关注
Hadi Soleimany
标题
引用次数
引用次数
年份
Zero-correlation linear cryptanalysis of reduced-round LBlock
H Soleimany, K Nyberg
Designs, codes and cryptography 73, 683-698, 2014
842014
Reflection cryptanalysis of PRINCE-like ciphers
H Soleimany, C Blondeau, X Yu, W Wu, K Nyberg, H Zhang, L Zhang, ...
Journal of Cryptology 28, 718-744, 2015
682015
Cryptanalysis of low-data instances of full LowMCv2
C Rechberger, H Soleimany, T Tiessen
IACR Transactions on Symmetric Cryptology 2018 (3), 163-181, 2018
522018
Self‐similarity cryptanalysis of the block cipher ITUbee
H Soleimany
IET Information Security 9 (3), 179-184, 2015
192015
Impossible differential cryptanalysis on Deoxys-BC-256
F Moazami, H Soleimany
Cryptology ePrint Archive, 2018
172018
Low-latency keccak at any arbitrary order
S Zarei, AR Shahmirzadi, H Soleimany, R Salarifard, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 388-411, 2021
142021
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
H Soleimany
Fast Software Encryption, 2014
142014
Practical multiple persistent faults analysis
H Soleimany, N Bagheri, H Hadipour, P Ravi, S Bhasin, S Mansouri
Cryptology ePrint Archive, 2021
122021
Statistical effective fault attacks: the other side of the coin
N Vafaei, S Zarei, N Bagheri, M Eichlseder, R Primas, H Soleimany
IEEE Transactions on Information Forensics and Security 17, 1855-1867, 2022
112022
Key Recovery Attack Against 2.5-Round-Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
112016
Improved related-key boomerang cryptanalysis of AES-256
H Soleimany, A Sharifi, M Aref
2010 international conference on information science and applications, 1-7, 2010
112010
SIPFA: statistical ineffective persistent faults analysis on feistel ciphers
N Bagheri, S Sadeghi, P Ravi, S Bhasin, H Soleimany
IACR Transactions on Cryptographic Hardware and Embedded Systems, 367-390, 2022
72022
Framework for faster key search using related‐key higher‐order differential<? show [AQ ID= Q1]?> properties: applications to Agrasta
C Dobraunig, F Moazami, C Rechberger, H Soleimany
IET Information Security 14 (2), 202-209, 2020
72020
Enhanced flush+ reload attack on AES
M Seddigh, H Soleimany
Cryptology ePrint Archive, 2020
52020
Modified cache template attack on AES
M Esfahani, H Soleimany, MR Aref
Scientia Iranica 29 (4), 1949-1956, 2022
42022
Enhanced cache attack on AES applicable on ARM-based devices with new operating systems
M Esfahani, H Soleimany, MR Aref
Computer Networks 198, 108407, 2021
42021
9-round attack on AES-256 by a 6-round property
A Sharifi, H Soleimany, M Aref
2010 18th Iranian Conference on Electrical Engineering, 226-230, 2010
32010
Efficient accelerator for NTT-based polynomial multiplication
R Salarifard, H Soleimany
Cryptology ePrint Archive, 2023
22023
Breaking KASLR on Mobile Devices without Any Use of Cache Memory
M Seddigh, M Esfahani, S Bhattacharya, MR Aref, H Soleimany
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware …, 2022
22022
Flush+ Reload Attacks on SEED
M Seddigh, H Soleimany
The Computer Journal 65 (10), 2769-2779, 2022
22022
系统目前无法执行此操作,请稍后再试。
文章 1–20