Cihangir Tezcan

Orcid: 0000-0002-9041-1932

According to our database1, Cihangir Tezcan authored at least 25 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GPU-Based Brute Force Cryptanalysis of KLEIN.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2022
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT.
J. Syst. Archit., 2022

GPU accelerated 3DES encryption.
Concurr. Comput. Pract. Exp., 2022

Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON.
Proceedings of the Information Systems Security and Privacy, 2022

Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network.
IEEE Access, 2021

Optimization of Advanced Encryption Standard on Graphics Processing Units.
IEEE Access, 2021

2020
Analysis of Ascon, DryGASCON, and Shamash Permutations.
IACR Cryptol. ePrint Arch., 2020

Weak-Key Distinguishers for AES.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Weak-Key Subspace Trails and Applications to AES.
IACR Cryptol. ePrint Arch., 2019

2018
Searching for Subspace Trails and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2018

2017
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited.
Inf. Process. Lett., 2016

Truncated, Impossible, and Improbable Differential Analysis of Ascon.
IACR Cryptol. ePrint Arch., 2016

Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

2014
Improbable differential cryptanalysis ; Olası olmayan diferansiyel kriptanaliz.
PhD thesis, 2014

Improbable differential attacks on Present using undisturbed bits.
J. Comput. Appl. Math., 2014

Differential Factors: Improved Attacks on SERPENT.
IACR Cryptol. ePrint Arch., 2014

Relating Undisturbed Bits to Other Properties of Substitution Boxes.
IACR Cryptol. ePrint Arch., 2014

Improbable Differential Attacks on Serpent using Undisturbed Bits.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Improbable differential cryptanalysis.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2011
On Hiding a Plaintext Length by Preencryption.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA.
IACR Cryptol. ePrint Arch., 2010

2009
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009


  Loading...