Publications
Last Updated:
14/04/2025 - 05:43
- English
- Türkçe
Reports
- Cihangir Tezcan. On the Security of METU ID Cards and Readers. Internal Report, 2018. Updated on August 2021.
Journal Articles
- Ahmet Malal, and Cihangir Tezcan. FPGA-friendly compact and efficient AES-like 8 × 8 S-box. Microprocess. Microsystems, 105, p.105007 (2024)
- Cihangir Tezcan. Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. J. Syst. Archit., 124, p.102402 (2022)
- Kaan Furkan Altınok, Afşin Peker, Cihangir Tezcan, Alptekin Temizel. GPU accelerated 3DES encryption. Concurrency and Computation: Practice and Experience (2021)
- Cihangir Tezcan. Optimization of Advanced Encryption Standard on Graphics Processing Units. IEEE Access 9: 67315-67326 (2021)
- Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk. Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. IEEE Access 9: 50078-50092 (2021)
- Cihangir Tezcan. Analysis of Ascon, DryGASCON, and Shamash Permutations. International Journal of Information Security Science 9 (3), 172-187
- Gregor Leander, Cihangir Tezcan, Friedrich Wiemer. Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptology. 2018(1): 74-100
- Cihangir Tezcan and Ali Aydın Selçuk. Improved Improbable Differential Attacks on CLEFIA: Expansion Technique Revisited. Information Processing Letters 116(2), 136-143, (2016)
Book Chapters
- Aslı Basak Civek, and Cihangir Tezcan. Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON. In Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022 (pp. 202–209)
- Cihangir Tezcan. Cryptographic Foundations of Blockchain Technology. In: Blockchain. Chapman and Hall/CRC, 2022. p. 221-241.
- Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, and Friedrich Wiemer. Weak-Key Distinguishers for AES. In Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 141–170). Springer (2020)
- Cihangir Tezcan, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, Nazife Baykal. Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited. In book: Lightsec 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol. 10098, 18-32, Springer (2017)
Conference Papers
- Cihangir Tezcan, and Gregor Leander. GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA. IACR Trans. Symmetric Cryptol., 2025(1), p.309–327.
- Cihangir Tezcan. GPU-Based Brute Force Cryptanalysis of KLEIN. In Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024 (pp. 884–889). SCITEPRESS.
- Aslı Basak Civek, and Cihangir Tezcan. Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON. In Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers (pp. 91–103). Springer.
- Cihangir Tezcan. Brute Force Cryptanalysis of Mifare Classic Cards on GPU. Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 524-528, Porto, Portugal, ICISSP (2017)
- Cihangir Tezcan, Ali Doğanaksoy, Galip Oral Okan, Asuman Şenol, Erol Doğan, Furkan Yücebaş, Nazife Baykal. On Differential Factors. Iscturkey 2016, Proceedings of IX. International conference on Information Security and Cryptology, 103-110 (2016)
- Cihangir Tezcan. Truncated, Impossible, and Improbable Differential Analysis of Ascon. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 325-332, Rome, Italy, ICISSP (2016)