Marios O. Choudary

Orcid: 0000-0003-0586-9592

Affiliations:
  • University Politehnica of Bucharest, Romania


According to our database1, Marios O. Choudary authored at least 25 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Side-Channel Attacks on Masked Bitsliced Implementations of AES.
Cryptogr., 2022

2021
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy.
Entropy, 2021

Asymptotically Optimal Massey-Like Inequality on Guessing Entropy With Application to Side-Channel Attack Evaluations.
CoRR, 2021

2019
Refinement of Massey Inequality : (To Nicolae Ţăpuş on his 70th birthday).
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Efficient, Portable Template Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Opportunistic Multipath Key Exchange.
IACR Cryptol. ePrint Arch., 2018

2017
Back to Massey: Impressively fast, scalable and tight security evaluation tools.
IACR Cryptol. ePrint Arch., 2017

Security from Disjoint Paths: Is It Possible?
Proceedings of the Security Protocols XXV, 2017

Security from Disjoint Paths: Is It Possible? (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

2016
Score-Based vs. Probability-Based Enumeration - A Cautionary Note.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
Be Prepared: The EMV Preplay Attack.
IEEE Secur. Priv., 2015

2014
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits.
IACR Cryptol. ePrint Arch., 2014

Template Attacks on Different Devices.
IACR Cryptol. ePrint Arch., 2014

Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Efficient Template Attacks.
IACR Cryptol. ePrint Arch., 2013

Security Analysis and Decryption of Filevault 2.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Make Noise and Whisper: A Solution to Relay Attacks.
Proceedings of the Security Protocols XIX, 2011

Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Evaluation of Multimedia Features in Mobile Guide Applications.
J. Digit. Inf. Manag., 2010

2009
MARCH: mobile augmented reality for cultural heritage.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

On the impact of sequence and time in rich media advertising.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

2008
Mobile guide applications using representative visualizations.
Proceedings of the 16th International Conference on Multimedia 2008, 2008


  Loading...