SPONGENT: A lightweight hash function A Bogdanov, M Knežević, G Leander, D Toz, K Varıcı, I Verbauwhede International Workshop on Cryptographic Hardware and Embedded Systems, 312-325, 2011 | 286 | 2011 |
Spongent: The design space of lightweight cryptographic hashing A Bogdanov, M Knezevic, G Leander, D Toz, K Varici, I Verbauwhede IEEE Transactions on Computers 62 (10), 2041-2053, 2012 | 93 | 2012 |
Differential analysis of the LED block cipher F Mendel, V Rijmen, D Toz, K Varıcı International Conference on the Theory and Application of Cryptology and …, 2012 | 54 | 2012 |
Analysis of two attacks on reduced-round versions of the SMS4 D Toz, O Dunkelman International Conference on Information and Communications Security, 141-156, 2008 | 34 | 2008 |
Rebound attack on reduced-round versions of JH V Rijmen, D Toz, K Varıcı International Workshop on Fast Software Encryption, 286-303, 2010 | 32 | 2010 |
Rebound attack on JH42 M Naya-Plasencia, D Toz, K Varici International Conference on the Theory and Application of Cryptology and …, 2011 | 15 | 2011 |
Security evaluation of the K2 stream cipher A Bogdanov, B Preneel, V Rijmen Internal report., 2011 | 7 | 2011 |
SPONGENT: A Lightweight Hash Function. Cryptographic Hardware and Embedded Systems—CHES 2011 A Bogdanov, M Kňezević, G Leander, D Toz, K Varici, I Verbauwhede Lecture Notes in Computer Science. Springer, 2011 | 7 | 2011 |
Statistical Analysis of Block Ciphers D Toz, A Doğanaksoy, MS Turun Ulusal Kriptologi Sempozyumu, Ankara, Turkey, 56-66, 2005 | 7 | 2005 |
On the Four-Round AES Characteristics V Rijmen, D Toz, K Varici Pre-proceedings of WCC, 15-19, 2013 | 6 | 2013 |
Security Evaluation of the Block Cipher LEA Final Report A Bogdanov, N Mouha, E Tischhauser, D Toz, K Varici, V Velichkov, ... COSIC, Belgium, 3-30, 2011 | 4 | 2011 |
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192 Q Wang, Z Liu, D Toz, K Varici, D Gu IET Information Security 9 (5), 266-276, 2015 | 3 | 2015 |
Collisions for the widea-8 compression function F Mendel, V Rijmen, D Toz, K Varıcı Cryptographers’ Track at the RSA Conference, 162-173, 2013 | 2 | 2013 |
Cryptanalysis of Hash Functions D Toz Dissertation presented in partial fulfillment of the requirements for the …, 2013 | 1 | 2013 |
Study of the AES-like super boxes in LED and PHOTON Q Wang, V Rijmen, D Toz, K Varıcı Proceedings of the 34th Symposium on Information Theory in the Benelux, 2013 | 1 | 2013 |
Block ciphers D Toz, J Balasch, F Sheikh | | 2017 |
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192 (vol 9, pg 266, 2015) Q Wang, Z Liu, D Toz, K Varici, D Gu Iet Information Security 9 (5), 302-303, 2015 | | 2015 |
Cryptanalysis of Hash Functions (Cryptanalyse van hashfuncties) D Toz | | 2013 |
Intermediate Status Report P Gauravaram, F Mendel, M Naya-Plasencia, V Rijmen, D Toz Katholieke Universiteit Leuven, 2011 | | 2011 |
Errata: Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192 Q Wang, Z Liu, D Toz, K Varici, D Gu | | |