Hadi Soleimany

Associate Professor

Update: 2024-12-26

Hadi Soleimany

Cyberspace Research Institute /

Journal Paper

  1. "Linked Fault Analysis"
    Ali asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour
    IEEE Transactions on Information Forensics and Security, Vol. 19, pp.632-645, 2024
  2. "Exploiting statistical effective fault attack in a blind setting"
    Navid Vafaei, Hadi Soleimany, Nasour Bagheri
    IET Information Security, Vol. 17, pp.639-646, 2023
  3. "Secure and Low-area Implementation of the AES Using FPGA"
    MuhamadAli HajiSoltani, Raziyeh Salarifard, Hadi Soleimany
    ISeCure-ISC International Journal of Information Security, Vol. 14, pp.93-99, 2022
  4. "Modified Cache Template Attack on AES"
    Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
    Scientia Iranica, Vol. 29, pp.1949-1956, 2022
  5. "Modified Cache-Template Attack on AES"
    Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
    Scientia Iranica, Vol. 29, pp.1949-1956, 2022
  6. "SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers"
    Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
    IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, pp.367-390, 2022
  7. "Statistical Effective Fault Attacks: The Other Side of the Coin"
    Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany
    IEEE Transactions on Information Forensics and Security, Vol. 17, pp.1855-1867, 2022
  8. "Cross-VM cache attacks on Camellia"
    Milad Seddigh, Hadi Soleimany
    Journal of Computer Virology and Hacking Techniques, Vol. 18, pp.91-99, 2021
  9. "Enhanced cache attack on AES applicable on ARM-based devices with new operating systems"
    Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref
    Computer Networks, Vol. 198, 2021
  10. "Low-Latency Keccak at any Arbitrary Order"
    Sara Zareei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziyeh Salarifard, Amir Moradi
    IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, pp.388-411, 2021
  11. "A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics"
    Hadi Soleimany, Farokh lagha Moazami Goodarzi
    Journal of Computer Virology and Hacking Techniques, Vol. 18, pp.141-146, 2021
  12. "Practical Multiple Persistent Faults Analysis"
    Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
    IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, pp.367-390, 2021
  13. "Flush+Reload Attacks on SEED"
    Milad Seddigh, Hadi Soleimany
    COMPUTER JOURNAL, Vol. 65, pp.2769-2779, 2021
  14. "Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets"
    Vahid Meraji, Hadi Soleimany
    ISeCure-ISC International Journal of Information Security, Vol. 13, pp.19-27, 2021
  15. "Enhanced Flush+Reload Attack on AES"
    Milad Seddigh, Hadi Soleimany
    ISeCure-ISC International Journal of Information Security, Vol. 12, pp.83-91, 2020
  16. "A Framework for Faster Key Search Using Related-key Higher-order Differential Properties Applications to Agrasta"
    Christoph Dobraunig, Farokh lagha Moazami Goodarzi, Christian Rechberger, Hadi Soleimany
    IET Information Security, Vol. 14, pp.202-209, 2020
  17. "New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem"
    Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokh lagha Moazami Goodarzi
    IET Information Security, Vol. 14, pp.151-156, 2020
  18. "Cryptanalysis of Low-Data Instances of Full LowMCv2"
    Christian Rechberger, Hadi Soleimany, Tyge Tiessen
    IACR Transactions on Symmetric Cryptology, Vol. 2018, pp.163-181, 2018
  19. "Impossible Differential Cryptanalysis on Deoxys-BC-256"
    Alireza Mehrdad, Farokh lagha Moazami Goodarzi, Hadi Soleimany
    ISeCure-ISC International Journal of Information Security, Vol. 10, pp.93-105, 2018
  20. "Reflection Cryptanalysis of PRINCE-Like Ciphers"
    Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang
    JOURNAL OF CRYPTOLOGY, Vol. 28, pp.718-744, 2015
  21. "Zero-correlation linear cryptanalysis of reduced-round LBlock"
    Hadi Soleimany, Kaisa Nyberg
    DESIGNS CODES AND CRYPTOGRAPHY, Vol. 73, pp.683-698, 2014
  22. "Self-similarity cryptanalysis of the block cipher ITUbee"
    Hadi Soleimany
    IET Information Security, Vol. 9, pp.179-184, 2014
  23. ""
    Vahid Meraji, Hadi Soleimany
    Vol. 7, pp.125-132, 2020
  24. ""
    Sara Zareei, Hadi Soleimany
    Vol. 8, pp.17-28, 2020
  25. ""
    Fateme Azizi, Hadi Soleimany
    Vol. 10, pp.69-80, 2020
  26. ""
    Alizaded Javad, Mohsen Seddighi , Hadi Soleimany
    Vol. 8, pp.51-62, 2020
  27. ""
    Hadi Soleimany, Alireza Mehrdad, Saeideh Sadeghi, Farokh lagha Moazami Goodarzi
    Vol. 16, pp.17-26, 2020
  28. ""
    Esfahani Mahdi, Hadi Soleimany, Mohammad Reza Aref
    Vol. 10, pp.383-392, 2020
  29. ""
    Hadi Soleimany, Alireza Mehrdad
    Vol. 7, pp.69-79, 2019
  30. ""
    Hadi Soleimany
    Vol. 10, pp.75-93, 2019
  31. ""
    Hadi Soleimany, Farokh lagha Moazami Goodarzi
    Vol. 14, pp.31-40, 2019
  32. ""
    Hadi Soleimany, Mohammad Reza Sadeghi
    Vol. 13, pp.3-20, 2018
  33. ""
    Hadi Soleimany, Mohammad Beheshti Atashgah
    pp.1-16, 2010

