Ferhat Karakoç

Orcid: 0000-0001-6139-6668

According to our database1, Ferhat Karakoç authored at least 24 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A security-friendly privacy-preserving solution for federated learning.
Comput. Commun., July, 2023

Enabling Two-Party Secure Computation on Set Intersection.
IACR Cryptol. ePrint Arch., 2023

2022
Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data.
Comput. J., 2022

A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning.
IEEE Access, 2022

A Security-Friendly Privacy Solution for Federated Learning.
Proceedings of the Short Paper Proceedings of the First International Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G 2022) co-located with IEEE World Congress on Computational Intelligence (WCCI2022), 2022

2021
A Network-Based Positioning Method to Locate False Base Stations.
IEEE Access, 2021

Secure Aggregation Against Malicious Users.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

SoK: Investigation of Security and Functional Safety in Industrial IoT.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Linear Complexity Private Set Intersection for Secure Two-Party Protocols.
IACR Cryptol. ePrint Arch., 2020

2019
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2016
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.
IACR Cryptol. ePrint Arch., 2016

Impossible Differential Cryptanalysis of 16/18-Round Khudra.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

Cryptanalysis of QTL Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
AKF: A key alternating Feistel scheme for lightweight cipher designs.
Inf. Process. Lett., 2015

A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher.
IACR Cryptol. ePrint Arch., 2015

2014
Hafif-siklet blok şifreleme algoritmalarının analizi ve ITUbee: Hafif-siklet yeni bir algoritma tasarımı (Analysis of lightweight block ciphers and ITUbee: A new lightweight algorithm design)
PhD thesis, 2014

2013
Biclique cryptanalysis of LBlock and TWINE.
Inf. Process. Lett., 2013

ITUbee: A Software Oriented Lightweight Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

2012
Biclique Cryptanalysis of TWINE.
IACR Cryptol. ePrint Arch., 2012

Impossible Differential Cryptanalysis of Reduced-Round LBlock.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Fixed Points of Special Type and Cryptanalysis of Full GOST.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

2008
Improved Cryptanalysis of SHAMATA-BC.
IACR Cryptol. ePrint Arch., 2008


  Loading...