フォロー
Marios Omar Choudary
Marios Omar Choudary
Junior lecturer, Politehnica Bucharest
確認したメール アドレス: cl.cam.ac.uk - ホームページ
タイトル
引用先
引用先
Efficient Template Attacks
O Choudary, M G. Kuhn
CARDIS 2013, 2013
2782013
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1752014
MARCH: mobile augmented reality for cultural heritage
O Choudary, V Charvillat, R Grigoras, P Gurdjos
Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009
1352009
Efficient, portable template attacks
MO Choudary, MG Kuhn
IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017
882017
Template attacks on different devices
O Choudary, MG Kuhn
International Workshop on Constructive Side-Channel Analysis and Secure …, 2014
822014
Back to massey: Impressively fast, scalable and tight security evaluation tools
MO Choudary, PG Popescu
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
402017
Efficient stochastic methods: Profiled attacks beyond 8 bits
MO Choudary, MG Kuhn
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
402015
The Smart Card Detective: a hand-held EMV interceptor
OS Choudary
Computer Laboratory MPhil thesis, 2010
252010
Security Analysis and Decryption of Filevault 2
O Choudary, F Gröbert, J Metz
Advances in Digital Forensics IX 2013, 349-363, 2013
24*2013
Be prepared: The EMV preplay attack
M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson
IEEE Security & Privacy 13 (2), 56-64, 2015
212015
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
172016
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
A Rădulescu, PG Popescu, MO Choudary
IACR Transactions on Cryptographic Hardware and Embedded Systems, 886-905, 2022
152022
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV
R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano
Lecture Notes in Computer Science, 2011
142011
On the impact of sequence and time in rich media advertising
B Baccot, O Choudary, R Grigoras, V Charvillat
Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009
112009
Breaking Smartcards Using Power Analysis
O Choudary
10*2009
Secure opportunistic multipath key exchange
S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Tight and scalable side-channel attack evaluations through asymptotically optimal Massey-like inequalities on guessing entropy
A Tănăsescu, MO Choudary, O Rioul, PG Popescu
Entropy 23 (11), 1538, 2021
82021
Make noise and whisper: a solution to relay attacks
O Choudary, F Stajano
Lecture Notes in Computer Science, 2011
82011
Efficient multivariate statistical techniques for extracting secrets from electronic devices
MO Choudary
University of Cambridge, Computer Laboratory, 2015
72015
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday)
PG Popescu, M Omar Choudary
2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019
62019
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20