Folgen
Orhun Kara
Orhun Kara
IYTE Izmır Institute of Technology
Bestätigte E-Mail-Adresse bei iyte.edu.tr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Practical cryptanalysis of full Sprout with TMD tradeoff attacks
MF Esgin, O Kara
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
582016
Reflection cryptanalysis of some ciphers
O Kara
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
532008
A new class of weak keys for blowfish
O Kara, C Manap
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
512007
Linear approximations for 2-round trivium
MS Turan, O Kara
Proc. First International Conference on Security of Information and Networks …, 2007
372007
Optimal security limits of RFID distance bounding protocols
O Kara, S Kardaş, MA Bingöl, G Avoine
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
302010
Reflection attacks on product ciphers
O Kara
Cryptology ePrint Archive, 2007
152007
A new approach to keystream based cryptosystems
O Kara, I Erguler
Proc. Workshop Record SASC 2008, 205-221, 2008
132008
On analysis of lightweight stream ciphers with keyed update
O Kara, MF Esgin
IEEE Transactions on Computers 68 (1), 99-110, 2018
122018
SHAMATA hash function algorithm specifications
A Atalay, O Kara, F Karakoc, C Manap
Submission to NIST, 2008
112008
Catalog and illustrative examples of lightweight cryptographic primitives
A Mileva, V Dimitrova, O Kara, MJ Mihaljević
Security of ubiquitous computing systems: selected topics, 21-47, 2021
92021
Fixed points of special type and cryptanalysis of full GOST
O Kara, F Karakoç
Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012
82012
Preimages of hash functions through rainbow tables
O Kara, A Atalay
2009 24th International Symposium on Computer and Information Sciences, 304-309, 2009
82009
Linear Approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007)
MS Turan, O Kara
7
Singularities of the modular curve
A Klyachko, O Kara
Finite Fields and Their Applications 7 (3), 415-420, 2001
52001
SHAMATA hash function algorithm specifications. Submission to NIST, 2008
FKA Atalay, O Kara, C Manap
5
Linear approximations for 2-round Trivium. eSTREAM
MS Turan, O Kara
ECRYPT Stream Cipher Project, Report 8, 2007, 2007
42007
A new security relation between information rate and state size of a keystream generator
O Kara, I Ergüler, E Anarim
Turkish Journal of Electrical Engineering and Computer Sciences 24 (3), 1916 …, 2016
32016
Square reflection cryptanalysis of 5-round Feistel networks with permutations
O Kara
Information Processing Letters 113 (19-21), 827-831, 2013
32013
Integral characteristics by keyspace partitioning
F Demirbaş, O Kara
Designs, Codes and Cryptography 90 (2), 443-472, 2022
22022
New Security Proofs and Complexity Records for Advanced Encryption Standard
O Kara
IEEE Access 11, 131205-131220, 2023
12023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20