Conference Paper

  1. "Breaking KASLR on Mobile Devices without Any Use of Cache Memory"
    Milad Seddigh, Mahdi Esfahani , Bhattacharya Sarani , Mohammad Reza Aref , Hadi Soleimany
    Sixth Workshop on Attacks and Solutions in Hardware Security (ASHES 2022), pp.45-54, 2022
  2. ""
    Milad Seddigh, Hadi Soleimany
    27th Iranian Conference on Electrical Engineering ICEE2019, 2019
  3. ""
    Alireza Mehrdad, Farokh lagha Moazami Goodarzi, Hadi Soleimany
    The 26th Iranian Conference on Electrical Engineering (ICEE 2018), 2018
  4. ""
    Parinaz Mahdion, Hadi Soleimany, Farokh lagha Moazami Goodarzi
    The 26th Iranian Conference on Electrical Engineering (ICEE 2018), 2018
  5. "Key Recovery Attack against 2.5-round pi -Cipher"
    Hadi Soleimany
    Fast Software Encryption 2016, 2016
  6. "Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro"
    Hadi Soleimany
    Fast Software Encryption 2014, 2014
  7. "Reflection Cryptanalysis of PRINCE-like Ciphers"
    Hadi Soleimany, Celine Blondeau, Xiaoli Yu, Wenling Wu, Nyberg Kaisa, Huiling Zhang, Lei Zhang, Yanfeng Wang
    Fast Software Encryption 2013, 2013
  8. "Improved related-key boomerang cryptanalysis of AES-256"
    Hadi Soleimany, Mohammadreza Aref, Alireza Sharifi
    International Conference on Information Science and Applications (ICISA) 2010, 2010
  9. "Improved Related-Key Impossible Differential Attacks on 8-Round AES-256"
    Hadi Soleimany, Alireza Sharifi, Aref Mohammadreza
    International Zurich Seminar on Communications 2010, 2010
  10. ""
    Ali Nouri khameneh, Raziyeh Salarifard, Hadi Soleimany
    , 2020
  11. ""
    Vahid Meraji, Hadi Soleimany
    16th International ISC Conference on Information Security and Cryptology (ISCISC'19), pp.121-127, 2019
  12. ""
    Mohammad Reza Sadeghi, Hadi Soleimany
    CSICC 2019, pp.338-344, 2019
  13. ""
    Vahid Meraji, Hadi Soleimany
    CSICC 2019, pp.345-354, 2019
  14. ""
    Parinaz Mahdion, Hadi Soleimany, Farokh lagha Moazami Goodarzi
    CSICC 2018, pp.375-380, 2018
  15. ""
    Alireza Mehrdad, Farokh lagha Moazami Goodarzi, Hadi Soleimany
    CSICC 2018, pp.357-362, 2018
  16. "Cryptanalysisi of 7-round AES-128"
    Hadi Soleimany, Sharifi Alireza, Behnam Bahrak, Aref Mohammadreza
    International ISC Conference on Information Security and Cryptology 2010, 2010
  17. "9-Round Attack on AES-256 by a 6-round property"
    Alireza Sharifi, Hadi Soleimany, Mohammadreza Aref
    18th Iranian Conference on Electrical Engineering, 2010