Cihangir Tezcan
Cihangir Tezcan
Head of Department of Cyber Security, Middle East Technical University, Ankara Turkey
Verified email at - Homepage
Cited by
Cited by
Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT
O ÷zen, K Varıcı, C Tezcan, « Kocair
Australasian Conference on Information Security and Privacy, 90-107, 2009
The improbable differential attack: Cryptanalysis of reduced round CLEFIA
C Tezcan
International Conference on Cryptology in India, 197-209, 2010
Improbable differential attacks on Present using undisturbed bits
C Tezcan
Journal of Computational and applied mathematics 259, 503-511, 2014
Searching for subspace trails and truncated differentials
G Leander, C Tezcan, F Wiemer
IACR Transactions on Symmetric Cryptology, 2018
Truncated, impossible, and improbable differential analysis of ASCON
C Tezcan
Cryptology ePrint Archive, 2016
Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited
C Tezcan, GO Okan, A Şenol, E Doğan, F YŁcebaş, N Baykal
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2016
Relating undisturbed bits to other properties of substitution boxes
RH Makarim, C Tezcan
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2014
Analysis of ascon, drygascon, and shamash permutations
C Tezcan
International Journal of Information Security Science 9 (3), 172-187, 2020
Optimization of advanced encryption standard on graphics processing units
C Tezcan
IEEE Access 9, 67315-67326, 2021
Differential factors: Improved attacks on SERPENT
C Tezcan, F ÷zbudak
International Workshop on Lightweight Cryptography for Security and Privacy†…, 2014
On hiding a plaintext length by preencryption
C Tezcan, S Vaudenay
International Conference on Applied Cryptography and Network Security, 345-358, 2011
Weak-Key Distinguishers for AES
L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer
International Conference on Selected Areas in Cryptography, 141-170, 2020
Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network
E Tufan, C Tezcan, C AcartŁrk
IEEE Access 9, 50078-50092, 2021
Improbable differential attacks on SERPENT using undisturbed bits
C Tezcan, HK Taşkın, M Demircioğlu
Proceedings of the 7th International Conference on Security of Information†…, 2014
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
C Tezcan, AA SelÁuk
Information Processing Letters 116 (2), 136-143, 2016
Differential factors revisited: corrected attacks on PRESENT and SERPENT
C Tezcan
Lightweight Cryptography for Security and Privacy, 21-33, 2015
Brute force cryptanalysis of MIFARE classic cards on GPU
C Tezcan
International Conference on Information Systems Security and Privacy 2, 524-528, 2017
An alternative approach to Maurer’s universal statistical test
A Doganaksoy, C Tezcan
Information Security and Cryptology Conference ISC Turkey 2006 3rd†…, 2008
Cryptanalysis of PRESENT via CUDA devices
C Tezcan, A Temizel
null, 2014
Improbable differential cryptanalysis
C Tezcan
Proceedings of the 6th International Conference on Security of Information†…, 2013
The system can't perform the operation now. Try again later.
Articles 1–20