Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Çağdaş Çalık is active.

Publication


Featured researches published by Çağdaş Çalık.


international conference on progress in cryptology | 2010

Message recovery and pseudo-preimage attacks on the compression function of Hamsi-256

Çağdaş Çalık; Meltem Sönmez Turan

Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function. Then, we present a message recovery attack with a complexity of 210.48 compression function evaluations. Also, we present a pseudo-preimage attack for the compression function with complexity 2254.25.


SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications | 2008

New Distinguishers Based on Random Mappings against Stream Ciphers

Meltem Sonmez Turan; Çağdaş Çalık; Nurdan Buz Saran; Ali Doğanaksoy

Statistical randomness testing plays an important role in security analysis of cryptosystems. In this study, we aim to propose a new framework of randomness testing based on random mappings. Considering the probability distributions of coverage and ρ-lengths, we present three new distinguishers; (i) coverage test, (ii) ρ-test and (iii) DP-coverage test and applied them on Phase III Candidates of eSTREAM project. We experimentally observed some statistical weaknesses of Pomaranch using the coverage test.


SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications | 2012

Computing the weight of a boolean function from its algebraic normal form

Çağdaş Çalık; Ali Doğanaksoy

We present an algorithm that computes the weight of a Boolean function from its Algebraic Normal Form (ANF). For functions acting on high number of variables (n>30) and having low number of monomials in its ANF, the algorithm is advantageous over the standard method of computing weight which requires the transformation of functions ANF to its truth table with a complexity of


Journal of Computational and Applied Mathematics | 2014

Counting Boolean functions with specified values in their Walsh spectrum

Erdener Uyan; Çağdaş Çalık; Ali Doğanaksoy

\mathcal{O}(n2^n)


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2010

On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers

Çağdaş Çalık; Meltem Sönmez Turan; Ferruh Özbudak

operations. A relevant attempt at computing the Walsh coefficients of a function from its ANF by Gupta and Sarkar required the function to be composed of high degree monomials [1]. The proposed algorithm overcomes this limitation for particular values of n, enabling the weight and Walsh coefficient computation for functions that could be of more interest for practical applications.


IACR Cryptology ePrint Archive | 2018

The Multiplicative Complexity of 6-variable Boolean Functions.

Çağdaş Çalık; Meltem Sonmez Turan; René Peralta

The problem of counting Boolean functions with specified number s of Walsh coefficients @w in their Walsh spectrum is discussed in this paper. Strategies to solve this problem shall help solving many more problems related to desired cryptographic features of Boolean functions such as nonlinearity, resiliency, algebraic immunity, etc. In an attempt to study this problem, we present a new framework of solutions. We give results for |@w|>=2^n^-^1 and for all s, in line with a previous work of Wu (1998) [12]. We also provide various results such as existence and construction for some s when @w=0, multiplicities for all @w and naive bounds on s for @w>2^n^/^2.


Cryptography and Communication | 2018

The Multiplicative Complexity of 6-variable Boolean Functions | NIST

Çağdaş Çalık; Meltem Sonmez Turan; Rene C. Peralta


Archive | 2017

Profiles for the Lightweight Cryptography Standardization Process (Retired Draft)

Lawrence E. Bassham; Çağdaş Çalık; Kerry A. McKay; Nicky Mouha; Meltem Sonmez Turan


Lecture Notes in Computer Science | 2009

Improved Cryptanalysis of Skein

Jean Aumasson; Çağdaş Çalık; Willi Meier; Raphael C.-W. Phan; Kerem Varici; Onur Özen


IACR Cryptology ePrint Archive | 2009

Improved Cryptanalysis of Skein.

Jean-Philippe Aumasson; Çağdaş Çalık; Willi Meier; Onur Özen; Raphael C.-W. Phan; Kerem Varici

Collaboration


Dive into the Çağdaş Çalık's collaboration.

Top Co-Authors

Avatar

Meltem Sonmez Turan

Middle East Technical University

View shared research outputs
Top Co-Authors

Avatar

Ali Doğanaksoy

Middle East Technical University

View shared research outputs
Top Co-Authors

Avatar

Meltem Sönmez Turan

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Kerem Varici

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Onur Özen

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Erdener Uyan

Middle East Technical University

View shared research outputs
Top Co-Authors

Avatar

Ferruh Özbudak

Middle East Technical University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge