Journal Paper
-
"Linked Fault Analysis"
Ali asghar Beigizad,
Hadi Soleimany,
Sara Zarei,
Hamed Ramzanipour
IEEE Transactions on Information Forensics and Security,
Vol. 19,
pp.632-645,
2024
-
"Exploiting statistical effective fault attack in a blind setting"
Navid Vafaei,
Hadi Soleimany,
Nasour Bagheri
IET Information Security,
Vol. 17,
pp.639-646,
2023
-
"Secure and Low-area Implementation of the AES Using FPGA"
MuhamadAli HajiSoltani,
Raziyeh Salarifard,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 14,
pp.93-99,
2022
-
"Modified Cache Template Attack on AES"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Scientia Iranica,
Vol. 29,
pp.1949-1956,
2022
-
"Modified Cache-Template Attack on AES"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Scientia Iranica,
Vol. 29,
pp.1949-1956,
2022
-
"SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers"
Nasour Bagheri,
Sadegh Sadeghi,
Prasanna Ravi,
Shivam Bhasin,
Hadi Soleimany
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2022,
pp.367-390,
2022
-
"Statistical Effective Fault Attacks: The Other Side of the Coin"
Navid Vafaei,
Sara Zarei,
Nasour Bagheri,
Maria Eichlseder,
Robert Primas,
Hadi Soleimany
IEEE Transactions on Information Forensics and Security,
Vol. 17,
pp.1855-1867,
2022
-
"Cross-VM cache attacks on Camellia"
Milad Seddigh,
Hadi Soleimany
Journal of Computer Virology and Hacking Techniques,
Vol. 18,
pp.91-99,
2021
-
"Enhanced cache attack on AES applicable on ARM-based devices with new operating systems"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Computer Networks,
Vol. 198,
2021
-
"Low-Latency Keccak at any Arbitrary Order"
Sara Zareei,
Aein Rezaei Shahmirzadi,
Hadi Soleimany,
Raziyeh Salarifard,
Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2021,
pp.388-411,
2021
-
"A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics"
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
Journal of Computer Virology and Hacking Techniques,
Vol. 18,
pp.141-146,
2021
-
"Practical Multiple Persistent Faults Analysis"
Hadi Soleimany,
Nasour Bagheri,
Hosein Hadipour,
Prasanna Ravi,
Shivam Bhasin,
Sara Mansouri
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2022,
pp.367-390,
2021
-
"Flush+Reload Attacks on SEED"
Milad Seddigh,
Hadi Soleimany
COMPUTER JOURNAL,
Vol. 65,
pp.2769-2779,
2021
-
"Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets"
Vahid Meraji,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 13,
pp.19-27,
2021
-
"Enhanced Flush+Reload Attack on AES"
Milad Seddigh,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 12,
pp.83-91,
2020
-
"A Framework for Faster Key Search Using Related-key Higher-order Differential Properties Applications to Agrasta"
Christoph Dobraunig,
Farokh lagha Moazami Goodarzi,
Christian Rechberger,
Hadi Soleimany
IET Information Security,
Vol. 14,
pp.202-209,
2020
-
"New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem"
Parinaz Mahdion,
Hadi Soleimany,
Pouya Habibi,
Farokh lagha Moazami Goodarzi
IET Information Security,
Vol. 14,
pp.151-156,
2020
-
"Cryptanalysis of Low-Data Instances of Full LowMCv2"
Christian Rechberger,
Hadi Soleimany,
Tyge Tiessen
IACR Transactions on Symmetric Cryptology,
Vol. 2018,
pp.163-181,
2018
-
"Impossible Differential Cryptanalysis on Deoxys-BC-256"
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 10,
pp.93-105,
2018
-
"Reflection Cryptanalysis of PRINCE-Like Ciphers"
Hadi Soleimany,
Céline Blondeau,
Xiaoli Yu,
Wenling Wu,
