Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT O Özen, K Varıcı, C Tezcan, Ç Kocair Australasian Conference on Information Security and Privacy, 90-107, 2009 | 131 | 2009 |
The improbable differential attack: Cryptanalysis of reduced round CLEFIA C Tezcan International Conference on Cryptology in India, 197-209, 2010 | 77 | 2010 |
Improbable differential attacks on Present using undisturbed bits C Tezcan Journal of Computational and applied mathematics 259, 503-511, 2014 | 41 | 2014 |
Searching for subspace trails and truncated differentials G Leander, C Tezcan, F Wiemer IACR Transactions on Symmetric Cryptology, 2018 | 26 | 2018 |
Truncated, impossible, and improbable differential analysis of ASCON C Tezcan Cryptology ePrint Archive, 2016 | 22 | 2016 |
Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited C Tezcan, GO Okan, A Şenol, E Doğan, F Yücebaş, N Baykal International Workshop on Lightweight Cryptography for Security and Privacy …, 2016 | 14 | 2016 |
Relating undisturbed bits to other properties of substitution boxes RH Makarim, C Tezcan International Workshop on Lightweight Cryptography for Security and Privacy …, 2014 | 12 | 2014 |
Analysis of ascon, drygascon, and shamash permutations C Tezcan International Journal of Information Security Science 9 (3), 172-187, 2020 | 9* | 2020 |
Optimization of advanced encryption standard on graphics processing units C Tezcan IEEE Access 9, 67315-67326, 2021 | 8 | 2021 |
Differential factors: Improved attacks on SERPENT C Tezcan, F Özbudak International Workshop on Lightweight Cryptography for Security and Privacy …, 2014 | 8 | 2014 |
On hiding a plaintext length by preencryption C Tezcan, S Vaudenay International Conference on Applied Cryptography and Network Security, 345-358, 2011 | 8 | 2011 |
Weak-Key Distinguishers for AES L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer International Conference on Selected Areas in Cryptography, 141-170, 2020 | 7* | 2020 |
Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network E Tufan, C Tezcan, C Acartürk IEEE Access 9, 50078-50092, 2021 | 6 | 2021 |
Improbable differential attacks on SERPENT using undisturbed bits C Tezcan, HK Taşkın, M Demircioğlu Proceedings of the 7th International Conference on Security of Information …, 2014 | 5 | 2014 |
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited C Tezcan, AA Selçuk Information Processing Letters 116 (2), 136-143, 2016 | 4 | 2016 |
Differential factors revisited: corrected attacks on PRESENT and SERPENT C Tezcan Lightweight Cryptography for Security and Privacy, 21-33, 2015 | 4 | 2015 |
Brute force cryptanalysis of MIFARE classic cards on GPU C Tezcan International Conference on Information Systems Security and Privacy 2, 524-528, 2017 | 3 | 2017 |
An alternative approach to Maurer’s universal statistical test A Doganaksoy, C Tezcan Information Security and Cryptology Conference ISC Turkey 2006 3rd …, 2008 | 3 | 2008 |
Cryptanalysis of PRESENT via CUDA devices C Tezcan, A Temizel null, 2014 | 2 | 2014 |
Improbable differential cryptanalysis C Tezcan Proceedings of the 6th International Conference on Security of Information …, 2013 | 2 | 2013 |