publications by categories in reversed chronological order. generated by jekyll-scholar.


  1. Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning
    Gorka Abad, Servio Paguada, Oğuzhan Ersoy, Stjepan Picek, Vı́ctor Julio Ramı́rez-Durán, and 1 more author
    In IEEE Conference on Secure and Trustworthy Machine Learning (accepted) 2023
  2. BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts
    Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, and 5 more authors
    In IEEE Symposium on Security and Privacy (accepted) 2023


  1. Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets
    Gorka Abad, Oğuzhan Ersoy, Stjepan Picek, Vı́ctor Julio Ramı́rez-Durán, and Aitor Urbieta
    In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
  2. SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony
    Oğuzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kimble, and Stefanie Roos
    In ACM Advances in Financial Technologies (presented) 2022
  3. Get Me out of This Payment! Bailout: An HTLC Re-routing Protocol
    Oğuzhan Ersoy, Pedro Moreno-Sanchez, and Stefanie Roos
    Cryptology ePrint Archive 2022
  4. A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
    Muhammed F Esgin, Oğuzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, and 3 more authors
    Cryptology ePrint Archive 2022
  5. Feverless: Fast and secure vertical federated learning based on xgboost for decentralized labels
    Rui Wang, Oğuzhan Ersoy, Hangyu Zhu, Yaochu Jin, and Kaitai Liang
    IEEE Transactions on Big Data 2022


  1. Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures
    Lukas Aumayr, Oğuzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, and 3 more authors
    In ASIACRYPT (2) 2021
  2. Bitcoin-Compatible Virtual Channels
    Lukas Aumayr, Matteo Maffei, Oğuzhan Ersoy, Andreas Erwig, Sebastian Faust, and 3 more authors
    In IEEE Symposium on Security and Privacy 2021
  3. Practical Exchange for Unique Digital Goods
    Oğuzhan Ersoy, Ziya Alper Genç, Zekeriya Erkin, and Mauro Conti
    In DAPPS 2021


  1. How to Profit from Payments Channels
    Oğuzhan Ersoy, Stefanie Roos, and Zekeriya Erkin
    In Financial Cryptography 2020
  2. Post-Quantum Adaptor Signatures and Payment Channel Networks
    Muhammed F. Esgin, Oğuzhan Ersoy, and Zekeriya Erkin
    In ESORICS (2) 2020
  3. Homomorphic extensions of CRT-based secret sharing
    Oğuzhan Ersoy, Thomas Brochmann Pedersen, and Emin Anarim
    Discrete Applied Mathematics 2020


  1. MUSCLE: authenticated external data retrieval from multiple sources for smart contracts
    Bjorn Laan, Oğuzhan Ersoy, and Zekeriya Erkin
    In SAC 2019
  2. DECOUPLES: a decentralized, unlinkable and privacy-preserving traceability system for the supply chain
    Mourad Maouchi, Oğuzhan Ersoy, and Zekeriya Erkin
    In SAC 2019
  3. Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement
    Oğuzhan Ersoy, Zekeriya Erkin, and Reginald L. Lagendijk
    In MARBLE 2019
  4. TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant Communication
    Oğuzhan Ersoy, Zekeriya Erkin, and Reginald L. Lagendijk
    In EuroS&P Workshops 2019
  5. Multilevel Threshold Secret Sharing based on the Chinese Remainder Theorem
    Oğuzhan Ersoy, Kamer Kaya, and Kerem Kaskaloglu
    International Journal of Information Security Science 2019


  1. Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms
    Oğuzhan Ersoy, Zhijie Ren, Zekeriya Erkin, and Reginald L. Lagendijk
    In CVCBT 2018
  2. TRADE: A transparent, decentralized traceability system for the supply chain
    Mourad El Maouchi, Oğuzhan Ersoy, and Zekeriya Erkin
    In Proceedings of 1st ERCIM Blockchain Workshop 2018



    1. Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
      Asli Bay, Oğuzhan Ersoy, and Ferhat Karakoç
      In ASIACRYPT (1) 2016
    2. Impossible Differential Cryptanalysis of 16/18-Round Khudra
      Ferhat Karakoç,  Mut Sagdiçoglu, Mehmet Emin Gönen, and Oğuzhan Ersoy
      In LightSec 2016
    3. A CRT-based verifiable secret sharing scheme secure against unbounded adversaries
      Oğuzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk, and Emin Anarim
      Security and Communication Networks 2016