spongent: A Lightweight Hash Function A Bogdanov, M Knežević, G Leander, D Toz, K Varıcı, I Verbauwhede Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 463 | 2011 |
SPONGENT: the design space of lightweight cryptographic hashing A Bogdanov, M Knezevic, G Leander, D Toz, K Varici, I Verbauwhede IEEE Transactions on Computers 62 (10), 2041-2053, 2012 | 169 | 2012 |
Differential analysis of the LED block cipher F Mendel, V Rijmen, D Toz, K Varıcı Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 68 | 2012 |
Analysis of two attacks on reduced-round versions of the SMS4 D Toz, O Dunkelman Information and Communications Security: 10th International Conference …, 2008 | 38 | 2008 |
Rebound attack on reduced-round versions of JH V Rijmen, D Toz, K Varıcı Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 32 | 2010 |
Rebound attack on JH42 M Naya-Plasencia, D Toz, K Varici Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 18 | 2011 |
Security evaluation of the K2 stream cipher A Bogdanov, B Preneel, V Rijmen Internal report., 2011 | 9 | 2011 |
Statistical analysis of block ciphers D Toz, A Doğanaksoy, MS Turun Ulusal Kriptologi Sempozyumu, Ankara, Turkey, 56-66, 2005 | 9 | 2005 |
Related‐key rectangle cryptanalysis of Rijndael‐160 and Rijndael‐192 Q Wang, Z Liu, D Toz, K Varici, D Gu IET Information Security 9 (5), 266-276, 2015 | 7 | 2015 |
On the four-round AES characteristics V Rijmen, D Toz, K Varici Pre-proceedings of WCC, 15-19, 2013 | 6 | 2013 |
Cryptanalysis of Hash Functions (Cryptanalyse van hashfuncties) D Toz | 4 | 2013 |
Security Evaluation of the Block Cipher LEA Final Report A Bogdanov, N Mouha, E Tischhauser, D Toz, K Varici, V Velichkov, ... COSIC, Belgium, 3-30, 2011 | 3 | 2011 |
Study of the AES-like super boxes in LED and PHOTON Q Wang, V Rijmen, D Toz, K Varıcı Math. Comput. Sci 3812493, 2013 | 2 | 2013 |
Collisions for the widea-8 compression function F Mendel, V Rijmen, D Toz, K Varıcı Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013 | 2 | 2013 |
Block Ciphers D Toz, J Balasch, F Sheikh Circuits and Systems for Security and Privacy, 87-104, 2017 | | 2017 |
Secure Hashing: SHA-1, SHA-2, and SHA-3 D Toz, R Chaves, L Sousa, N Sklavos, AP Fournaris, G Kalogeridou, ... Routledge Handbooks Online, 2016 | | 2016 |
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192 (vol 9, pg 266, 2015) Q Wang, Z Liu, D Toz, K Varici, D Gu Iet Information Security 9 (5), 302-303, 2015 | | 2015 |