Author of the publication

Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON.

, and . ICISSP, page 202-209. SCITEPRESS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relating Undisturbed Bits to Other Properties of Substitution Boxes., and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 109-125. Springer, (2014)Weak-Key Distinguishers for AES., , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 141-170. Springer, (2020)GPU-Based Brute Force Cryptanalysis of KLEIN.. ICISSP, page 884-889. SCITEPRESS, (2024)Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT.. J. Syst. Archit., (2022)Improbable differential cryptanalysis ; Olası olmayan diferansiyel kriptanaliz.. Middle East Technical University, Çankaya, Ankara, Turkey, (2014)base-search.net (ftmetuankair:oai:open.metu.edu.tr:11511/23581).Optimization of Advanced Encryption Standard on Graphics Processing Units.. IACR Cryptol. ePrint Arch., (2021)Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network., , and . CoRR, (2021)Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT.. LightSec, volume 9542 of Lecture Notes in Computer Science, page 21-33. Springer, (2015)Improbable Differential Attacks on Serpent using Undisturbed Bits., , and . SIN, page 145. ACM, (2014)The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA.. INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 197-209. Springer, (2010)