关注
Çağdaş Çalık
Çağdaş Çalık
在 microsoft.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Status report on the second round of the NIST lightweight cryptography standardization process
MS Turan, MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, ...
US Department of Commerce, National Institute of Standards and Technology, 2021
612021
Status report on the first round of the NIST lightweight cryptography standardization process
MS Turan, KA McKay, Ç Çalik, D Chang, L Bassham
National Institute of Standards and Technology, Gaithersburg, MD, NIST …, 2019
562019
Improved cryptanalysis of Skein
JP Aumasson, Ç Çalık, W Meier, O Özen, RCW Phan, K Varıcı
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
522009
Statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
Workshop on Stream Ciphers Revisited (SASC2006), 2006
412006
The multiplicative complexity of 6-variable Boolean functions
Ç Çalık, MS Turan, R Peralta
Cryptography and Communications, 1-15, 2018
322018
Submission requirements and evaluation criteria for the lightweight cryptography standardization process
L Bassham, Ç Çalık, K McKay, MS Turan
US National Institute of Standards and Technology, 2018
212018
New randomness tests using random walk
A Doganaksoy, C Calık, F Sulak, MS Turan
National Cryptology Symposium II, 2006
212006
New distinguishers based on random mappings against stream ciphers
M Sönmez Turan, Ç Çalık, NB Saran, A Doğanaksoy
Sequences and Their Applications-SETA 2008: 5th International Conference …, 2008
172008
Detailed statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
ECRYPT Workshop on the State of the Art of Stream Ciphers (SASC’06), 2006
172006
On feedback functions of maximum length nonlinear feedback shift registers
Ç ÇALIK, MS TURAN, F Özbudak
IEICE transactions on fundamentals of electronics, communications and …, 2010
162010
Message recovery and pseudo-preimage attacks on the compression function of hamsi-256
Ç Çalık, MS Turan
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
142010
Boolean Functions with Multiplicative Complexity 3 and 4
C Calık, MS Turan, R Peralta
102019
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
LTAN Brandão, Ç Çalık, MS Turan, R Peralta
92019
Counting Boolean functions with specified values in their Walsh spectrum
E Uyan, Ç Çalık, A Doğanaksoy
Journal of Computational and Applied Mathematics 259, 522-528, 2014
92014
Circuit minimization work
J Boyar, M Dworkin, R Peralta, M Turan, C Calik, L Brandao
URL: www. cs. yale. edu, 2020
82020
Computing cryptographic properties of boolean functions from the algebraic normal form representation
Ç Çalık
Ph. D. thesis, Middle East Technical University, 2013
82013
Lightweight cryptography: Round 2 candidates, 2019
L Bassham, C Calik, D Chang, J Kang, K McKay, MS Turan
8
Computing the weight of a Boolean function from its algebraic normal form
Ç Çalık, A Doğanaksoy
International Conference on Sequences and Their Applications, 89-100, 2012
72012
Searching for best Karatsuba recurrences
Ç Çalık, M Dworkin, N Dykas, R Peralta
International Symposium on Experimental Algorithms, 332-342, 2019
62019
E-Ġmzada SHA-1 Özetleme Algoritmasının Kullanımı
Ç Çalık, MS Turan, Z Yüce
ODTÜ Uygulamalı Matematik Enstitüsü Kriptografi Bölümü, 1-2, 2007
52007
系统目前无法执行此操作,请稍后再试。
文章 1–20