Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Differential cryptanalysis using feal-4 algorithm
Download
093070.pdf
Date
2000
Author
Akkaya, Nilüfer
Metadata
Show full item record
Item Usage Stats
140
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/6060
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Differential-linear cryptanalysis of ascon and drygascon
Civek, Aslı Başak; Tezcan, Cihangir; Department of Cybersecurity (2021-6)
Due to rapidly developing technology, devices have become smaller along with their performance capacity and memory. If possible, existing NIST-approved encryption standards should be used on these resource-constrained devices. When an acceptable performance cannot be achieved in this way, there is a need for more lightweight algorithms. Since taking individual measures leads to simplistic designs when designing lightweight algorithms, ciphers can become more vulnerable to cryptographic attacks. Hence some r...
Differential cryptanalysis on LBLOCK using differential factors
Öğünç, Merve; Doğanaksoy, Ali; Tezcan, Cihangir; Department of Cryptography (2018)
Cryptography had actually a long history and comes to today by evolving day by day. Now, it is a huge area in terms of the applications in industry and research topics in academia. Even if we do not realize, the cryptographic tools are placed in every single day of our life. To protect the information, the cryptographic algorithm is used in several areas from the basic website to smart devices. One of the classes of cryptographic algorithm is symmetric-key algorithms which cover block ciphers and stream cip...
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON
Civek, Aslı Başak; Tezcan, Cihangir (2021-01-01)
Ascon and DryGASCON are very similar designs that were submitted to NIST's lightweight cryptography standardization process. While Ascon made it to the finals, DryGASCON was eliminated in the second round. We analyze these algorithms against truncated, linear and differential-linear distinguishers to compare their security. We correct 2, 3, 3.5-round truncated differentials and 5-round differential-linear distinguishers that were given for DryGASCON-128. Moreover, we provide the longest practical differenti...
Selective Harmonic Elimination and THD Minimization by Using Neural Networks and PSO Algorithm for 3-Phase VSI
Nalçacı, Gamze (null; 2018-12-10)
Nonlinear finite element analysis of tunnels
Yıldırım, Musa; Yılmaz, Çetin; Department of Civil Engineering (1994)
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
N. Akkaya, “Differential cryptanalysis using feal-4 algorithm,” Middle East Technical University, 2000.