Cihangir Tezcan
Cihangir Tezcan
Assistant Professor at Department of Cyber Security, Middle East Technical University, Ankara Turkey
Verified email at - Homepage
Cited by
Cited by
Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT
O ÷zen, K Varıcı, C Tezcan, « Kocair
Australasian Conference on Information Security and Privacy, 90-107, 2009
The improbable differential attack: Cryptanalysis of reduced round CLEFIA
C Tezcan
International Conference on Cryptology in India, 197-209, 2010
Improbable differential attacks on Present using undisturbed bits
C Tezcan
Journal of Computational and applied mathematics 259, 503-511, 2014
Searching for subspace trails and truncated differentials
G Leander, C Tezcan, F Wiemer
IACR Transactions on Symmetric Cryptology, 74-100, 2018
Truncated, Impossible, and Improbable Differential Analysis of ASCON.
C Tezcan
IACR Cryptol. ePrint Arch. 2016, 490, 2016
Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited
C Tezcan, GO Okan, A Şenol, E Doğan, F YŁcebaş, N Baykal
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2016
Relating undisturbed bits to other properties of substitution boxes
RH Makarim, C Tezcan
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2014
Differential factors: Improved attacks on SERPENT
C Tezcan, F ÷zbudak
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2014
On hiding a plaintext length by preencryption
C Tezcan, S Vaudenay
International Conference on Applied Cryptography and Network Security, 345-358, 2011
Improbable differential attacks on SERPENT using undisturbed bits
C Tezcan, HK Taşkın, M Demircioğlu
Proceedings of the 7th International Conference on Security of Information†…, 2014
Weak-Key Subspace Trails and Applications to AES.
L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer
IACR Cryptol. ePrint Arch. 2019, 852, 2019
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
C Tezcan, AA SelÁuk
Information Processing Letters 116 (2), 136-143, 2016
Differential factors revisited: corrected attacks on PRESENT and SERPENT
C Tezcan
Lightweight Cryptography for Security and Privacy, 21-33, 2015
Cryptanalysis of PRESENT via CUDA devices
C Tezcan, A Temizel
null, 2014
Improbable differential cryptanalysis
C Tezcan
Proceedings of the 6th International Conference on Security of Information†…, 2013
An alternative approach to Maurer’s universal statistical test
A Doganaksoy, C TEZCAN
Information Security and Cryptology Conference ISC Turkey 2006 3rd†…, 2008
Impossible differential cryptanalysis of reduced round HIGHT
C Tezcan
Optimization of Advanced Encryption Standard on Graphics Processing Units
C Tezcan
IEEE Access, 2021
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
E Tufan, C Tezcan, C AcartŁrk
IEEE Access 9, 50078-50092, 2021
Analysis of Ascon, DryGASCON, and Shamash Permutations
C Tezcan
International Journal of Information Security Science 9 (3), 172-187, 2020
The system can't perform the operation now. Try again later.
Articles 1–20