensor networks.
Enhancing Technologies (PETs) for Big Data Technologies
A fundamental problem in
information security is how to achieve the usability (e.g., search and
analysis) and privacy of sensitive data simultaneously. Satisfactory
solutions to this problem will play a key role for the emergence of
applications that rely on secure data outsourcing. Consider a
cloud-based application, in which the client outsources some data to
the cloud. The client must encrypt the sensitive data to ensure its
privacy. However, if only standard encryption methods are used, it is
not possible to perform search/analysis on the encrypted data. Privacy
Enhancing Technologies (PETs) aim to address these limitations.
existing PETs are computation or communication/storage costly,
therefore cannot meet the requirements of real-life applications.
To address these limitations, I pursue research on Searchable Encryption (SE)
develop Dynamic Symmetric SE (DSSE)
and Public Key Encryption with Keyword Search (PEKS)
methods to enable practical search on encrypted data. I also develop a
searchable encrypted database system and deploy it for Bosch-wide
applications. Please see [AY21, AY22, AY23].
Cyber-Physical Systems (CPSs) with Efficient Cryptography (2014-2016)
The security and reliability of CPSs (e.g., smart-grid) have a critical
impact on society. The distributed and real-time nature of CPSs creates
security and performance challenges. For instance, an emergency
shut-down command sent from a control-center should be processed
immediately by a large number of peripheral devices. It is therefore,
vital to provide efficient authentication and integrity for such
systems. Unfortunately, existing security mechanisms are either
computationally costly (e.g., standard signatures) or unscalable (e.g.,
one-time, offline/online signatures). To address these limitations, I
have been developing efficient cryptographic schemes. Please see
[AY1, AY7, AY8, AY9, AY18, AY19,
- University of California Irvine (UCI):
Privacy Enhancing Technologies
(PETs) and authentication/attestation techniques (with Prof. Dr. Gene
- University of North
Carolina at Chapel Hill: New
user friendly authentication methods (with Prof. Dr. Michael K. Reiter).
- University of Pittsburgh:
Security in smart-grid systems (with
Prof. Dr. David Tipper) and applied cryptography (with Prof. Dr. James
articles are copyrighted by the respective publishers
and may be downloaded only
for personal use.
Journal Papers (SCI/SCI-E)
- (AY6) Attila
A. Yavuz, Emin Anarim and Fatih Alagoz,
Merkle Cryptosystem (IMC),"
Vol. 4263, Lecture Notes in Computer Science (LNCS), page
924-934, Springer-Verlag, November 2006.
International Conference Papers
- (AY14) Attila
A. Yavuz, Fatih Alagoz and Emin Anarim, "Three-Tier
Satellite Security Multicast Security Protocol Based
on ECMQV and IMC
Methods", Computer-Aided Modeling,
Analysis and Design of Communication Links and Networks,
(IEEE CAMAD'06), Italy, April 2006.
- (AY16) Attila
Fatih Alagoz, Emin Anarim,
"A New Multicast Security
Protocol", GAP, International V. Engineering
- (AY17) Goksel Biricik, Attila
A. Yavuz, Omur Kartal, Oya Kalipsiz, "Developing
with N-Tier Architecture:
Hospital Management Information
System", Biltek International Informatik Congress,
- (AY18) Attila A. Yavuz, “System
and Method for Message Verification in Broadcast and Multicast
Networks”, May 2012.
- (AY19) Attila A. Yavuz,
“System and Method for Counter Mode Encrypted Communication with
Reduced Bandwidth”, October 2012 (with Jorge Guajardo, Glas
Benjamin, Ihle Markus, Hamit Hacioglu, Wehefritz Karsten).
- (AY21) Attila A. Yavuz, “A Method and System to Search on
Encrypted Data with Secure and Fast Updates”, September 2013 (with
Jorge Guajardo and Anvesh Ragi).
- (AY22) Attila A. Yavuz, “A Method and System to Search on
Encrypted Data with Fast Searches”, September 2013 (with Jorge Guajardo
and Anvesh Ragi).
- (AY23) Attila A. Yavuz, “A Method and System to Search on
Encrypted Data with Oblivious Search Patterns”, September 2013 (with
Jorge Guajardo and Anvesh Ragi).
Work in Progress
- Velin Kounev, David Tipper,
Attila A. Yavuz, Bradon M. Grainger, Gregory F. Reed, “A Secure Communication Architecture for Distributed Microgrid Control”, IEEE
Transactions on Smart Grid on Cyber Physical Systems and Security for
Smart Grid” (special issue), under revision, November 2013.
Kampanakis, Attila A. Yavuz,
“PPL-BAF: A Practical Cryptographic Secure
Audit Logging Scheme for Digital Forensics”, International Journal of
Information Security, under revision, September 2013.
- Attila A. Yavuz and
Jorge Guajardo, “Practical Public key Encryption
with Keyword Search (PEKS) via Trapdoor Permutations by using Trusted
Hardware”, to be submitted to ACM Transactions on Information and
Systems Security (TISSEC).
- Attila A. Yavuz and
Shalabh Jain, “Highly Efficient Digital
Signatures via Condensed-RSA with Random Masks”, to be submitted
- Attila A. Yavuz,
Peng Ning and Michael Reiter, “I-LogFAS: Improved Cryptographic
Constructions for Compromise Resiliency and Compactness”, to be
submitted to IEEE Transactions on Information Forensics and Security
Teaching and Mentoring
I served as a Teaching Assistant (TA) for various courses in the
Department of Computer Science, NC State University:
- CSC 226 Discrete Mathematics with Dr. Robert Rodman
- CSC 574 Network Security with Dr. Ting Yu and Dr. Peng Ning,
(Fall 2008, Fall 2009, and Spring 2011, respectively).
