Follow
Thorben Moos
Title
Cited by
Cited by
Year
Glitch-resistant masking revisited-or why proofs in the robust probing model are needed
T Moos, A Moradi, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (2 …, 2019
882019
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
T Moos, F Wegener, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 552-598, 2021
68*2021
Static power side-channel analysis—An investigation of measurement factors
T Moos, A Moradi, B Richter
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (2), 376-389, 2019
46*2019
The SPEEDY Family of Block Ciphers-Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
G Leander, T Moos, A Moradi, S Rasoolzadeh
IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 (4 …, 2021
422021
Static power side-channel analysis of a threshold implementation prototype chip
T Moos, A Moradi, B Richter
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
302017
Let’s take it offline: Boosting brute-force attacks on iPhone’s user authentication through SCA
O Lisovets, D Knichel, T Moos, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 496-519, 2021
282021
Side-channel hardware trojan for provably-secure SCA-protected implementations
S Ghandali, T Moos, A Moradi, C Paar
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (6 …, 2020
252020
PRINCEv2: more security for (almost) no overhead
D Božilov, M Eichlseder, M Knežević, B Lambin, G Leander, T Moos, ...
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
232021
Exploring the effect of device aging on static power analysis attacks
N Karimi, T Moos, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (3 …, 2019
232019
Static power SCA of sub-100 nm CMOS asics and the insecurity of masking schemes in low-noise environments
T Moos
IACR Transactions on Cryptographic Hardware and Embedded Systems, 202-232, 2019
222019
Attack detection method, attack detection device and bus system for a motor vehicle
O Hartkopp, T Moos
US Patent 11,063,970, 2021
192021
Unrolled cryptography on silicon: a physical security analysis
T Moos
IACR Transactions on Cryptographic Hardware and Embedded Systems, 416-442, 2020
112020
Effective and efficient masking with low noise using small-mersenne-prime ciphers
L Masure, P Méaux, T Moos, FX Standaert
Annual International Conference on the Theory and Applications of …, 2023
92023
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
E Puschner, T Moos, S Becker, C Kison, A Moradi, C Paar
2023 IEEE Symposium on Security and Privacy (SP), 56-74, 2023
82023
Beware of insufficient redundancy: an experimental evaluation of code-based FI countermeasures
T Bartkewitz, S Bettendorf, T Moos, A Moradi, F Schellenberg
IACR Transactions on Cryptographic Hardware and Embedded Systems, 438-462, 2022
82022
BSPL: Balanced Static Power Logic
B Fadaeinia, T Moos, A Moradi
Cryptology ePrint Archive, 2020
82020
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
G Cassiers, L Masure, C Momin, T Moos, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (2 …, 2023
72023
On the easiness of turning higher-order leakages into first-order
T Moos, A Moradi
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
72017
Countermeasures against static power attacks:–comparing exhaustive logic balancing and other protection schemes in 28 nm cmos–
T Moos, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 780-805, 2021
62021
Combined private circuits-combined security refurbished
J Feldtkeller, T Güneysu, T Moos, J Richter-Brockmann, S Saha, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20