


default search action
Ferhat Karakoç
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Emrah Tomur
, Zeki Bilgin
, Utku Gülen
, Elif Ustundag Soykan
, Leyli Karaçay
, Ferhat Karakoç
:
Intent-Based Security for Functional Safety in Cyber-Physical Systems. IEEE Trans. Emerg. Top. Comput. 12(2): 615-630 (2024) - [c17]Ferhat Karakoç, Alptekin Küpçü, Melek Önen:
Fault Tolerant and Malicious Secure Federated Learning. CANS (2) 2024: 73-95 - [c16]Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:
FASIL: A Challenge-Based Framework for Secure and Privacy-Preserving Federated Learning. CSNet 2024: 182-189 - [c15]Utku Gülen, Ömer Faruk Tuna, Boubakr Nour, Zakaria Laaroussi, Leyli Karaçay, Ferhat Karakoç:
Threat Modeling of AI-as-a-Service Framework. WiMob 2024: 1-7 - [i7]Ferhat Karakoç, Betül Güvenç Paltun, Leyli Karaçay, Ömer Faruk Tuna, Ramin Fuladi, Utku Gülen:
FASIL: A challenge-based framework for secure and privacy-preserving federated learning. IACR Cryptol. ePrint Arch. 2024: 1028 (2024) - 2023
- [j6]Ferhat Karakoç
, Leyli Karaçay, Pinar Çomak De Cnudde, Utku Gülen, Ramin Fuladi, Elif Ustundag Soykan:
A security-friendly privacy-preserving solution for federated learning. Comput. Commun. 207: 27-35 (2023) - [i6]Ferhat Karakoç, Alptekin Küpçü:
Enabling Two-Party Secure Computation on Set Intersection. IACR Cryptol. ePrint Arch. 2023: 609 (2023) - 2022
- [j5]Elif Ustundag Soykan
, Leyli Karaçay
, Ferhat Karakoç
, Emrah Tomur
:
A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning. IEEE Access 10: 97495-97519 (2022) - [j4]Elif Ustundag Soykan, Leyli Karaçay, Zeki Bilgin, Emrah Tomur, Mehmet Akif Ersoy
, Ferhat Karakoç, Pinar Çomak:
Context-Aware Authentication with Dynamic Credentials using Electricity Consumption Data. Comput. J. 65(10): 2631-2640 (2022) - [c14]Ferhat Karakoç, Leyli Karaçay, Pinar Çomak, Utku Gülen, Ramin Fuladi, Elif Ustundag Soykan:
A Security-Friendly Privacy Solution for Federated Learning. AI6G@WCCI 2022 - 2021
- [j3]Leyli Karaçay
, Zeki Bilgin
, Ayse Bilge Gündüz
, Pinar Çomak
, Emrah Tomur
, Elif Ustundag Soykan
, Utku Gülen
, Ferhat Karakoç
:
A Network-Based Positioning Method to Locate False Base Stations. IEEE Access 9: 111368-111382 (2021) - [c13]Emrah Tomur, Utku Gülen
, Elif Ustundag Soykan, Mehmet Akif Ersoy
, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak:
SoK: Investigation of Security and Functional Safety in Industrial IoT. CSR 2021: 226-233 - [c12]Ferhat Karakoç, Melek Önen, Zeki Bilgin:
Secure Aggregation Against Malicious Users. SACMAT 2021: 115-124 - 2020
- [c11]Ferhat Karakoç, Alptekin Küpçü
:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. CANS 2020: 409-429 - [i5]Ferhat Karakoç
, Alptekin Küpçü:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. IACR Cryptol. ePrint Arch. 2020: 864 (2020)
2010 – 2019
- 2019
- [c10]Ferhat Karakoç
, Majid Nateghizad, Zekeriya Erkin
:
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer. ARES 2019: 12:1-12:9 - 2016
- [c9]Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. ASIACRYPT (1) 2016: 354-368 - [c8]Ferhat Karakoç, Öznur Mut Sagdiçoglu, Mehmet Emin Gönen, Oguzhan Ersoy:
Impossible Differential Cryptanalysis of 16/18-Round Khudra. LightSec 2016: 33-44 - [c7]Mustafa Çoban, Ferhat Karakoç, Mehmet Özen:
Cryptanalysis of QTL Block Cipher. LightSec 2016: 60-68 - [i4]Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç
:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. IACR Cryptol. ePrint Arch. 2016: 640 (2016) - 2015
- [j2]Ferhat Karakoç
, Hüseyin Demirci
, A. Emre Harmanci:
AKF: A key alternating Feistel scheme for lightweight cipher designs. Inf. Process. Lett. 115(2): 359-367 (2015) - [i3]Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
:
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher. IACR Cryptol. ePrint Arch. 2015: 1163 (2015) - 2014
- [b1]Ferhat Karakoç:
Hafif-siklet blok şifreleme algoritmalarının analizi ve ITUbee: Hafif-siklet yeni bir algoritma tasarımı (Analysis of lightweight block ciphers and ITUbee: A new lightweight algorithm design). İstanbul Technical University, Turkey, 2014 - 2013
- [j1]Ferhat Karakoç
, Hüseyin Demirci
, A. Emre Harmanci:
Biclique cryptanalysis of LBlock and TWINE. Inf. Process. Lett. 113(12): 423-429 (2013) - [c6]Ferhat Karakoç, Hüseyin Demirci
, A. Emre Harmanci:
ITUbee: A Software Oriented Lightweight Block Cipher. LightSec 2013: 16-27 - [c5]Özkan Boztas, Ferhat Karakoç, Mustafa Çoban:
Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128. LightSec 2013: 55-67 - 2012
- [c4]Mustafa Çoban, Ferhat Karakoç, Özkan Boztas:
Biclique Cryptanalysis of TWINE. CANS 2012: 43-55 - [c3]Orhun Kara
, Ferhat Karakoç:
Fixed Points of Special Type and Cryptanalysis of Full GOST. CANS 2012: 86-97 - [c2]Ferhat Karakoç, Hüseyin Demirci
, A. Emre Harmanci:
Impossible Differential Cryptanalysis of Reduced-Round LBlock. WISTP 2012: 179-188 - [i2]Mustafa Çoban, Ferhat Karakoç
, Özkan Boztas:
Biclique Cryptanalysis of TWINE. IACR Cryptol. ePrint Arch. 2012: 422 (2012) - 2011
- [c1]Ferhat Karakoç, Hüseyin Demirci
, A. Emre Harmanci:
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher. Selected Areas in Cryptography 2011: 169-184
2000 – 2009
- 2008
- [i1]Adem Atalay, Orhun Kara, Ferhat Karakoç:
Improved Cryptanalysis of SHAMATA-BC. IACR Cryptol. ePrint Arch. 2008: 513 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-24 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint