Cihangir Tezcan

Graduate School of Informatics
Scopus Author ID
Web of Science Researcher ID
GPU accelerated 3DES encryption
Altınok, Kaan Furkan; Peker, Afşin; Tezcan, Cihangir; Temizel, Alptekin (2021-07-01)
Triple DES (3DES) is a NIST and ISO/IEC standard block cipher that is also used in some web browsers and several electronic payment applications. We propose an optimized bit-level parallelization of 3DES for GPU accelerate...
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
Tufan, Emrah; Tezcan, Cihangir; Acartürk, Cengiz (2021-01-01)
Cyber attacks constitute a significant threat to organizations with implications ranging from economic, reputational, and legal consequences. As cybercriminals' techniques get sophisticated, information security profession...
Optimization of Advanced Encryption Standard on Graphics Processing Units
Tezcan, Cihangir (2021-01-01)
Graphics processing units (GPUs) are specially designed for parallel applications and perform parallel operations much faster than central processing units (CPUs). In this work, we focus on the performance of the Advanced ...
Analysis of Ascon, DryGASCON, and Shamash Permutations
Tezcan, Cihangir (2020-09-01)
On the Fly Encryption via GPU
Tezcan, Cihangir (2019-11-21)
Hafif Blok Şifrelerin Ekran Kartları ile Kriptanalizi
Tezcan, Cihangir (2018-06-27)
Searching for subspace trails and truncated differentials
Leander, Gregor; Tezcan, Cihangir; Wiemer, Friedrich (2018-01-01)
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes. While it is a generic method, up to now it was only ...
Brute Force Cryptanalysis of MIFARE Classic Cards on GPU
Tezcan, Cihangir (SCITEPRESS, AV D MANUELL, 27A 2 ESQ, SETUBAL, 2910-595, PORTUGAL; 2017-02-21)
MIFARE Classic is the most widely deployed contactless smartcard on the market. However, many active and passive attacks are provided after its proprietary stream cipher CRYPTO1 was reverse engineered. The short 48-bit key...
On Differential Factors
Tezcan, Cihangir; Doğanaksoy, Ali; OKAN, GALİP ORAL; ŞENOL, ASUMAN; Doğan, Erol; Yücebaş, Furkan; Baykal, Nazife (2016-10-24)
Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited
Tezcan, Cihangir; OKAN, GALİP ORAL; Senol, Asuman; Dogan, Erol; Yucebas, Furkan; Baykal, Nazife (2016-09-21)
Differential distribution and linear approximation tables are the main security criteria for S-box designers. However, there are other S-box properties that, if overlooked by cryptanalysts, can result in erroneous results ...
Citation Formats