Cryptographic test methods for block ciphers

Download
1999
Acar, R. Cüneyt

Suggestions

Cryptanalysis of elliptic curve cryptosystems
Okhovat, Nima; Yücel, Melek D.; Department of Electrical and Electronics Engineering (2000)
CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS
Dinçer, Hilal; Doğanaksoy, Ali; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2022-8-22)
Instant messaging applications have replaced classical messaging in recent years. The fact that instant messaging applications transmit messages over the internet, therefore, being free and fast, played a major role in this rise. However, being internet-based has brought disadvantages as well as advantages. There are risks such as obtaining the message, changing the message, etc. by third parties. To avoid these risks, messages are encrypted, the sender is authenticated and their integrity is shown. However...
Cryptographic Misuse Detection Tools
Koru, Emine Selin; Cenk, Murat; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2021-9-24)
Today digital devices are an inevitable part of our lives. We use these devices for things like sharing photos, communicating with friends, and exchanging money. All these actions need privacy. In fact, properly used cryptographic systems can fulfill this need for privacy. However, in some cases developers can make mistakes, because of the reason such as lack of knowledge about cryptography and hard usage of cryptographic APIs. Thus, cryptographic misuse detection has become a new field of study and tools h...
Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408
Yener, Cansu; Doğanaksoy, Ali; Yayla, Oğuz; Department of Cryptography (2020-9)
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certif...
Optimising a nonlinear utility function in multi-objective integer programming
Ozlen, Melih; Azizoğlu, Meral; Burton, Benjamin A. (2013-05-01)
In this paper we develop an algorithm to optimise a nonlinear utility function of multiple objectives over the integer efficient set. Our approach is based on identifying and updating bounds on the individual objectives as well as the optimal utility value. This is done using already known solutions, linear programming relaxations, utility function inversion, and integer programming. We develop a general optimisation algorithm for use with k objectives, and we illustrate our approach using a tri-objective i...
Citation Formats
R. C. Acar, “Cryptographic test methods for block ciphers,” Middle East Technical University, 1999.