Mustafa Çoban

According to our database1, Mustafa Çoban authored at least 7 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Detecting Dangerous Maritime Refugee Migration Paths through Cell Phone Activities.
Proceedings of the IEEE International Conference on Big Data, 2022

2016
Feistel Like Construction of Involutory Binary Matrices With High Branch Number.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of QTL Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher.
IACR Cryptol. ePrint Arch., 2015

2013
Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

2012
Biclique Cryptanalysis of TWINE.
IACR Cryptol. ePrint Arch., 2012

2009
Improved Meet-in-the-Middle Attacks on AES.
Proceedings of the Progress in Cryptology, 2009


  Loading...