Skip to content

Dr Muhammed Ali Bingol

Job: Senior Lecturer in Cyber Security

Faculty: Technology

School/department: School of Computer Science and Informatics

Research group(s): Cyber Technology Institute

Address: De Montfort University, The Gateway, Leicester, LE1 9BH, UK

T: N/A

E: muhammed.bingol@dmu.ac.uk

W: http://dmu.ac.uk/cti

 

Personal profile

Dr Muhammed Ali Bingol is a Senior Lecturer in Cyber Security at De Montfort University, UK. He is an expert cryptographer and computer scientist specialized in design and analysis of cryptographic protocols. He received his BS. degree in Telecommunications Engineering and MSc. degree in Electronics and Communication Engineering from Istanbul Technical University, in 2008 and 2012, respectively. During his master studies, he has been a visiting scientist at Université Catholique de Louvain, Belgium. He has received his Ph.D. degree in Computer Science and Engineering at Sabanci University, in Jan 2019. He worked in Telecommunications Software & Systems Group (TSSG) as a research engineer, and American Online (AOL) as a XDSL engineer in Waterford / Ireland in 2007. He worked at TUBITAK BILGEM National Research Institute of Electronics & Cryptology as Chief Researcher from 2008 to 2020. He worked in several public, government and EU projects related to Cryptography and Information Security. He also served a visiting lecturer in Cybersecurity Engineering at Istanbul City University, from 2015 to 2019.

Research group affiliations

Cyber Technology Institute (CTI)

Publications and outputs 

Selected Publications 

1. Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, and Albert Levi (2020). Highly Efficient and Reusable Private Function Evaluation with Linear Complexity. IEEE Transaction on Dependable and Secure Computing (IEEE TDSC) https://doi.org/10.1109/TDSC.2020.3009496. 

2. Muhammed Ali Bingol, Osman Bicer, Mehmet Sabır Kiraz, and Albert Levi. (2019) “An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates”. The Computer Journal. Available at https://doi.org/10.1093/comjnl/bxy136. 

3. Gildas Avoine, Muhammed Ali Bingol, Ioana Boureanu, Srdjan Capkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cedric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado-Dominguez, Kasper Bonne Rasmussen, Dave Singelee, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay, (2018). “Security of Distance-Bounding: A Survey” ACM Computing Surveys (CSUR) 51 (5), 94. 

4. Duygu Karaoğlan Altop, Muhammed Ali Bingol, Erkay Savaş, Albert Levi, (2017) DKEM: Secure and Efficient Distributed Key Establishment Protocol for Wireless Mesh Networks, Ad Hoc Networks 54, 53-68. 

5. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2016) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, Security Comm. Networks, 9 (18), 5051-5063. 

6. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Mehmet Sabır Kiraz, Hüseyin Demirci, and Albert Levi, (2015) “k-Strong Privacy for RFID Authentication Protocols Based on Physically Unclonable Functions” Wireless Communications and Mobile Computing 15 (18), 2150-2166. 

7. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent, S. Berna Ors Yalçin, (2012) “Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography” IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049. 

8. Muhammed Ali Bingol, Fatih Birinci, Süleyman Kardaş, Mehmet Sabır Kiraz, (2012) “Anonymous RFID Authentication for Cloud Services”, International Journal of Info. Security Science 1 (2), 32-42. 

9. Gildas Avoine, Muhammed Ali Bingol, Süleyman Kardaş, Cedric Lauradoux, and Benjamin Martin, (2011) “A Framework for Analyzing RFID Distance Bounding Protocols”, Journal of Computer Security 19 (2), 289-317. 

10. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpenti Süleyman Kardaş, (2013) “Deploying OSK on low-resource mobile devices”, In 9th International Workshop on RFID Security – RFIDSec’13, Graz, Austria, June 2013. Lecture Notes in Computer Science vol. 8262, pages. 3-8, Springer Berlin Heidelberg. 

11. Süleyman Kardaş, Serkan Çelik, Muhammed Ali Bingol, Albert Levi, (2013) “A new security and privacy framework for RFID in cloud computing”, In 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK, December 2013, pages 171-176, IEEE Computer Society. 

12. Eren Kocaağa, Bünyamin Tanıl, Muhammed Ali Bingol, Süleyman Kardaş, (2013) “Solution of A Conjecture: On 2-PCD RFID Distance Bounding Protocols”, In proceedings of 6th International Information Security & Cryptology Conference (ISCTurkey’13), Ankara, Turkey, September 2013. 

13. Muhammed Ali Bingol, Fatih Birinci, Mehmet Sabir Kiraz and Suleyman Kardas, (2013) Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements, In proceedings of International Conference BulCrypt, September 2012, Sofia, Bulgaria. 

14. Mehmet Sabır Kiraz, Süleyman Kardaş, Muhammed Ali Bingol, Fatih Birinci, (2012) "Anonymous RFID Authentication Protocol Without a Trusted Party", 5th International Information Security & Cryptology Conference (ISCTurkey’12), Ankara, Turkey, May 2012. 

15. Suleyman Kardas, Mehmet Sabır Kiraz, Muhammed Ali Bingol, Hüseyin Demirci, (2011) “A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions”, In 7th International Workshop on RFID Security – RFIDSec’11, Amherst, USA, June 2011. Lecture Notes in Computer Science vol. 7055, pages. 78-93, Springer Verlag. 

16. Orhun Kara, Suleyman Kardas, Muhammed Ali Bingol, Gildas Avoine, (2010) “Optimal Security Limits of RFID Distance Bounding Protocols,” In 6th International Workshop on RFID Security – RFIDSec’10, Istanbul, Turkey, June 2010. Lecture Notes in Computer Science vol. 6370, pages. 220-238, Springer Verlag. 

17. Muhammed Ali Bingol, Ali Ozhan Gurel, Orhun Kara, Suleyman Kardas, (2010) "A New RFID Distance Bounding Protocol", 4th International Information Security & Cryptology Conference (ISCTurkey’10), Ankara, Turkey, May 2010. 

18. Muhammed Ali Bingol, Süleyman Kardaş, Ünal Kocabaş, (2015) “Common Criteria Protection Profile for Secure Communication Module for Water Tracking System (SCM-WTS PP) - CC V3.1 r4 - EAL 2” Common Criteria Portal.

Research interests/expertise

His primary research interests include cryptography and information security; blockchain & cryptocurrencies; zero-knowledge proofs, wireless communication security; secure multi-party computation; private function evaluation; authentication systems; e-voting.

Areas of teaching

Cryptography, Foundations of Cyber Security, C Programming, Information Security Management Principles, Software and Security Management, Cyber Threat Intelligence, Computer Networks and Malware Analysis.

Courses taught

C Programming, Computer Networks, Cryptography, Foundations of Cyber Security, Malware Analysis, Wireless Network Security, Information Security Management Principles, Software and Security Management.

Search Who's Who

MuhammedAliBingol