ذكذكتسئµ

Dr Muhammed Ali Bingol

Job: Senior Lecturer in Cyber Security

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Cyber Technology Institute

Address: ذكذكتسئµ, The Gateway, Leicester, LE1 9BH, UK

T: +44(0)1163664736

E: muhammed.bingol@dmu.ac.uk

W:

 

Personal profile

Dr Muhammed Ali Bingol is a Senior Lecturer in Cyber Security and Program Leader for Computer Networks & Security at ذكذكتسئµ, UK. He is an expert cryptographer and computer scientist specialized in design and analysis of cryptographic protocols. He received his BS. degree in Telecommunications Engineering and MSc. degree in Electronics and Communication Engineering from Istanbul Technical University, in 2008 and 2012, respectively. During his master studies, he has been a visiting scientist at Université Catholique de Louvain, Belgium. He has received his Ph.D. degree in Computer Science and Engineering at Sabanci University, in Jan 2019. He worked in Telecommunications Software & Systems Group (TSSG) as a research engineer, and American Online (AOL) as a XDSL engineer in Waterford / Ireland in 2007. He worked at TUBITAK BILGEM National Research Institute of Electronics & Cryptology as Chief Researcher from 2008 to 2020. He worked in several public, government and EU projects related to Cryptography and Information Security. He also served a visiting lecturer in Cybersecurity Engineering at Istanbul City University, from 2015 to 2019.

Research group affiliations

Publications and outputs

Selected Publications

1. Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, and Albert Levi (2022). "Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 835-847, April 2022, doi:10.1109/TDSC.2020.3009496. 

2.  Monica P. Arenas, Muhammed Ali Bingol, Hüseyin Demirci, Georgios Fotiadis, and Gabriele Lenzini (2022). "A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption", In Proceedings of AfricaCrypt'22, 13th Annual International Conference on the Theory and Applications of Cryptology, to be appear in LNCS Springer.

3. Muhammed Ali Bingol, Osman Bicer, Mehmet Sabır Kiraz, and Albert Levi. (2019) “An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates”. The Computer Journal. Available at https://doi.org/10.1093/comjnl/bxy136. 

4. Gildas Avoine, Muhammed Ali Bingol, Ioana Boureanu, Srdjan Capkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cedric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado-Dominguez, Kasper Bonne Rasmussen, Dave Singelee, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, (2018). “Security of Distance-Bounding: A Survey” ACM Computing Surveys (CSUR) 51 (5), 94. 

5. Duygu Karaoğlan Altop, Muhammed Ali Bingol, Erkay Savaş, Albert Levi, (2017) DKEM: Secure and Efficient Distributed Key Establishment Protocol for Wireless Mesh Networks, Ad Hoc Networks 54, 53-68. 

6. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2016) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, Security Comm. Networks, 9 (18), 5051-5063. 

7. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Mehmet Sabır Kiraz, Hüseyin Demirci, and Albert Levi, (2015) “k-Strong Privacy for RFID Authentication Protocols Based on Physically Unclonable Functions” Wireless Communications and Mobile Computing 15 (18), 2150-2166. 

8. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent, S. Berna Ors Yalçin, (2012) “Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography” IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049. 

9. Muhammed Ali Bingol, Fatih Birinci, Süleyman Kardaş, Mehmet Sabır Kiraz, (2012) “Anonymous RFID Authentication for Cloud Services”, International Journal of Info. Security Science 1 (2), 32-42. 

10. Gildas Avoine, Muhammed Ali Bingol, Süleyman Kardaş, Cedric Lauradoux, and Benjamin Martin, (2011) “A Framework for Analyzing RFID Distance Bounding Protocols”, Journal of Computer Security 19 (2), 289-317. 

11. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpenti Süleyman Kardaş, (2013) “Deploying OSK on low-resource mobile devices”, In 9th International Workshop on RFID Security – RFIDSec’13, Graz, Austria, June 2013. Lecture Notes in Computer Science vol. 8262, pages. 3-8, Springer Berlin Heidelberg. 

12. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Albert Levi, (2013) “A new security and privacy framework for RFID in cloud computing”, In 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK, December 2013, pages 171-176, IEEE Computer Society. 

13. Eren Kocaağa, Bünyamin Tanıl, Muhammed Ali Bingol, Süleyman Kardaş, (2013) “Solution of A Conjecture: On 2-PCD RFID Distance Bounding Protocols”, In proceedings of 6th International Information Security & Cryptology Conference (ISCTurkey’13), Ankara, Turkey, September 2013. 

14. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2013) Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements, In proceedings of International Conference BulCrypt, September 2012, Sofia, Bulgaria. 

15. Mehmet Sabır Kiraz, Süleyman Kardaş, Muhammed Ali Bingol, Fatih Birinci, (2012) "Anonymous RFID Authentication Protocol Without a Trusted Party", 5th International Information Security & Cryptology Conference (ISCTurkey’12), Ankara, Turkey, May 2012. 

16. Suleyman Kardas, Mehmet Sabır Kiraz, Muhammed Ali Bingol, Hüseyin Demirci, (2011) “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, In 7th International Workshop on RFID Security – RFIDSec’11, Amherst, USA, June 2011. Lecture Notes in Computer Science vol. 7055, pages. 78-93, Springer Verlag. 

17. Orhun Kara, Suleyman Kardas, Muhammed Ali Bingol, Gildas Avoine, (2010) “Optimal Security Limits of RFID Distance Bounding Protocols,” In 6th International Workshop on RFID Security – RFIDSec’10, Istanbul, Turkey, June 2010. Lecture Notes in Computer Science vol. 6370, pages. 220-238, Springer Verlag. 

18. Muhammed Ali Bingol, Ali Ozhan Gurel, Orhun Kara, Suleyman Kardas, (2010) "A New RFID Distance Bounding Protocol", 4th International Information Security & Cryptology Conference (ISCTurkey’10), Ankara, Turkey, May 2010. 

19. Muhammed Ali Bingol, Süleyman Kardaş, Ünal Kocabaş, (2015) “Common Criteria Protection Profile for Secure Communication Module for Water Tracking System (SCM-WTS PP) - CC V3.1 r4 - EAL 2” Common Criteria Portal.

Research interests/expertise

His primary research interests include cryptography and information security; blockchain & cryptocurrencies; zero-knowledge proofs, wireless communication security; secure multi-party computation; private function evaluation; authentication systems; e-voting.

Areas of teaching

Cryptography, Foundations of Cyber Security, C Programming, Information Security Management Principles, Software and Security Management, Computer Networks and Malware Analysis.

Courses taught

C Programming, Cryptography, Computer Networks, Foundations of Cyber Security, Information Security Management Principles, Malware Analysis, Mathematics for Computing, Software and Security Management, Wireless Network Security.

Membership of professional associations and societies

Fellowship of the Higher Education Academy (FHEA)

Cisco Networking Academy (CNA)

Institute of Electrical and Electronics Engineers (IEEE)

ORCID number

Administrative responsibilities

MuhammedAliBingol