Follow
Orhun Kara
Orhun Kara
IYTE Izmır Institute of Technology
Verified email at iyte.edu.tr - Homepage
Title
Cited by
Cited by
Year
Practical cryptanalysis of full Sprout with TMD tradeoff attacks
MF Esgin, O Kara
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
592016
Reflection cryptanalysis of some ciphers
O Kara
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
532008
A new class of weak keys for Blowfish
O Kara, C Manap
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
522007
Linear approximations for 2-round trivium
MS Turan, O Kara
Proc. First International Conference on Security of Information and Networks …, 2007
382007
Optimal security limits of RFID distance bounding protocols
O Kara, S Kardaş, MA Bingöl, G Avoine
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
312010
On analysis of lightweight stream ciphers with keyed update
O Kara, MF Esgin
IEEE Transactions on Computers 68 (1), 99-110, 2018
152018
Reflection attacks on product ciphers
O Kara
Cryptology ePrint Archive, 2007
142007
A new approach to keystream based cryptosystems
O Kara, I Erguler
Proc. Workshop Record SASC 2008, 205-221, 2008
132008
Catalog and illustrative examples of lightweight cryptographic primitives
A Mileva, V Dimitrova, O Kara, MJ Mihaljević
Security of ubiquitous computing systems: selected topics, 21-47, 2021
112021
SHAMATA hash function algorithm specifications
A Atalay, O Kara, F Karakoc, C Manap
Submission to NIST, 2008
102008
Fixed points of special type and cryptanalysis of full GOST
O Kara, F Karakoç
Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012
92012
Preimages of hash functions through rainbow tables
O Kara, A Atalay
2009 24th International Symposium on Computer and Information Sciences, 304-309, 2009
92009
Linear Approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007)
MS Turan, O Kara
7
Singularities of the modular curve
A Klyachko, O Kara
Finite Fields and Their Applications 7 (3), 415-420, 2001
62001
SHAMATA hash function algorithm specifications. Submission to NIST, 2008
FKA Atalay, O Kara, C Manap
5
A new construction method for keystream generators
Ç Gül, O Kara
IEEE Transactions on Information Forensics and Security 18, 3735-3744, 2023
42023
Linear approximations for 2-round Trivium. eSTREAM
MS Turan, O Kara
ECRYPT Stream Cipher Project, Report 8, 2007, 2007
42007
A new security relation between information rate and state size of a keystream generator
O Kara, I Ergüler, E Anarim
Turkish Journal of Electrical Engineering and Computer Sciences 24 (3), 1916 …, 2016
32016
Square reflection cryptanalysis of 5-round Feistel networks with permutations
O Kara
Information Processing Letters 113 (19-21), 827-831, 2013
32013
Integral characteristics by keyspace partitioning
F Demirbaş, O Kara
Designs, Codes and Cryptography 90 (2), 443-472, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20