Follow
Marios Omar Choudary
Marios Omar Choudary
Junior lecturer, Politehnica Bucharest
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Efficient Template Attacks
O Choudary, M G. Kuhn
CARDIS 2013, 2013
2712013
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1722014
MARCH: mobile augmented reality for cultural heritage
O Choudary, V Charvillat, R Grigoras, P Gurdjos
Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009
1372009
Efficient, portable template attacks
MO Choudary, MG Kuhn
IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017
872017
Template attacks on different devices
O Choudary, MG Kuhn
Constructive Side-Channel Analysis and Secure Design: 5th International …, 2014
812014
Back to massey: Impressively fast, scalable and tight security evaluation tools
MO Choudary, PG Popescu
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
392017
Efficient stochastic methods: Profiled attacks beyond 8 bits
MO Choudary, MG Kuhn
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
392015
Security Analysis and Decryption of Filevault 2
O Choudary, F Gröbert, J Metz
Advances in Digital Forensics IX 2013, 349-363, 2013
24*2013
The Smart Card Detective: a hand-held EMV interceptor
OS Choudary
Computer Laboratory MPhil thesis, 2010
242010
Be prepared: The EMV preplay attack
M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson
IEEE Security & Privacy 13 (2), 56-64, 2015
212015
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
182016
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
A Rădulescu, PG Popescu, MO Choudary
IACR Transactions on Cryptographic Hardware and Embedded Systems, 886-905, 2022
152022
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV
R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano
Lecture Notes in Computer Science, 2011
152011
On the impact of sequence and time in rich media advertising
B Baccot, O Choudary, R Grigoras, V Charvillat
Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009
112009
Breaking Smartcards Using Power Analysis
O Choudary
10*2009
Secure opportunistic multipath key exchange
S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Tight and scalable side-channel attack evaluations through asymptotically optimal Massey-like inequalities on guessing entropy
A Tănăsescu, MO Choudary, O Rioul, PG Popescu
Entropy 23 (11), 1538, 2021
82021
Make noise and whisper: a solution to relay attacks
O Choudary, F Stajano
Lecture Notes in Computer Science, 2011
82011
Efficient multivariate statistical techniques for extracting secrets from electronic devices
MO Choudary
University of Cambridge, Computer Laboratory, 2015
72015
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday)
PG Popescu, M Omar Choudary
2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20