Zero-correlation linear cryptanalysis of reduced-round LBlock H Soleimany, K Nyberg Designs, codes and cryptography 73, 683-698, 2014 | 84 | 2014 |
Reflection cryptanalysis of PRINCE-like ciphers H Soleimany, C Blondeau, X Yu, W Wu, K Nyberg, H Zhang, L Zhang, ... Journal of Cryptology 28, 718-744, 2015 | 68 | 2015 |
Cryptanalysis of low-data instances of full LowMCv2 C Rechberger, H Soleimany, T Tiessen IACR Transactions on Symmetric Cryptology 2018 (3), 163-181, 2018 | 52 | 2018 |
Self‐similarity cryptanalysis of the block cipher ITUbee H Soleimany IET Information Security 9 (3), 179-184, 2015 | 19 | 2015 |
Impossible differential cryptanalysis on Deoxys-BC-256 F Moazami, H Soleimany Cryptology ePrint Archive, 2018 | 17 | 2018 |
Low-latency keccak at any arbitrary order S Zarei, AR Shahmirzadi, H Soleimany, R Salarifard, A Moradi IACR Transactions on Cryptographic Hardware and Embedded Systems, 388-411, 2021 | 14 | 2021 |
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro H Soleimany Fast Software Encryption, 2014 | 14 | 2014 |
Practical multiple persistent faults analysis H Soleimany, N Bagheri, H Hadipour, P Ravi, S Bhasin, S Mansouri Cryptology ePrint Archive, 2021 | 12 | 2021 |
Statistical effective fault attacks: the other side of the coin N Vafaei, S Zarei, N Bagheri, M Eichlseder, R Primas, H Soleimany IEEE Transactions on Information Forensics and Security 17, 1855-1867, 2022 | 11 | 2022 |
Key Recovery Attack Against 2.5-Round-Cipher C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ... International Conference on Fast Software Encryption, 535-553, 2016 | 11 | 2016 |
Improved related-key boomerang cryptanalysis of AES-256 H Soleimany, A Sharifi, M Aref 2010 international conference on information science and applications, 1-7, 2010 | 11 | 2010 |
SIPFA: statistical ineffective persistent faults analysis on feistel ciphers N Bagheri, S Sadeghi, P Ravi, S Bhasin, H Soleimany IACR Transactions on Cryptographic Hardware and Embedded Systems, 367-390, 2022 | 7 | 2022 |
Framework for faster key search using related‐key higher‐order differential<? show [AQ ID= Q1]?> properties: applications to Agrasta C Dobraunig, F Moazami, C Rechberger, H Soleimany IET Information Security 14 (2), 202-209, 2020 | 7 | 2020 |
Enhanced flush+ reload attack on AES M Seddigh, H Soleimany Cryptology ePrint Archive, 2020 | 5 | 2020 |
Modified cache template attack on AES M Esfahani, H Soleimany, MR Aref Scientia Iranica 29 (4), 1949-1956, 2022 | 4 | 2022 |
Enhanced cache attack on AES applicable on ARM-based devices with new operating systems M Esfahani, H Soleimany, MR Aref Computer Networks 198, 108407, 2021 | 4 | 2021 |
9-round attack on AES-256 by a 6-round property A Sharifi, H Soleimany, M Aref 2010 18th Iranian Conference on Electrical Engineering, 226-230, 2010 | 3 | 2010 |
Efficient accelerator for NTT-based polynomial multiplication R Salarifard, H Soleimany Cryptology ePrint Archive, 2023 | 2 | 2023 |
Breaking KASLR on Mobile Devices without Any Use of Cache Memory M Seddigh, M Esfahani, S Bhattacharya, MR Aref, H Soleimany Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware …, 2022 | 2 | 2022 |
Flush+ Reload Attacks on SEED M Seddigh, H Soleimany The Computer Journal 65 (10), 2769-2779, 2022 | 2 | 2022 |