ITUbee: a software oriented lightweight block cipher F Karakoç, H Demirci, AE Harmancı Lightweight Cryptography for Security and Privacy: Second International …, 2013 | 84 | 2013 |
Biclique cryptanalysis of TWINE M Çoban, F Karakoç, Ö Boztaş Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012 | 79 | 2012 |
Impossible differential cryptanalysis of reduced-round LBlock F Karakoç, H Demirci, AE Harmancı Information Security Theory and Practice. Security, Privacy and Trust in …, 2012 | 47 | 2012 |
Biclique cryptanalysis of LBlock and TWINE F Karakoç, H Demirci, AE Harmancı Information Processing Letters 113 (12), 423-429, 2013 | 27 | 2013 |
Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128 Ö Boztaş, F Karakoç, M Çoban Lightweight Cryptography for Security and Privacy: Second International …, 2013 | 21 | 2013 |
Linear complexity private set intersection for secure two-party protocols F Karakoç, A Küpçü International Conference on Cryptology and Network Security, 409-429, 2020 | 20 | 2020 |
AKF: A key alternating Feistel scheme for lightweight cipher designs F Karakoç, H Demirci, AE Harmancı Information Processing Letters 115 (2), 359-367, 2015 | 18 | 2015 |
A network-based positioning method to locate false base stations L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ... IEEE Access 9, 111368-111382, 2021 | 16 | 2021 |
Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm A Bay, O Ersoy, F Karakoç International conference on the theory and application of cryptology and …, 2016 | 15 | 2016 |
A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning EU Soykan, L Karaçay, F Karakoç, E Tomur IEEE Access 10, 97495-97519, 2022 | 14 | 2022 |
Secure Aggregation Against Malicious Users F Karakoç, M Önen, Z Bilgin Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021 | 14 | 2021 |
A guess-and-determine attack on reduced-round Khudra and weak keys of full cipher M Özen, M Çoban, F Karakoç Cryptology ePrint Archive, 2015 | 11 | 2015 |
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher F Karakoç, H Demirci, AE Harmancı Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 11 | 2012 |
SHAMATA hash function algorithm specifications A Atalay, O Kara, F Karakoc, C Manap Submission to NIST, 2008 | 11 | 2008 |
Fixed points of special type and cryptanalysis of full GOST O Kara, F Karakoç Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012 | 8 | 2012 |
SoK: Investigation of Security and Functional Safety in Industrial IoT E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak 2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021 | 7 | 2021 |
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer F Karakoç, M Nateghizad, Z Erkin Proceedings of the 14th International Conference on Availability …, 2019 | 7 | 2019 |
Cryptanalysis of QTL block cipher M Çoban, F Karakoç, M Özen International Workshop on Lightweight Cryptography for Security and Privacy …, 2016 | 6 | 2016 |
SHAMATA hash function algorithm specifications. Submission to NIST, 2008 FKA Atalay, O Kara, C Manap | 5 | |
Context-aware authentication with dynamic credentials using electricity consumption data E Ustundag Soykan, L KaraÇay, Z Bilgin, E Tomur, M Akif Ersoy, ... The Computer Journal 65 (10), 2631-2640, 2022 | 3 | 2022 |