Journal Paper
-
"Breaking KASLR on mobile devices without any use of cache memory (extended version)"
Milad Seddigh,
Mahdi Esfahani,
Sarani Bhattacharya,
Mohammad Reza Aref,
Hadi Soleimany
Journal of Cryptographic Engineering,
Vol. 14,
pp.281-294,
2024
-
"Linked Fault Analysis"
Ali asghar Beigizad,
Hadi Soleimany,
Sara Zarei,
Hamed Ramzanipour
IEEE Transactions on Information Forensics and Security,
Vol. 19,
pp.632-645,
2024
-
"Exploiting statistical effective fault attack in a blind setting"
Navid Vafaei,
Hadi Soleimany,
Nasour Bagheri
IET Information Security,
Vol. 17,
pp.639-646,
2023
-
"Modified Cache-Template Attack on AES"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Scientia Iranica,
Vol. 29,
pp.1949-1956,
2022
-
"SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers"
Nasour Bagheri,
Sadegh Sadeghi,
Prasanna Ravi,
Shivam Bhasin,
Hadi Soleimany
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2022,
pp.367-390,
2022
-
"Secure and Low-area Implementation of the AES Using FPGA"
MuhamadAli HajiSoltani,
Raziyeh Salarifard,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 14,
pp.93-99,
2022
-
"Modified Cache Template Attack on AES"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Scientia Iranica,
Vol. 29,
pp.1949-1956,
2022
-
"Statistical Effective Fault Attacks: The Other Side of the Coin"
Navid Vafaei,
Sara Zarei,
Nasour Bagheri,
Maria Eichlseder,
Robert Primas,
Hadi Soleimany
IEEE Transactions on Information Forensics and Security,
Vol. 17,
pp.1855-1867,
2022
-
"Enhanced cache attack on AES applicable on ARM-based devices with new operating systems"
Mahdi Esfahani,
Hadi Soleimany,
Mohammad Reza Aref
Computer Networks,
Vol. 198,
2021
-
"Low-Latency Keccak at any Arbitrary Order"
Sara Zareei,
Aein Rezaei Shahmirzadi,
Hadi Soleimany,
Raziyeh Salarifard,
Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2021,
pp.388-411,
2021
-
"Cross-VM cache attacks on Camellia"
Milad Seddigh,
Hadi Soleimany
Journal of Computer Virology and Hacking Techniques,
Vol. 18,
pp.91-99,
2021
-
"Practical Multiple Persistent Faults Analysis"
Hadi Soleimany,
Nasour Bagheri,
Hosein Hadipour,
Prasanna Ravi,
Shivam Bhasin,
Sara Mansouri
IACR Transactions on Cryptographic Hardware and Embedded Systems,
Vol. 2022,
pp.367-390,
2021
-
"A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics"
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
Journal of Computer Virology and Hacking Techniques,
Vol. 18,
pp.141-146,
2021
-
"Flush+Reload Attacks on SEED"
Milad Seddigh,
Hadi Soleimany
COMPUTER JOURNAL,
Vol. 65,
pp.2769-2779,
2021
-
"Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets"
Vahid Meraji,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 13,
pp.19-27,
2021
-
"Enhanced Flush+Reload Attack on AES"
Milad Seddigh,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 12,
pp.83-91,
2020
-
"A Framework for Faster Key Search Using Related-key Higher-order Differential Properties Applications to Agrasta"
Christoph Dobraunig,
Farokh lagha Moazami Goodarzi,
Christian Rechberger,
Hadi Soleimany
IET Information Security,
Vol. 14,
pp.202-209,
2020
-
"New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem"
Parinaz Mahdion,
Hadi Soleimany,
Pouya Habibi,
Farokh lagha Moazami Goodarzi
IET Information Security,
Vol. 14,
pp.151-156,
2020
-
"Impossible Differential Cryptanalysis on Deoxys-BC-256"
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
ISeCure-ISC International Journal of Information Security,
Vol. 10,
pp.93-105,
2018
-
"Cryptanalysis of Low-Data Instances of Full LowMCv2"
Christian Rechberger,
Hadi Soleimany,
Tyge Tiessen
