Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Cryptographic test methods for block ciphers
Download
090686.pdf
Date
1999
Author
Acar, R. Cüneyt
Metadata
Show full item record
Item Usage Stats
22
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/2801
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Cryptanalysis of elliptic curve cryptosystems
Okhovat, Nima; Yücel, Melek D.; Department of Electrical and Electronics Engineering (2000)
Cryptographic Misuse Detection Tools
Koru, Emine Selin; Cenk, Murat; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2021-9-24)
Today digital devices are an inevitable part of our lives. We use these devices for things like sharing photos, communicating with friends, and exchanging money. All these actions need privacy. In fact, properly used cryptographic systems can fulfill this need for privacy. However, in some cases developers can make mistakes, because of the reason such as lack of knowledge about cryptography and hard usage of cryptographic APIs. Thus, cryptographic misuse detection has become a new field of study and tools h...
Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408
Yener, Cansu; Doğanaksoy, Ali; Yayla, Oğuz; Department of Cryptography (2020-9)
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certif...
Optimising a nonlinear utility function in multi-objective integer programming
Ozlen, Melih; Azizoğlu, Meral; Burton, Benjamin A. (2013-05-01)
In this paper we develop an algorithm to optimise a nonlinear utility function of multiple objectives over the integer efficient set. Our approach is based on identifying and updating bounds on the individual objectives as well as the optimal utility value. This is done using already known solutions, linear programming relaxations, utility function inversion, and integer programming. We develop a general optimisation algorithm for use with k objectives, and we illustrate our approach using a tri-objective i...
Elliptic curves and use of their endomorphism rings in cryptography
Sülçe, Ali Mert; Akyıldız, Ersan; Department of Cryptography (2019)
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cryptography is 1985 by Koblitz’s and Miller’s independent proposals that is based on the discrete logarithm problem on an elliptic curve defined over a finite field. After that date, there are a lot of advances and studies in elliptic curve cryptography(ECC) which provide high security with relatively small block sizes and high speed compared to the other public key cryptosystems. For instance, 160-bit ellipti...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
R. C. Acar, “Cryptographic test methods for block ciphers,” Middle East Technical University, 1999.