- CSC 501 Operating Systems with Dr. Douglas Pase
- CSC 774 Advanced Network Security with Dr. Peng Ning
(Spring 2008 and Spring 2009).
- CSC 579 Computer Performance Modelling with Dr. Billy Stewart (Spring
In my current position, I guide PhD and MS students on various research
- Mr. Anvesh Ragi is a MS student at the University of
at Dallas, Department of Computer Science. We work on “Efficient
Symmetric Searchable Encryption Schemes”.
- Mr. Shalabh Jain is a PhD candidate at the University
Maryland College Park, Department of Electrical and Computer
Engineering. We work on “Efficient Digital Signatures for Real-time
- Ms. Alana Libonati is a PhD candidate at the University
Chapel Hill at North Carolina, Department of Computer Science. We work
on “User Friendly Authentication Methods”.
- Mr. Yi Ding is a PhD student at the Georgia Technical
University, the School of Computer Science. We work on “Efficient and
Secure Face Recognition via Multi-Party Computation”.
- Mr. Velin Kounev is a PhD candidate at the University
Pittsburgh, School of Information Sciences. We work on “Secure
Communication Methods for Microgid Systems”.
- Research Scientist,
Robert Bosch Research and Technology Center (December 2011-Present)
Assistant, Department of Computer Science, NC State
Assistant, Department of Computer Science, NC State
Networks Research Laboratory (SATLAB),
Bogazici University, Turkey, (2005-2006)
- Cryptographic protocol design for satellite
networks and Military MANETS
Intern, Department of Computer Science, NC State
University, USA, 2003
- A Simulation Project in C++ and Research on
- Ipv6 Implementations on Linux Based Networks
Intern, Vestelnet Software Engineering, Turkey, 2002
- Cryptographic applications in C Languages and Vcare
Thesis: Compromise Resilient, Compact, and Efficient
Cryptographic Constructions for Digital Forensics
security of audit logs in resource-constraint systems is a challenging
task, especially in the presence of active adversaries. To fulfill this
need, we develop a series of forward-secure and aggregate cryptographic
constructions, which achieve high computational efficiency,
compactness, and public
verifiability at the same time. Our schemes are shown to be
significantly more efficient, scalable and secure than all of their
counterparts for secure audit logging in resource-constraint
environments as well as large-distributed systems.
Thesis: Novel Methods for Security
Protocols and Key Management Techniques in Wireless Networks Based on
Signcryption and Hybrid Cryptography
Ad-Hoc NETworks (MANETs) are expected to play a central role in Future
Combat Systems (FCSs). In this thesis, we develop a set of novel
satellite supported multi-tiered military MANET security protocols.
Proposing new key management and hybrid cryptography techniques, our
protocols are demonstrated to be more efficient and scalable than their
counterparts, and therefore are ideal choice to provide security in
- BS Thesis:
and Implementation of a Large Number Arithmetic Library and RSA Digital
Signature Software Packet, Yildiz Technical University.
- A Multi-tiered Hospital Information System
(Developed for Istinye Government Hospital), Yildiz Technical
University, (January-June 2004)
- Design, Analysis and Implementation of Simulation
Interference Problem), North Carolina State University (June-September
2003), with Dr.
- Comparative Study on Face Recognition Algorithms
Occlusion Problems, Bogazici University (August-December 2004), with Dr. Lale Akarun.
- A New Algorithm to Detect Communities in a Complex
System and its
application to Macaque/Cat Brain Connectivity, Bogazici University
(July 2005-June 2006) with Dr.
- Design and Analysis of Stream Ciphers based on LFSR
and T-functions, Bogazici University (January 2005-June 2005),
with Dr. Emin Anarim.
- 17th International Conference on Financial Cryptography
Data Security (FC 2013), April 1-5, 2013, Okinawa, Japan.
- International Journal of Distributed Sensor Networks
(IJDSN), Hindawi, (2013).
- Journal of Algorithms, Open Access Journal by MPDI
- 5th International Symposium on Cyberspace Safety and
Security (CSS 2013). Zhangjiajie, China, 2013.
- Invited talk at 6th BEO-AK 251 Workshop, Robert
Research, “Challenges of security and privacy in Internet of Things”,
- IEEE Transactions on Computers (2012).
- Journal of Energies, Open Access Journal by MPDI
- 9th International Symposium on Wireless Communication
Systems (ISWCS) (2012).
- Concurrency and Computation: Practice and Experience,
- NC State Application Review Committee (2010).
ACM Symposium on Information, Computer and
Communications Security (ASIACSS '10), April 2010, Beijing,
ACM Conference on Wireless Network Security
(WiSec '09), March 2009, Zurich, Switzerland.
International Conference on Information,
Communications and Signal Processing (ICICS '09), Macau, 2009.
- Journal of System and Software, 2007 and 2011.
- IEEE Transactions on Information Technology in
Biomedicine, April 2007.
- 21th International Symposium on Computer
and Information Sciences (ISCIS '07), Istanbul, Turkey, Nov. 2006.
- 7th International Symposium on Computer
Networks (ISCN '06), Istanbul, Turkey, June 2006.
- Professional memberships
- Institute of Electrical and Electronics
(IEEE) (seven years)
- Association for Computing Machinery (ACM) (two years)
- International Association for Cryptologic Research
Date/Place: 06/21/1982, Ankara, Turkey
- Hobbies: Philosophy,
music, reading and chess