Efficient Template Attacks O Choudary, M G. Kuhn CARDIS 2013, 2013 | 261 | 2013 |
Chip and Skim: cloning EMV cards with the pre-play attack M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson 2014 IEEE Symposium on Security and Privacy, 49-64, 2014 | 171 | 2014 |
MARCH: mobile augmented reality for cultural heritage O Choudary, V Charvillat, R Grigoras, P Gurdjos Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009 | 135 | 2009 |
Efficient, portable template attacks MO Choudary, MG Kuhn IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017 | 85 | 2017 |
Template attacks on different devices O Choudary, MG Kuhn Constructive Side-Channel Analysis and Secure Design: 5th International …, 2014 | 79 | 2014 |
Efficient stochastic methods: Profiled attacks beyond 8 bits MO Choudary, MG Kuhn Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 38 | 2015 |
Back to massey: Impressively fast, scalable and tight security evaluation tools MO Choudary, PG Popescu Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 36 | 2017 |
Security Analysis and Decryption of Filevault 2 O Choudary, F Gröbert, J Metz Advances in Digital Forensics IX 2013, 349-363, 2013 | 24* | 2013 |
The Smart Card Detective: a hand-held EMV interceptor OS Choudary Computer Laboratory MPhil thesis, 2010 | 23 | 2010 |
Be prepared: The EMV preplay attack M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson IEEE Security & Privacy 13 (2), 56-64, 2015 | 20 | 2015 |
Score-based vs. probability-based enumeration–a cautionary note MO Choudary, R Poussier, FX Standaert Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016 | 17 | 2016 |
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano Lecture Notes in Computer Science, 2011 | 15 | 2011 |
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys A Rădulescu, PG Popescu, MO Choudary IACR Transactions on Cryptographic Hardware and Embedded Systems, 886-905, 2022 | 14 | 2022 |
On the impact of sequence and time in rich media advertising B Baccot, O Choudary, R Grigoras, V Charvillat Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009 | 11 | 2009 |
Breaking Smartcards Using Power Analysis O Choudary | 10* | 2009 |
Secure opportunistic multipath key exchange S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 9 | 2018 |
Make noise and whisper: a solution to relay attacks O Choudary, F Stajano Lecture Notes in Computer Science, 2011 | 8 | 2011 |
Tight and scalable side-channel attack evaluations through asymptotically optimal Massey-like inequalities on guessing entropy A Tănăsescu, MO Choudary, O Rioul, PG Popescu Entropy 23 (11), 1538, 2021 | 6 | 2021 |
Efficient multivariate statistical techniques for extracting secrets from electronic devices MO Choudary University of Cambridge, Computer Laboratory, 2015 | 6 | 2015 |
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday) PG Popescu, MO Choudary 2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019 | 5 | 2019 |