IACR Transactions on Symmetric Cryptology,
Vol. 2018,
pp.163-181,
2018
-
"Reflection Cryptanalysis of PRINCE-Like Ciphers"
Hadi Soleimany,
Céline Blondeau,
Xiaoli Yu,
Wenling Wu,
Kaisa Nyberg,
Huiling Zhang,
Lei Zhang,
Yanfeng Wang
JOURNAL OF CRYPTOLOGY,
Vol. 28,
pp.718-744,
2015
-
"Zero-correlation linear cryptanalysis of reduced-round LBlock"
Hadi Soleimany,
Kaisa Nyberg
DESIGNS CODES AND CRYPTOGRAPHY,
Vol. 73,
pp.683-698,
2014
-
"Self-similarity cryptanalysis of the block cipher ITUbee"
Hadi Soleimany
IET Information Security,
Vol. 9,
pp.179-184,
2014
-
""
Vahid Meraji,
Hadi Soleimany
Vol. 7,
pp.125-132,
2020
-
""
Hadi Soleimany,
Alireza Mehrdad,
Saeideh Sadeghi,
Farokh lagha Moazami Goodarzi
Vol. 16,
pp.17-26,
2020
-
""
Sara Zareei,
Hadi Soleimany
Vol. 8,
pp.17-28,
2020
-
""
Alizaded Javad,
Mohsen Seddighi ,
Hadi Soleimany
Vol. 8,
pp.51-62,
2020
-
""
Esfahani Mahdi,
Hadi Soleimany,
Mohammad Reza Aref
Vol. 10,
pp.383-392,
2020
-
""
Fateme Azizi,
Hadi Soleimany
Vol. 10,
pp.69-80,
2020
-
""
Hadi Soleimany
Vol. 10,
pp.75-93,
2019
-
""
Hadi Soleimany,
Alireza Mehrdad
Vol. 7,
pp.69-79,
2019
-
""
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
Vol. 14,
pp.31-40,
2019
-
""
Hadi Soleimany,
Mohammad Reza Sadeghi
Vol. 13,
pp.3-20,
2018
-
""
Hadi Soleimany,
Mohammad Beheshti Atashgah
pp.1-16,
2010
Conference Paper
-
"Breaking KASLR on Mobile Devices without Any Use of Cache Memory"
Milad Seddigh,
Mahdi Esfahani ,
Bhattacharya Sarani ,
Mohammad Reza Aref ,
Hadi Soleimany
Sixth Workshop on Attacks and Solutions in Hardware Security (ASHES 2022),
pp.45-54,
2022
-
""
Milad Seddigh,
Hadi Soleimany
27th Iranian Conference on Electrical Engineering ICEE2019,
2019
-
""
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
The 26th Iranian Conference on Electrical Engineering (ICEE 2018),
2018
-
""
Parinaz Mahdion,
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
The 26th Iranian Conference on Electrical Engineering (ICEE 2018),
2018
-
"Key Recovery Attack against 2.5-round pi -Cipher"
Hadi Soleimany
Fast Software Encryption 2016,
2016
-
"Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro"
Hadi Soleimany
Fast Software Encryption 2014,
2014
-
"Reflection Cryptanalysis of PRINCE-like Ciphers"
Hadi Soleimany,
Celine Blondeau,
Xiaoli Yu,
Wenling Wu,
Nyberg Kaisa,
Huiling Zhang,
Lei Zhang,
Yanfeng Wang
Fast Software Encryption 2013,
2013
-
"Improved related-key boomerang cryptanalysis of AES-256"
Hadi Soleimany,
Mohammadreza Aref,
Alireza Sharifi
International Conference on Information Science and Applications (ICISA) 2010,
2010
-
"Improved Related-Key Impossible Differential Attacks on 8-Round AES-256"
Hadi Soleimany,
Alireza Sharifi,
Aref Mohammadreza
International Zurich Seminar on Communications 2010,
2010
-
""
Ali Nouri khameneh,
Raziyeh Salarifard,
Hadi Soleimany
,
2020
-
""
Vahid Meraji,
Hadi Soleimany
16th International ISC Conference on Information Security and Cryptology (ISCISC'19),
pp.121-127,
2019
-
""
Mohammad Reza Sadeghi,
Hadi Soleimany
CSICC 2019,
pp.338-344,
2019
-
""
Vahid Meraji,
Hadi Soleimany
CSICC 2019,
pp.345-354,
2019
-
""
Parinaz Mahdion,
Hadi Soleimany,
Farokh lagha Moazami Goodarzi
CSICC 2018,
pp.375-380,
2018
-
""
Alireza Mehrdad,
Farokh lagha Moazami Goodarzi,
Hadi Soleimany
CSICC 2018,
pp.357-362,
2018
-
"Cryptanalysisi of 7-round AES-128"
Hadi Soleimany,
Sharifi Alireza,
Behnam Bahrak,
Aref Mohammadreza
International ISC Conference on Information Security and Cryptology 2010,
2010
-
"9-Round Attack on AES-256 by a 6-round property"
Alireza Sharifi,
Hadi Soleimany,
Mohammadreza Aref
18th Iranian Conference on Electrical Engineering,
2010