Follow
Amir Moradi
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
6432016
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
5652011
Leakage assessment methodology: A clear roadmap for side-channel evaluations
T Schneider, A Moradi
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
405*2015
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
3972008
On the vulnerability of FPGA bitstream encryption against power analysis attacks: Extracting keys from Xilinx Virtex-II FPGAs
A Moradi, A Barenghi, T Kasper, C Paar
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2892011
Correlation-enhanced power analysis collision attack
A Moradi, O Mischke, T Eisenbarth
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
2592010
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24, 322-345, 2011
2382011
A generalized method of differential fault attack against AES cryptosystem
A Moradi, MTM Shalmani, M Salmasizadeh
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
2232006
Generic side-channel countermeasures for reconfigurable devices
T Güneysu, A Moradi
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
1952011
An inside job: Remote power analysis attacks on FPGAs
F Schellenberg, DRE Gnad, A Moradi, MB Tahoori
IEEE Design & Test 38 (3), 58-66, 2021
1602021
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
C Beierle, G Leander, A Moradi, S Rasoolzadeh
IACR Transactions on Symmetric Cryptology 2019 (1), 5-45, 2019
1222019
Black-box side-channel attacks highlight the importance of countermeasures: An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
A Moradi, M Kasper, C Paar
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
1172012
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
1162016
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering
A Moradi, D Oswald, C Paar, P Swierczynski
Proceedings of the ACM/SIGDA international symposium on Field programmable …, 2013
1152013
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
A Moradi, T Schneider
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
912016
Side-Channel Leakage through Static Power: Should We Care about in Practice?
A Moradi
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
902014
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
M Kasper, T Kasper, A Moradi, C Paar
Progress in Cryptology–AFRICACRYPT 2009: Second International Conference on …, 2009
872009
On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting
A Moradi, O Mischke, C Paar, Y Li, K Ohta, K Sakiyama
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
852011
Leakage detection with the x2-test
A Moradi, B Richter, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-237, 2018
842018
Moments-correlating DPA
A Moradi, FX Standaert
Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, 5-15, 2016
842016
The system can't perform the operation now. Try again later.
Articles 1–20