Çağdaş Çalık
Middle East Technical University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Çağdaş Çalık.
international conference on progress in cryptology | 2010
Çağdaş Çalık; Meltem Sönmez Turan
Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function. Then, we present a message recovery attack with a complexity of 210.48 compression function evaluations. Also, we present a pseudo-preimage attack for the compression function with complexity 2254.25.
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications | 2008
Meltem Sonmez Turan; Çağdaş Çalık; Nurdan Buz Saran; Ali Doğanaksoy
Statistical randomness testing plays an important role in security analysis of cryptosystems. In this study, we aim to propose a new framework of randomness testing based on random mappings. Considering the probability distributions of coverage and ρ-lengths, we present three new distinguishers; (i) coverage test, (ii) ρ-test and (iii) DP-coverage test and applied them on Phase III Candidates of eSTREAM project. We experimentally observed some statistical weaknesses of Pomaranch using the coverage test.
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications | 2012
Çağdaş Çalık; Ali Doğanaksoy
We present an algorithm that computes the weight of a Boolean function from its Algebraic Normal Form (ANF). For functions acting on high number of variables (n>30) and having low number of monomials in its ANF, the algorithm is advantageous over the standard method of computing weight which requires the transformation of functions ANF to its truth table with a complexity of
Journal of Computational and Applied Mathematics | 2014
Erdener Uyan; Çağdaş Çalık; Ali Doğanaksoy
\mathcal{O}(n2^n)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2010
Çağdaş Çalık; Meltem Sönmez Turan; Ferruh Özbudak
operations. A relevant attempt at computing the Walsh coefficients of a function from its ANF by Gupta and Sarkar required the function to be composed of high degree monomials [1]. The proposed algorithm overcomes this limitation for particular values of n, enabling the weight and Walsh coefficient computation for functions that could be of more interest for practical applications.
IACR Cryptology ePrint Archive | 2018
Çağdaş Çalık; Meltem Sonmez Turan; René Peralta
The problem of counting Boolean functions with specified number s of Walsh coefficients @w in their Walsh spectrum is discussed in this paper. Strategies to solve this problem shall help solving many more problems related to desired cryptographic features of Boolean functions such as nonlinearity, resiliency, algebraic immunity, etc. In an attempt to study this problem, we present a new framework of solutions. We give results for |@w|>=2^n^-^1 and for all s, in line with a previous work of Wu (1998) [12]. We also provide various results such as existence and construction for some s when @w=0, multiplicities for all @w and naive bounds on s for @w>2^n^/^2.
Cryptography and Communication | 2018
Çağdaş Çalık; Meltem Sonmez Turan; Rene C. Peralta
Archive | 2017
Lawrence E. Bassham; Çağdaş Çalık; Kerry A. McKay; Nicky Mouha; Meltem Sonmez Turan
Lecture Notes in Computer Science | 2009
Jean Aumasson; Çağdaş Çalık; Willi Meier; Raphael C.-W. Phan; Kerem Varici; Onur Özen
IACR Cryptology ePrint Archive | 2009
Jean-Philippe Aumasson; Çağdaş Çalık; Willi Meier; Onur Özen; Raphael C.-W. Phan; Kerem Varici