Conference Papers

  • Orhun Kara, Ebru Küçükkubaş: Parametric Guess and Determine Attack on Stream Ciphers, W06. Workshop on Machine Learning for Security and Cryptography of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 8-11 Sept 2019, Istanbul, Turkey

  • Muhammed F. Esgin, Orhun Kara: Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. Selected Areas in Cryptography SAC 2015: Lecture Notes in Computer Science, LNCS Volume 9566, 67-85, 2016, DOI: 10.1007/978-3-319-31301-6_4, Sackville, Canada.

  • Orhun Kara, Ferhat Karakoç: Fixed Points of Special Type and Cryptanalysis of Full GOST. CANS 2012, The 11th International Conference on Cryptology and Network Security: Lecture Notes in Computer Science, LNCS Volume 7712, 86-97, 2012, DOI: 10.1007/978-3-642-35404-5_8, Darmstadt, Germany.

  • Orhun Kara, Ferhat Karakoç: Success Probability of the first attack on full round GOST, In Proc. ISCTurkey 2012, The 5th international Information Security and Cryptology Conference, pp 230-234, 2012, Ankara, Turkey

  • Orhun Kara: Security Margin of 5-round DEAL, In Proc. ISCTurkey 2012, The 5th international Information Security and Cryptology Conference, pp 183-186, 2012, Ankara, Turkey

  • Adnan Baysal, Orhun Kara: How biased are linear biases? In Proc. ISCTurkey 2012, The 5th international Information Security and Cryptology Conference, pp 187-194, 2012, Ankara, Turkey

  • Orhun Kara, Süleyman Kardaş, M.Ali Bingöl, Gildas Avoine: Optimal Security Limits of RFID Distance Bounding Protocols, RFIDSEC 2010, RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, Lecture Notes in Computer Science, LNCS Volume 6370/2010, 220-238, Springer, 2010, DOI: 10.1007/978-3-642-16822-2_18, Istanbul, Turkey

  • Süleyman Kardaş, Muhammed Bingöl, Orhun Kara, Ali Özhan Gürel: A new RFID Distance Bounding Protocol, In Proc. of ISCTurkey 2010, The 3rd.international Information Security and Cryptology Conference, pp. 3-8 2010, Ankara, Turkey

  • Adem Atalay, Orhun Kara: DES’in FPGA’de Hafifsıklet Gerçeklenmesi, In Proc. IN PROC. ISCTURKEY 2010, The 3rd international Information Security and Cryptology Conference, pp. 279-283, 2010, Ankara, Turkey

  • Orhun Kara, Adem Atalay: Preimages Of Hash Functions Through Rainbow Tables, ISCIS 2009, The 24th Symposium on Computer and Information Sciences, 2009, DOI: 10.1109/ISCIS.2009.5291831, Güzelyurt, KKTC

  • Orhun Kara: Reflection Cryptanalysis of Some Ciphers, Proc. Indocrypt 2008, Lecture Notes on Computer Science LNCS 5365, pp. 294-307, Springer, 2008 DOI: 10.1007/978-3-540-89754-5_23 Karaghpur, India

  • Orhun Kara, Imran Ergüler: A new Approach to Keystream Based Cryptosystems, In proc. of SASC 2008 - The State of the Art of Stream Ciphers, pp. 205-222, Ecrypt, 2008, DOI: 10.1007/978-3-540-74619-5_11, Lausanne, Switzerland

  • Esen Akkemik, Orhun Kara: Real-time Cryptanalysis of Unsystematic Cipher, In proc. SAM 2008 The 2008 International Conference on Security and Management, pp. 514-522, CSREA Press, 2008, Las Vegas, USA

  • Orhun Kara: Cryptanalysis of Strengthened Magenta, Proc. ISCTurkey 2008, The 2nd international Information Security and Cryptology Conference, pp. 27-30, 2008 Ankara Turkey

  • Esen Akkemik, Orhun Kara, Ayşegül Kurşunlu: On Meier-Staffelbachs Fast Correlation Attack, In Proc. ISCTurkey, The 2nd international Information Security and Cryptology Conference, pp. 107-113, 2008, Ankara Turkey

  • Orhun Kara, Cevat Manap: A New Class of Weak Keys for Blowfish, proceedings of FSE 2007, Fast Software Encryption 2007. Lecture Notes on Computer Science, LNCS 4593, pp 167-180, Springer 2007, DOI: 10.1007/978-3-540-74619-5_11, Luxemburg

  • Meltem Sönmez Duran, Orhun Kara: Linear Approximations for 2-Round Trivium, In Proc. of SASC 2007, pp. 22-37, 2007, Bochum Germany

  • Esen Akkemik, Orhun Kara, Cevat Manap: Success rate of reflection attack on some DES variants, SINCONF 2007, International conference on Security of Information and Networks, 2007, Gazi Magusa, KKTC

  • Meltem Sönmez Turan and Orhun Kara: Finding Linear Approximations for the Stream Cipher Trivium, II. Ulusal Kriptoloji Sempozyumu, pp. 146-153, 2006, Ankara Turkey

  • Orhun Kara: Self Similarity Analysis of Iterated Functions, II. Ulusal Kriptoloji Sempozyumu, pp. 11-18, 2006, Ankara Turkey