Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT O Özen, K Varıcı, C Tezcan, Ç Kocair Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 140 | 2009 |
The improbable differential attack: Cryptanalysis of reduced round CLEFIA C Tezcan Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 85 | 2010 |
Improbable differential attacks on Present using undisturbed bits C Tezcan Journal of Computational and applied mathematics 259, 503-511, 2014 | 58 | 2014 |
Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network E Tufan, C Tezcan, C Acartürk IEEE Access 9, 50078-50092, 2021 | 47 | 2021 |
Truncated, impossible, and improbable differential analysis of ASCON C Tezcan International Conference on Information Systems Security and Privacy 2, 325-332, 2016 | 46 | 2016 |
Searching for subspace trails and truncated differentials G Leander, C Tezcan, F Wiemer | 39 | 2018 |
Optimization of advanced encryption standard on graphics processing units C Tezcan IEEE Access 9, 67315-67326, 2021 | 31 | 2021 |
Analysis of ascon, drygascon, and shamash permutations C Tezcan International Journal of Information Security Science 9 (3), 172-187, 2020 | 30 | 2020 |
Relating undisturbed bits to other properties of substitution boxes RH Makarim, C Tezcan International workshop on lightweight cryptography for security and privacy …, 2014 | 21 | 2014 |
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT C Tezcan Journal of Systems Architecture 124, 102402, 2022 | 19 | 2022 |
Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited C Tezcan, GO Okan, A Şenol, E Doğan, F Yücebaş, N Baykal Lightweight Cryptography for Security and Privacy: 5th International …, 2017 | 15 | 2017 |
Weak-Key Distinguishers for AES L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer International Conference on Selected Areas in Cryptography, 141-170, 2020 | 13* | 2020 |
On hiding a plaintext length by preencryption C Tezcan, S Vaudenay Applied Cryptography and Network Security: 9th International Conference …, 2011 | 13 | 2011 |
Differential factors: Improved attacks on SERPENT C Tezcan, F Özbudak International Workshop on Lightweight Cryptography for Security and Privacy …, 2014 | 10 | 2014 |
Improbable differential attacks on SERPENT using undisturbed bits C Tezcan, HK Taşkın, M Demircioğlu Proceedings of the 7th International Conference on Security of Information …, 2014 | 7 | 2014 |
GPU accelerated 3DES encryption KF Altinok, A Peker, C Tezcan, A Temizel CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 34 (9), 2022 | 6* | 2022 |
Brute force cryptanalysis of MIFARE classic cards on GPU C Tezcan International Conference on Information Systems Security and Privacy 2, 524-528, 2017 | 6 | 2017 |
Differential factors revisited: corrected attacks on PRESENT and SERPENT C Tezcan International Workshop on Lightweight Cryptography for Security and Privacy …, 2015 | 6 | 2015 |
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. AB Civek, C Tezcan ICISSP, 202-209, 2022 | 5 | 2022 |
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited C Tezcan, AA Selçuk Information Processing Letters 116 (2), 136-143, 2016 | 4 | 2016 |