Follow
Çağdaş Çalık
Çağdaş Çalık
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Status report on the second round of the NIST lightweight cryptography standardization process
MS Turan, MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, ...
US Department of Commerce, National Institute of Standards and Technology, 2021
592021
Status report on the first round of the NIST lightweight cryptography standardization process
MS Turan, KA McKay, Ç Çalik, D Chang, L Bassham
National Institute of Standards and Technology, Gaithersburg, MD, NIST …, 2019
522019
Improved cryptanalysis of Skein
JP Aumasson, Ç Çalık, W Meier, O Özen, RCW Phan, K Varıcı
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
512009
Statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
Workshop on Stream Ciphers Revisited (SASC2006), 2006
402006
The multiplicative complexity of 6-variable Boolean functions
Ç Çalık, MS Turan, R Peralta
Cryptography and Communications, 1-15, 2018
312018
New randomness tests using random walk
A Doganaksoy, C Calık, F Sulak, MS Turan
National Cryptology Symposium II, 2006
212006
Submission requirements and evaluation criteria for the lightweight cryptography standardization process
L Bassham, Ç Çalık, K McKay, MS Turan
US National Institute of Standards and Technology, 2018
182018
New distinguishers based on random mappings against stream ciphers
M Sönmez Turan, Ç Çalık, NB Saran, A Doğanaksoy
Sequences and Their Applications-SETA 2008: 5th International Conference …, 2008
182008
On feedback functions of maximum length nonlinear feedback shift registers
Ç ÇALIK, MS TURAN, F Özbudak
IEICE transactions on fundamentals of electronics, communications and …, 2010
162010
Detailed statistical analysis of synchronous stream ciphers
MS Turan, A Doganaksoy, C Calik
ECRYPT Workshop on the State of the Art of Stream Ciphers (SASC’06), 2006
162006
Message recovery and pseudo-preimage attacks on the compression function of hamsi-256
Ç Çalık, MS Turan
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
152010
Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions
LTAN Brandão, Ç Çalık, MS Turan, R Peralta
92019
Boolean Functions with Multiplicative Complexity 3 and 4
C Calık, MS Turan, R Peralta
92019
Counting Boolean functions with specified values in their Walsh spectrum
E Uyan, Ç Çalık, A Doğanaksoy
Journal of Computational and Applied Mathematics 259, 522-528, 2014
82014
Computing cryptographic properties of boolean functions from the algebraic normal form representation
Ç Çalık
Ph. D. thesis, Middle East Technical University, 2013
82013
Lightweight cryptography: Round 2 candidates, 2019
L Bassham, C Calik, D Chang, J Kang, K McKay, MS Turan
8
Circuit minimization work
J Boyar, M Dworkin, R Peralta, M Turan, C Calik, L Brandao
URL: www. cs. yale. edu, 2020
72020
Computing the weight of a Boolean function from its algebraic normal form
Ç Çalık, A Doğanaksoy
International Conference on Sequences and Their Applications, 89-100, 2012
72012
E-Ġmzada SHA-1 Özetleme Algoritmasının Kullanımı
Ç Çalık, M Sönmez Turan, Z Yüce
Ulusal Elektronik İmza Sempozyumu, 7-8, 2007
52007
Searching for best Karatsuba recurrences
Ç Çalık, M Dworkin, N Dykas, R Peralta
International Symposium on Experimental Algorithms, 332-342, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20