Suivre
Ferhat Karakoç
Ferhat Karakoç
Security and Privacy Researcher, Ericsson
Adresse e-mail validée de itu.edu.tr
Titre
Citée par
Citée par
Année
ITUbee: a software oriented lightweight block cipher
F Karakoç, H Demirci, AE Harmancı
Lightweight Cryptography for Security and Privacy: Second International …, 2013
842013
Biclique cryptanalysis of TWINE
M Çoban, F Karakoç, Ö Boztaş
Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012
792012
Impossible differential cryptanalysis of reduced-round LBlock
F Karakoç, H Demirci, AE Harmancı
Information Security Theory and Practice. Security, Privacy and Trust in …, 2012
472012
Biclique cryptanalysis of LBlock and TWINE
F Karakoç, H Demirci, AE Harmancı
Information Processing Letters 113 (12), 423-429, 2013
272013
Multidimensional meet-in-the-middle attacks on reduced-round TWINE-128
Ö Boztaş, F Karakoç, M Çoban
Lightweight Cryptography for Security and Privacy: Second International …, 2013
212013
Linear complexity private set intersection for secure two-party protocols
F Karakoç, A Küpçü
International Conference on Cryptology and Network Security, 409-429, 2020
202020
AKF: A key alternating Feistel scheme for lightweight cipher designs
F Karakoç, H Demirci, AE Harmancı
Information Processing Letters 115 (2), 359-367, 2015
182015
Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm
A Bay, O Ersoy, F Karakoç
International conference on the theory and application of cryptology and …, 2016
152016
A network-based positioning method to locate false base stations
L Karaçay, Z Bilgin, AB Gündüz, P Çomak, E Tomur, EU Soykan, U Gülen, ...
IEEE Access 9, 111368-111382, 2021
142021
Secure Aggregation Against Malicious Users
F Karakoç, M Önen, Z Bilgin
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
142021
A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning
EU Soykan, L Karaçay, F Karakoç, E Tomur
IEEE Access 10, 97495-97519, 2022
132022
A guess-and-determine attack on reduced-round Khudra and weak keys of full cipher
M Özen, M Çoban, F Karakoç
Cryptology ePrint Archive, 2015
112015
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
F Karakoç, H Demirci, AE Harmancı
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
112012
SHAMATA hash function algorithm specifications
A Atalay, O Kara, F Karakoc, C Manap
Submission to NIST, 2008
112008
Fixed points of special type and cryptanalysis of full GOST
O Kara, F Karakoç
Cryptology and Network Security: 11th International Conference, CANS 2012 …, 2012
82012
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer
F Karakoç, M Nateghizad, Z Erkin
Proceedings of the 14th International Conference on Availability …, 2019
72019
SoK: Investigation of Security and Functional Safety in Industrial IoT
E Tomur, U Gülen, EU Soykan, MA Ersoy, F Karakoç, L Karaçay, P Çomak
2021 IEEE International Conference on Cyber Security and Resilience (CSR …, 2021
62021
Cryptanalysis of QTL block cipher
M Çoban, F Karakoç, M Özen
International Workshop on Lightweight Cryptography for Security and Privacy …, 2016
62016
SHAMATA hash function algorithm specifications. Submission to NIST, 2008
FKA Atalay, O Kara, C Manap
5
A security-friendly privacy solution for federated learning
F Karakoç, L Karaçay, P Çomak, U Gülen, R Fuladi, EU Soykan
AI6G@ WCCI, 2022
32022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20