Follow
Çağdaş Çalık
Çağdaş Çalık
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Status report on the second round of the NIST lightweight cryptography standardization process
MS Turan, MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, ...
US Department of Commerce, National Institute of Standards and Technology, 2021
712021
Status report on the first round of the NIST lightweight cryptography standardization process
MS Turan, KA McKay, Ç Çalik, D Chang, L Bassham
National Institute of Standards and Technology, Gaithersburg, MD, NIST …, 2019
632019
Improved cryptanalysis of Skein
JP Aumasson, Ç Çalık, W Meier, O Özen, RCW Phan, K Varıcı
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
522009
Statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
Workshop on Stream Ciphers Revisited (SASC2006), 2006
422006
The multiplicative complexity of 6-variable Boolean functions
Ç Çalık, MS Turan, R Peralta
Cryptography and Communications, 1-15, 2018
322018
Submission requirements and evaluation criteria for the lightweight cryptography standardization process
L Bassham, Ç Çalık, K McKay, MS Turan
US National Institute of Standards and Technology, 2018
232018
New randomness tests using random walk
A Doganaksoy, C Calık, F Sulak, MS Turan
National Cryptology Symposium II, 2006
212006
New distinguishers based on random mappings against stream ciphers
M Sönmez Turan, Ç Çalık, NB Saran, A Doğanaksoy
Sequences and Their Applications-SETA 2008: 5th International Conference …, 2008
202008
Detailed statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
ECRYPT Workshop on the State of the Art of Stream Ciphers (SASC’06), 2006
182006
On feedback functions of maximum length nonlinear feedback shift registers
Ç ÇALIK, MS TURAN, F Özbudak
IEICE transactions on fundamentals of electronics, communications and …, 2010
172010
Message recovery and pseudo-preimage attacks on the compression function of hamsi-256
Ç Çalık, MS Turan
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
142010
Boolean Functions with Multiplicative Complexity 3 and 4
C Calık, MS Turan, R Peralta
102019
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
LTAN Brandão, Ç Çalık, MS Turan, R Peralta
92019
Counting Boolean functions with specified values in their Walsh spectrum
E Uyan, Ç Çalık, A Doğanaksoy
Journal of Computational and Applied Mathematics 259, 522-528, 2014
92014
Circuit minimization work
J Boyar, M Dworkin, R Peralta, M Turan, C Calik, L Brandao
URL: www. cs. yale. edu, 2020
82020
Computing cryptographic properties of boolean functions from the algebraic normal form representation
Ç Çalık
Ph. D. thesis, Middle East Technical University, 2013
82013
Lightweight cryptography: Round 2 candidates, 2019
L Bassham, C Calik, D Chang, J Kang, K McKay, MS Turan
8
Searching for best Karatsuba recurrences
Ç Çalık, M Dworkin, N Dykas, R Peralta
International Symposium on Experimental Algorithms, 332-342, 2019
72019
Computing the weight of a Boolean function from its algebraic normal form
Ç Çalık, A Doğanaksoy
International Conference on Sequences and Their Applications, 89-100, 2012
72012
Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process. 2021
M Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, J Kelsey
NIST IR 8369 (4), 19, 0
6
The system can't perform the operation now. Try again later.
Articles 1–20