Practical cryptanalysis of full Sprout with TMD tradeoff attacks MF Esgin, O Kara Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016 | 59 | 2016 |
Reflection cryptanalysis of some ciphers O Kara Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 53 | 2008 |
A new class of weak keys for Blowfish O Kara, C Manap Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007 | 52 | 2007 |
Linear approximations for 2-round trivium MS Turan, O Kara Proc. First International Conference on Security of Information and Networks …, 2007 | 38 | 2007 |
Optimal security limits of RFID distance bounding protocols O Kara, S Kardaş, MA Bingöl, G Avoine Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 31 | 2010 |
On analysis of lightweight stream ciphers with keyed update O Kara, MF Esgin IEEE Transactions on Computers 68 (1), 99-110, 2018 | 15 | 2018 |
Reflection attacks on product ciphers O Kara Cryptology ePrint Archive, 2007 | 14 | 2007 |
A new approach to keystream based cryptosystems O Kara, I Erguler Proc. Workshop Record SASC 2008, 205-221, 2008 | 13 | 2008 |
Catalog and illustrative examples of lightweight cryptographic primitives A Mileva, V Dimitrova, O Kara, MJ Mihaljević Security of ubiquitous computing systems: selected topics, 21-47, 2021 | 11 | 2021 |
SHAMATA hash function algorithm specifications A Atalay, O Kara, F Karakoc, C Manap Submission to NIST, 2008 | 10 | 2008 |
Fixed points of special type and cryptanalysis of full GOST O Kara, F Karakoç Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012 | 9 | 2012 |
Preimages of hash functions through rainbow tables O Kara, A Atalay 2009 24th International Symposium on Computer and Information Sciences, 304-309, 2009 | 9 | 2009 |
Linear Approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007) MS Turan, O Kara | 7 | |
Singularities of the modular curve A Klyachko, O Kara Finite Fields and Their Applications 7 (3), 415-420, 2001 | 6 | 2001 |
SHAMATA hash function algorithm specifications. Submission to NIST, 2008 FKA Atalay, O Kara, C Manap | 5 | |
A new construction method for keystream generators Ç Gül, O Kara IEEE Transactions on Information Forensics and Security 18, 3735-3744, 2023 | 4 | 2023 |
Linear approximations for 2-round Trivium. eSTREAM MS Turan, O Kara ECRYPT Stream Cipher Project, Report 8, 2007, 2007 | 4 | 2007 |
A new security relation between information rate and state size of a keystream generator O Kara, I Ergüler, E Anarim Turkish Journal of Electrical Engineering and Computer Sciences 24 (3), 1916 …, 2016 | 3 | 2016 |
Square reflection cryptanalysis of 5-round Feistel networks with permutations O Kara Information Processing Letters 113 (19-21), 827-831, 2013 | 3 | 2013 |
Integral characteristics by keyspace partitioning F Demirbaş, O Kara Designs, Codes and Cryptography 90 (2), 443-472, 2022 | 2 | 2022 |