


default search action
Marios O. Choudary
Person information
- affiliation: University Politehnica of Bucharest, Romania
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Anca Radulescu, Marios O. Choudary:
Side-Channel Attacks on Masked Bitsliced Implementations of AES. Cryptogr. 6(3): 31 (2022) - [j5]Anca Radulescu, Pantelimon George Popescu, Marios O. Choudary:
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 886-905 (2022) - 2021
- [j4]Andrei Tanasescu
, Marios O. Choudary, Olivier Rioul
, Pantelimon George Popescu:
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy. Entropy 23(11): 1538 (2021) - [i8]Andrei Tanasescu, Marios O. Choudary, Olivier Rioul, Pantelimon George Popescu:
Asymptotically Optimal Massey-Like Inequality on Guessing Entropy With Application to Side-Channel Attack Evaluations. CoRR abs/2103.15620 (2021)
2010 – 2019
- 2019
- [c17]Pantelimon George Popescu, Marios Omar Choudary:
Refinement of Massey Inequality : (To Nicolae Ţăpuş on his 70th birthday). ISIT 2019: 495-496 - 2018
- [j3]Marios O. Choudary
, Markus G. Kuhn
:
Efficient, Portable Template Attacks. IEEE Trans. Inf. Forensics Secur. 13(2): 490-501 (2018) - [c16]Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:
Secure Opportunistic Multipath Key Exchange. CCS 2018: 2077-2094 - [i7]Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:
Secure Opportunistic Multipath Key Exchange. IACR Cryptol. ePrint Arch. 2018: 1124 (2018) - 2017
- [c15]Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools. CHES 2017: 367-386 - [c14]Sergiu Costea, Marios O. Choudary, Costin Raiciu:
Security from Disjoint Paths: Is It Possible? Security Protocols Workshop 2017: 247-253 - [c13]Marios O. Choudary:
Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). Security Protocols Workshop 2017: 254-259 - [i6]Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively fast, scalable and tight security evaluation tools. IACR Cryptol. ePrint Arch. 2017: 623 (2017) - 2016
- [c12]Marios O. Choudary
, Romain Poussier, François-Xavier Standaert
:
Score-Based vs. Probability-Based Enumeration - A Cautionary Note. INDOCRYPT 2016: 137-152 - 2015
- [j2]Mike Bond, Marios O. Choudary
, Steven J. Murdoch
, Sergei P. Skorobogatov, Ross J. Anderson:
Be Prepared: The EMV Preplay Attack. IEEE Secur. Priv. 13(2): 56-64 (2015) - 2014
- [c11]Marios O. Choudary
, Markus G. Kuhn
:
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits. CARDIS 2014: 85-103 - [c10]Omar Choudary, Markus G. Kuhn:
Template Attacks on Different Devices. COSADE 2014: 179-198 - [c9]Mike Bond, Omar Choudary
, Steven J. Murdoch
, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: Cloning EMV Cards with the Pre-play Attack. IEEE Symposium on Security and Privacy 2014: 49-64 - [i5]Omar Choudary, Markus G. Kuhn:
Template Attacks on Different Devices. IACR Cryptol. ePrint Arch. 2014: 459 (2014) - [i4]Omar Choudary, Markus G. Kuhn:
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits. IACR Cryptol. ePrint Arch. 2014: 885 (2014) - 2013
- [c8]Omar Choudary
, Markus G. Kuhn
:
Efficient Template Attacks. CARDIS 2013: 253-270 - [c7]Omar Choudary
, Felix Gröbert, Joachim Metz:
Security Analysis and Decryption of Filevault 2. IFIP Int. Conf. Digital Forensics 2013: 349-363 - [i3]Omar Choudary, Markus G. Kuhn:
Efficient Template Attacks. IACR Cryptol. ePrint Arch. 2013: 770 (2013) - 2012
- [i2]Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei P. Skorobogatov, Ross J. Anderson:
Chip and Skim: cloning EMV cards with the pre-play attack. CoRR abs/1209.2531 (2012) - [i1]Omar Choudary, Felix Gröbert, Joachim Metz:
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption. IACR Cryptol. ePrint Arch. 2012: 374 (2012) - 2011
- [c6]Ross J. Anderson, Mike Bond, Omar Choudary
, Steven J. Murdoch
, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Financial Cryptography 2011: 220-234 - [c5]Omar Choudary
, Frank Stajano:
Make Noise and Whisper: A Solution to Relay Attacks. Security Protocols Workshop 2011: 271-283 - [c4]Omar Choudary
:
Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). Security Protocols Workshop 2011: 284-295 - 2010
- [j1]Omar Choudary, Benoit Baccot, Romulus Grigoras, Vincent Charvillat:
Evaluation of Multimedia Features in Mobile Guide Applications. J. Digit. Inf. Manag. 8(1): 28-36 (2010)
2000 – 2009
- 2009
- [c3]Benoit Baccot, Omar Choudary, Romulus Grigoras, Vincent Charvillat:
On the impact of sequence and time in rich media advertising. ACM Multimedia 2009: 849-852 - [c2]Omar Choudary
, Vincent Charvillat, Romulus Grigoras, Pierre Gurdjos:
MARCH: mobile augmented reality for cultural heritage. ACM Multimedia 2009: 1023-1024 - 2008
- [c1]Omar Choudary
, Vincent Charvillat, Romulus Grigoras:
Mobile guide applications using representative visualizations. ACM Multimedia 2008: 901-904
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint