Hadi Soleimany

Orcid: 0000-0002-3961-4988

According to our database1, Hadi Soleimany authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Linked Fault Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Exploiting statistical effective fault attack in a blind setting.
IET Inf. Secur., July, 2023

Efficient Accelerator for NTT-based Polynomial Multiplication.
IACR Cryptol. ePrint Arch., 2023

2022
A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics.
J. Comput. Virol. Hacking Tech., 2022

Cross-VM cache attacks on Camellia.
J. Comput. Virol. Hacking Tech., 2022

Statistical Effective Fault Attacks: The Other Side of the Coin.
IEEE Trans. Inf. Forensics Secur., 2022

Practical Multiple Persistent Faults Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Secure and Low-Area Implementation of the AES Using FPGA.
ISC Int. J. Inf. Secur., 2022

Flush+Reload Attacks on SEED.
Comput. J., 2022

Breaking KASLR on Mobile Devices without Any Use of Cache Memory.
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022

2021
Low-Latency Keccak at any Arbitrary Order.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets.
ISC Int. J. Inf. Secur., 2021

Enhanced cache attack on AES applicable on ARM-based devices with new operating systems.
Comput. Networks, 2021

2020
Enhanced Flush+Reload Attack on AES.
ISC Int. J. Inf. Secur., 2020

New single-trace side-channel attacks on a specific class of Elgamal cryptosystem.
IET Inf. Secur., 2020

Framework for faster key search using related-key higher-order differential properties: applications to Agrasta.
IET Inf. Secur., 2020

Modified Cache Template Attack on AES.
IACR Cryptol. ePrint Arch., 2020

2018
Impossible Differential Cryptanalysis on Deoxys-BC-256.
ISC Int. J. Inf. Secur., 2018

Cryptanalysis of Low-Data Instances of Full LowMCv2.
IACR Cryptol. ePrint Arch., 2018

2016
Key Recovery Attack against 2.5-round pi-Cipher.
IACR Cryptol. ePrint Arch., 2016

2015
Reflection Cryptanalysis of PRINCE-Like Ciphers.
J. Cryptol., 2015

Self-similarity cryptanalysis of the block cipher ITUbee.
IET Inf. Secur., 2015

2014
Studies in Lightweight Cryptography ; Tutkimuksia kevyen luokan salaustekniikasta.
PhD thesis, 2014

Zero-correlation linear cryptanalysis of reduced-round LBlock.
Des. Codes Cryptogr., 2014

Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2012
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock.
IACR Cryptol. ePrint Arch., 2012


  Loading...