default search action
Cihangir Tezcan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2014
- [b1]Cihangir Tezcan:
Improbable differential cryptanalysis ; Olası olmayan diferansiyel kriptanaliz. Middle East Technical University, Çankaya, Ankara, Turkey, 2014
Journal Articles
- 2024
- [j8]Ahmet Malal, Cihangir Tezcan:
FPGA-friendly compact and efficient AES-like 8 × 8 S-box. Microprocess. Microsystems 105: 105007 (2024) - 2022
- [j7]Kaan Furkan Altinok, Afsin Peker, Cihangir Tezcan, Alptekin Temizel:
GPU accelerated 3DES encryption. Concurr. Comput. Pract. Exp. 34(9) (2022) - [j6]Cihangir Tezcan:
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. J. Syst. Archit. 124: 102402 (2022) - 2021
- [j5]Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk:
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. IEEE Access 9: 50078-50092 (2021) - [j4]Cihangir Tezcan:
Optimization of Advanced Encryption Standard on Graphics Processing Units. IEEE Access 9: 67315-67326 (2021) - 2018
- [j3]Gregor Leander, Cihangir Tezcan, Friedrich Wiemer:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - 2016
- [j2]Cihangir Tezcan, Ali Aydin Selçuk:
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited. Inf. Process. Lett. 116(2): 136-143 (2016) - 2014
- [j1]Cihangir Tezcan:
Improbable differential attacks on Present using undisturbed bits. J. Comput. Appl. Math. 259: 503-511 (2014)
Conference and Workshop Papers
- 2024
- [c15]Cihangir Tezcan:
GPU-Based Brute Force Cryptanalysis of KLEIN. ICISSP 2024: 884-889 - 2022
- [c14]Aslí Basak Civek, Cihangir Tezcan:
Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON. ICISSP (Revised Selected Papers) 2022: 91-103 - [c13]Aslí Basak Civek, Cihangir Tezcan:
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. ICISSP 2022: 202-209 - 2020
- [c12]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Distinguishers for AES. SAC 2020: 141-170 - 2017
- [c11]Cihangir Tezcan:
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU. ICISSP 2017: 524-528 - 2016
- [c10]Cihangir Tezcan:
Truncated, Impossible, and Improbable Differential Analysis of ASCON. ICISSP 2016: 325-332 - [c9]Cihangir Tezcan, Galip Oral Okan, Asuman Senol, Erol Dogan, Furkan Yücebas, Nazife Baykal:
Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited. LightSec 2016: 18-32 - 2015
- [c8]Cihangir Tezcan:
Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT. LightSec 2015: 21-33 - 2014
- [c7]Cihangir Tezcan, Ferruh Özbudak:
Differential Factors: Improved Attacks on SERPENT. LightSec 2014: 69-84 - [c6]Rusydi H. Makarim, Cihangir Tezcan:
Relating Undisturbed Bits to Other Properties of Substitution Boxes. LightSec 2014: 109-125 - [c5]Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu:
Improbable Differential Attacks on Serpent using Undisturbed Bits. SIN 2014: 145 - 2013
- [c4]Cihangir Tezcan:
Improbable differential cryptanalysis. SIN 2013: 457 - 2011
- [c3]Cihangir Tezcan, Serge Vaudenay:
On Hiding a Plaintext Length by Preencryption. ACNS 2011: 345-358 - 2010
- [c2]Cihangir Tezcan:
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. INDOCRYPT 2010: 197-209 - 2009
- [c1]Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair:
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. ACISP 2009: 90-107
Informal and Other Publications
- 2021
- [i8]Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk:
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. CoRR abs/2103.16930 (2021) - [i7]Cihangir Tezcan:
Optimization of Advanced Encryption Standard on Graphics Processing Units. IACR Cryptol. ePrint Arch. 2021: 646 (2021) - 2020
- [i6]Cihangir Tezcan:
Analysis of Ascon, DryGASCON, and Shamash Permutations. IACR Cryptol. ePrint Arch. 2020: 1458 (2020) - 2019
- [i5]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - 2016
- [i4]Cihangir Tezcan:
Truncated, Impossible, and Improbable Differential Analysis of Ascon. IACR Cryptol. ePrint Arch. 2016: 490 (2016) - 2014
- [i3]Rusydi H. Makarim, Cihangir Tezcan:
Relating Undisturbed Bits to Other Properties of Substitution Boxes. IACR Cryptol. ePrint Arch. 2014: 855 (2014) - [i2]Cihangir Tezcan, Ferruh Özbudak:
Differential Factors: Improved Attacks on SERPENT. IACR Cryptol. ePrint Arch. 2014: 860 (2014) - 2010
- [i1]Cihangir Tezcan:
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. IACR Cryptol. ePrint Arch. 2010: 435 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-12 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint