Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Analysis and linear cryptanalysis of the RC5 block cipher .
Download
119143.pdf
Date
2002
Author
İnce, Özgür
Metadata
Show full item record
Item Usage Stats
90
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/12521
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Analysis of a PVM inverter driven induction machine.
Kılıçarslan, Behçet; Department of Electrical Engineering (1979)
Analysis and Comparison of Fully Homomorphic Encryption Approaches Over Integers
Bozkurt, Cansu; Cenk, Murat; Betin Onur, Cansu; Department of Cryptography (2022-2-10)
The time period after the mid-20th century was named as information age or digital age. In that age, the world is being digitalized very fastly. The amount of data transferred and processed online is increasing rapidly. As a result, data protection became an essential topic for researchers. To process or make a computation on the encrypted data deciphering ciphertext first causes a security flaw. Homomorphic encryption (HE) algorithms were designed to make computations on data without deciphering it. Howeve...
Analysis of elastic limk mechanisms by finite elements.
Sakaoğlu, A. Nadi; Department of Mechanical Engineering (1985)
Analysis of three block cipher based hash functions : Whirpool, Grøstl and Grindahl
Ismailova, Rita; Diker Yücel, Melek; Department of Cryptography (2012)
The subject of this thesis is the study of cryptographic hash functions, which utilize block ciphers as underlying chain functions. It is mainly concerned with the analysis of the three hash algorithms, the Whirlpool, Grøstl and Grindahl. All these hash functions have underlying block ciphers that are modified versions of the Advance Encryption Standard and we investigate the behavior of these block ciphers under the integral attack. Statistical tests, such as the avalanche test and the collision test, are ...
Analysis of Block Recombination and Lazy Interpolation Methods and Their Applications to Saber
Aksoy, Berkin; Cenk, Murat (2022-01-01)
Since the beginning of the National Institute of Standards and Technology (NIST), The Post-Quantum Cryptog-raphy (PQC) Standardization Process, efficient implementations of lattice-based algorithms have been studied extensively. Lattice-based NIST PQC finalists use polynomial or matrix-vector multiplications on the ring with type Zq [x]/f(x). For convenient ring types, Number Theoretic Transform (NTT) can be used to perform multiplications as done in Crystals-KYBER among the finalists of the NIST PQC Standa...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ö. İnce, “Analysis and linear cryptanalysis of the RC5 block cipher .,” Middle East Technical University, 2002.