Orhun Kara

Orcid: 0000-0002-9685-6625

According to our database1, Orhun Kara authored at least 19 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lower data attacks on Advanced Encryption Standard.
Turkish J. Electr. Eng. Comput. Sci., 2024

2023
A New Construction Method for Keystream Generators.
IEEE Trans. Inf. Forensics Secur., 2023

New Security Proofs and Complexity Records for Advanced Encryption Standard.
IEEE Access, 2023

2022
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM.
J. Inf. Secur. Appl., 2022

Integral characteristics by keyspace partitioning.
Des. Codes Cryptogr., 2022

2021
Tradeoff attacks on symmetric ciphers.
IACR Cryptol. ePrint Arch., 2021

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

Selected Design and Analysis Techniques for Contemporary Symmetric Encryption.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2019
On Analysis of Lightweight Stream Ciphers with Keyed Update.
IEEE Trans. Computers, 2019

Parametric Guess and Determine Attack on Stream Ciphers.
Proceedings of the 30th IEEE International Symposium on Personal, 2019

2015
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks.
IACR Cryptol. ePrint Arch., 2015

2013
Square reflection cryptanalysis of 5-round Feistel networks with permutations.
Inf. Process. Lett., 2013

2012
Fixed Points of Special Type and Cryptanalysis of Full GOST.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2010
Optimal Security Limits of RFID Distance Bounding Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

2008
Improved Cryptanalysis of SHAMATA-BC.
IACR Cryptol. ePrint Arch., 2008

Reflection Cryptanalysis of Some Ciphers.
Proceedings of the Progress in Cryptology, 2008

Real Time Cryptanalysis of Unsystematic Cipher.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Reflection Attacks on Product Ciphers.
IACR Cryptol. ePrint Arch., 2007

A New Class of Weak Keys for Blowfish.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007


  Loading...