Follow
Marios Omar Choudary
Marios Omar Choudary
Junior lecturer, Politehnica Bucharest
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Efficient Template Attacks
O Choudary, M G. Kuhn
CARDIS 2013, 2013
2552013
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1692014
MARCH: mobile augmented reality for cultural heritage
O Choudary, V Charvillat, R Grigoras, P Gurdjos
Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009
1322009
Efficient, portable template attacks
MO Choudary, MG Kuhn
IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017
802017
Template attacks on different devices
O Choudary, MG Kuhn
Constructive Side-Channel Analysis and Secure Design: 5th International …, 2014
792014
Efficient stochastic methods: Profiled attacks beyond 8 bits
MO Choudary, MG Kuhn
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
382015
Back to massey: Impressively fast, scalable and tight security evaluation tools
MO Choudary, PG Popescu
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
332017
The Smart Card Detective: a hand-held EMV interceptor
OS Choudary
Computer Laboratory MPhil thesis, 2010
232010
Security Analysis and Decryption of Filevault 2
O Choudary, F Gröbert, J Metz
Advances in Digital Forensics IX 2013, 349-363, 2013
22*2013
Be prepared: The EMV preplay attack
M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson
IEEE Security & Privacy 13 (2), 56-64, 2015
202015
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV
R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano
Lecture Notes in Computer Science, 2011
152011
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
142016
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
A Rădulescu, PG Popescu, MO Choudary
IACR Transactions on Cryptographic Hardware and Embedded Systems, 886-905, 2022
122022
On the impact of sequence and time in rich media advertising
B Baccot, O Choudary, R Grigoras, V Charvillat
Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009
112009
Breaking Smartcards Using Power Analysis
O Choudary
10*2009
Secure opportunistic multipath key exchange
S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Make noise and whisper: a solution to relay attacks
O Choudary, F Stajano
Lecture Notes in Computer Science, 2011
82011
Tight and scalable side-channel attack evaluations through asymptotically optimal Massey-like inequalities on guessing entropy
A Tănăsescu, MO Choudary, O Rioul, PG Popescu
Entropy 23 (11), 1538, 2021
62021
Efficient multivariate statistical techniques for extracting secrets from electronic devices
MO Choudary
University of Cambridge, Computer Laboratory, 2015
62015
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday)
PG Popescu, MO Choudary
2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20