Kaisa Nyberg,
Huiling Zhang,
Lei Zhang,
Yanfeng Wang
JOURNAL OF CRYPTOLOGY,
Vol. 28,
pp.718-744,
2015
-
"Zero-correlation linear cryptanalysis of reduced-round LBlock"
Hadi Soleimany,
Kaisa Nyberg
DESIGNS CODES AND CRYPTOGRAPHY,
Vol. 73,
pp.683-698,
2014
-
"Self-similarity cryptanalysis of the block cipher ITUbee"
Hadi Soleimany
IET Information Security,
Vol. 9,
pp.179-184,
2014
-
""
Vahid Meraji,
Hadi Soleimany
Vol. 7,
pp.125-132,
2020
-
""
Sara Zareei,
Hadi Soleimany
Vol. 8,
pp.17-28,
2020
-
""
Fateme Azizi,
Hadi Soleimany
Vol. 10,
pp.69-80,
2020
-
""
Alizaded Javad,
Mohsen Seddighi ,
Hadi Soleimany
Vol. 8,
pp.51-62,
2020
-
""
Hadi Soleimany,
Alireza Mehrdad,
Saeideh Sadeghi,
Farokh lagha Moazami Goodarzi
Vol. 16,
pp.17-26,
2020
-
""
Esfahani Mahdi,
Hadi Soleimany,
Mohammad Reza Aref
Vol. 10,
pp.383-392,
2020
-
""
Hadi Soleimany,
Alireza Mehrdad
Vol. 7,
pp.69-79,
2019
-
""
Hadi Soleimany
Vol. 10,
pp.75-93,
2019
-
""
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
Vol. 14,
pp.31-40,
2019
-
""
Hadi Soleimany,
Mohammad Reza Sadeghi
Vol. 13,
pp.3-20,
2018
-
""
Hadi Soleimany,
Mohammad Beheshti Atashgah
pp.1-16,
2010
Conference Paper
-
"Breaking KASLR on Mobile Devices without Any Use of Cache Memory"
Milad Seddigh,
Mahdi Esfahani ,
Bhattacharya Sarani ,
Mohammad Reza Aref ,
Hadi Soleimany
Sixth Workshop on Attacks and Solutions in Hardware Security (ASHES 2022),
pp.45-54,
2022
-
""
Milad Seddigh,
Hadi Soleimany
27th Iranian Conference on Electrical Engineering ICEE2019,
2019
-
""
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
The 26th Iranian Conference on Electrical Engineering (ICEE 2018),
2018
-
""
Parinaz Mahdion,
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
The 26th Iranian Conference on Electrical Engineering (ICEE 2018),
2018
-
"Key Recovery Attack against 2.5-round pi -Cipher"
Hadi Soleimany
Fast Software Encryption 2016,
2016
-
"Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro"
Hadi Soleimany
Fast Software Encryption 2014,
2014
-
"Reflection Cryptanalysis of PRINCE-like Ciphers"
Hadi Soleimany,
Celine Blondeau,
Xiaoli Yu,
Wenling Wu,
Nyberg Kaisa,
Huiling Zhang,
Lei Zhang,
Yanfeng Wang
Fast Software Encryption 2013,
2013
-
"Improved related-key boomerang cryptanalysis of AES-256"
Hadi Soleimany,
Mohammadreza Aref,
Alireza Sharifi
International Conference on Information Science and Applications (ICISA) 2010,
2010
-
"Improved Related-Key Impossible Differential Attacks on 8-Round AES-256"
Hadi Soleimany,
Alireza Sharifi,
Aref Mohammadreza
International Zurich Seminar on Communications 2010,
2010
-
""
Ali Nouri khameneh,
Raziyeh Salarifard,
Hadi Soleimany
,
2020
-
""
Vahid Meraji,
Hadi Soleimany
16th International ISC Conference on Information Security and Cryptology (ISCISC'19),
pp.121-127,
2019
-
""
Mohammad Reza Sadeghi,
Hadi Soleimany
CSICC 2019,
pp.338-344,
2019
-
""
Vahid Meraji,
Hadi Soleimany
CSICC 2019,
pp.345-354,
2019
-
""
Parinaz Mahdion,
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
CSICC 2018,
pp.375-380,
2018
-
""
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
CSICC 2018,
pp.357-362,
2018
-
"Cryptanalysisi of 7-round AES-128"
Hadi Soleimany,
Sharifi Alireza,
Behnam Bahrak,
Aref Mohammadreza
International ISC Conference on Information Security and Cryptology 2010,
2010
-
"9-Round Attack on AES-256 by a 6-round property"
Alireza Sharifi,
Hadi Soleimany,
Mohammadreza Aref
18th Iranian Conference on Electrical Engineering,
2010