Marios Omar Choudary
Marios Omar Choudary
Junior lecturer, Politehnica Bucharest
Verified email at - Homepage
Cited by
Cited by
Efficient Template Attacks
O Choudary, M G. Kuhn
CARDIS 2013, 2013
Chip and Skim: cloning EMV cards with the pre-play attack
M Bond, O Choudary, SJ Murdoch, S Skorobogatov, R Anderson
2014 IEEE Symposium on Security and Privacy, 49-64, 2014
MARCH: mobile augmented reality for cultural heritage
O Choudary, V Charvillat, R Grigoras, P Gurdjos
Proceedings of the 17th ACM international conference on Multimedia, 1023-1024, 2009
Template attacks on different devices
O Choudary, MG Kuhn
International Workshop on Constructive Side-Channel Analysis and Secure …, 2014
Efficient, portable template attacks
MO Choudary, MG Kuhn
IEEE Transactions on Information Forensics and Security 13 (2), 490-501, 2017
The Smart Card Detective: a hand-held EMV interceptor
OS Choudary
Computer Laboratory MPhil thesis, 2010
Back to massey: Impressively fast, scalable and tight security evaluation tools
MO Choudary, PG Popescu
International Conference on Cryptographic Hardware and Embedded Systems, 367-386, 2017
Efficient stochastic methods: Profiled attacks beyond 8 bits
MO Choudary, MG Kuhn
International Conference on Smart Card Research and Advanced Applications …, 2014
Security Analysis and Decryption of Filevault 2
O Choudary, F Gröbert, J Metz
Advances in Digital Forensics IX 2013, 349-363, 2013
Be prepared: The emv preplay attack
M Bond, MO Choudary, SJ Murdoch, S Skorobogatov, R Anderson
IEEE Security & Privacy 13 (2), 56-64, 2015
Might Financial Cryptography Kill Financial Innovation?–The Curious Case of EMV
R Anderson, M Bond, O Choudary, SJ Murdoch, F Stajano
Lecture Notes in Computer Science, 2011
On the impact of sequence and time in rich media advertising
B Baccot, O Choudary, R Grigoras, V Charvillat
Proceedings of the 17th ACM international conference on Multimedia, 849-852, 2009
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
International Conference on Cryptology in India, 137-152, 2016
Breaking Smartcards Using Power Analysis
O Choudary
Make noise and whisper: a solution to relay attacks
O Choudary, F Stajano
Lecture Notes in Computer Science, 2011
Secure opportunistic multipath key exchange
S Costea, MO Choudary, D Gucea, B Tackmann, C Raiciu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Efficient multivariate statistical techniques for extracting secrets from electronic devices
MO Choudary
University of Cambridge, Computer Laboratory, 2015
A user study on rich media mobile guide applications
O Choudary, B Baccot, R Grigoras, V Charvillat
9th Workshop on Multimedia Metadata (WMM’09) 441, 2009
Mobile guide applications using representative visualizations
O Choudary, V Charvillat, R Grigoras
Proceedings of the 16th ACM international conference on Multimedia, 901-904, 2008
Refinement of Massey Inequality:(To Nicolae Ţăpuş on his 70th birthday)
PG Popescu, MO Choudary
2019 IEEE International Symposium on Information Theory (ISIT), 495-496, 2019
The system can't perform the operation now. Try again later.
Articles 1–20