Follow
Marios Omar Choudary
Marios Omar Choudary
Junior lecturer, Politehnica Bucharest
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Efficient Template Attacks
O Choudary, M G. Kuhn
CARDIS 2013, 2013
2582013
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
1662014
MARCH: mobile augmented reality for cultural heritage
O Choudary, V Charvillat, R Grigoras, P Gurdjos
Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009
1342009
Template attacks on different devices
O Choudary, MG Kuhn
Constructive Side-Channel Analysis and Secure Design: 5th International …, 2014
832014
Efficient, portable template attacks
MO Choudary, MG Kuhn
IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017
812017
Efficient stochastic methods: Profiled attacks beyond 8 bits
MO Choudary, MG Kuhn
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
392015
Back to massey: Impressively fast, scalable and tight security evaluation tools
MO Choudary, PG Popescu
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
332017
The Smart Card Detective: a hand-held EMV interceptor
OS Choudary
Computer Laboratory MPhil thesis, 2010
232010
Security Analysis and Decryption of Filevault 2
O Choudary, F Gröbert, J Metz
Advances in Digital Forensics IX 2013, 349-363, 2013
22*2013
Be prepared: The EMV preplay attack
M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson
IEEE Security & Privacy 13 (2), 56-64, 2015
202015
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV
R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano
Lecture Notes in Computer Science, 2011
152011
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
142016
On the impact of sequence and time in rich media advertising
B Baccot, O Choudary, R Grigoras, V Charvillat
Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009
112009
Breaking Smartcards Using Power Analysis
O Choudary
10*2009
Secure opportunistic multipath key exchange
S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Make noise and whisper: a solution to relay attacks
O Choudary, F Stajano
Lecture Notes in Computer Science, 2011
72011
Efficient multivariate statistical techniques for extracting secrets from electronic devices
MO Choudary
University of Cambridge, Computer Laboratory, 2015
62015
Tight and scalable side-channel attack evaluations through asymptotically optimal Massey-like inequalities on guessing entropy
A Tănăsescu, MO Choudary, O Rioul, PG Popescu
Entropy 23 (11), 1538, 2021
52021
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday)
PG Popescu, MO Choudary
2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019
42019
A user study on rich media mobile guide applications
O Choudary, B Baccot, R Grigoras, V Charvillat
9th Workshop on Multimedia Metadata (WMM’09) 441, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20