What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Amir Moradi
Google Scholar
ORCID:
0000-0002-4032-7433
96
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain.
Sergej Meschkov
Daniel Lammers
Mehdi B. Tahoori
Amir Moradi
2025
journals/tches
Fault Injection Evaluation with Statistical Analysis How to Deal with Nearly Fabricated Large Circuits.
Felix Uhle
Nicolai Müller
Amir Moradi
2025
journals/tches
Constant-Cycle Hardware Private Circuits.
Daniel Lammers
Nicolai Müller
Siemen Dhooghe
Amir Moradi
2024
journals/tches
Another Evidence to not Employ Customized Masked Hardware Identifying and Fixing Flaws in SCARV.
Felix Uhle
Florian Stolz
Amir Moradi
2024
journals/tches
Robust but Relaxed Probing Model.
Nicolai Müller
Amir Moradi
2024
journals/tches
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing.
Maik Ender
Felix Hahn
Marc Fyrbiak
Amir Moradi
Christof Paar
2024
journals/tches
Static Leakage in Dual-Rail Precharge Logics.
Bijan Fadaeinia
Thorben Moos
Amir Moradi
2024
journals/tches
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL.
Nicolai Müller
Daniel Lammers
Amir Moradi
2024
journals/tches
Automated Generation of Fault-Resistant Circuits.
Nicolai Müller
Amir Moradi
2024
journals/tches
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software.
Jannik Zeitschner
Amir Moradi
2024
journals/cic
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue.
Gaëtan Cassiers
Loïc Masure
Charles Momin
Thorben Moos
Amir Moradi
François-Xavier Standaert
2023
journals/tches
PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries.
Jannik Zeitschner
Nicolai Müller
Amir Moradi
2023
journals/tches
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions.
Aein Rezaei Shahmirzadi
Siemen Dhooghe
Amir Moradi
2023
journals/tches
Deep Learning Side-Channel Collision Attack.
Marvin Staib
Amir Moradi
2023
conf/ccs
A Thorough Evaluation of RAMBAM.
Daniel Lammers
Amir Moradi
Nicolai Müller
Aein Rezaei Shahmirzadi
2023
conf/sp
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.
Endres Puschner
Thorben Moos
Steffen Becker
Christian Kison
Amir Moradi
Christof Paar
2022
journals/tches
Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits.
Nicolai Müller
David Knichel
Pascal Sasdrich
Amir Moradi
2022
journals/tches
Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures.
Timo Bartkewitz
Sven Bettendorf
Thorben Moos
Amir Moradi
Falk Schellenberg
2022
journals/tches
Randomness Optimization for Gadget Compositions in Higher-Order Masking.
Jakob Feldtkeller
David Knichel
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2022
journals/tches
Automated Generation of Masked Hardware.
David Knichel
Amir Moradi
Nicolai Müller
Pascal Sasdrich
2022
journals/tches
PROLEAD A Probing-Based Hardware Leakage Detection Tool.
Nicolai Müller
Amir Moradi
2022
journals/tches
Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks.
David Knichel
Amir Moradi
2022
journals/tches
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency.
Tim Beyne
Siemen Dhooghe
Amir Moradi
Aein Rezaei Shahmirzadi
2022
journals/tches
Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets.
David Knichel
Pascal Sasdrich
Amir Moradi
2022
conf/ccs
Low-Latency Hardware Private Circuits.
David Knichel
Amir Moradi
2022
conf/ccs
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES.
Siemen Dhooghe
Aein Rezaei Shahmirzadi
Amir Moradi
2022
conf/host
Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines.
Anita Aghaie
Amir Moradi
Johannes Tobisch
Nils Wisiol
2021
journals/tches
Low-Latency Keccak at any Arbitrary Order.
Sara Zarei
Aein Rezaei Shahmirzadi
Hadi Soleimany
Raziyeh Salarifard
Amir Moradi
2021
journals/tches
Inconsistency of Simulation and Practice in Delay-based Strong PUFs.
Anita Aghaie
Amir Moradi
2021
journals/tches
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA.
Oleksiy Lisovets
David Knichel
Thorben Moos
Amir Moradi
2021
journals/tches
Second-Order SCA Security with almost no Fresh Randomness.
Aein Rezaei Shahmirzadi
Amir Moradi
2021
journals/tches
New First-Order Secure AES Performance Records.
Aein Rezaei Shahmirzadi
Dusan Bozilov
Amir Moradi
2021
journals/tches
DL-LA: Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.
Thorben Moos
Felix Wegener
Amir Moradi
2021
journals/tches
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures.
Gregor Leander
Thorben Moos
Amir Moradi
Shahram Rasoolzadeh
2021
journals/tches
Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.
Aein Rezaei Shahmirzadi
Amir Moradi
2021
journals/tches
FIVER - Robust Verification of Countermeasures against Fault Injections.
Jan Richter-Brockmann
Aein Rezaei Shahmirzadi
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2021
journals/tches
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -.
Thorben Moos
Amir Moradi
2021
conf/sp
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Thilo Krachenfels
Fatemeh Ganji
Amir Moradi
Shahin Tajik
Jean-Pierre Seifert
2020
journals/tosc
SKINNY-AEAD and SKINNY-Hash.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2020
journals/tifs
TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions.
Anita Aghaie
Amir Moradi
2020
journals/joc
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version.
Felix Wegener
Lauren De Meyer
Amir Moradi
2020
conf/uss
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs.
Maik Ender
Amir Moradi
Christof Paar
2020
conf/host
Cryptographic Fault Diagnosis using VerFI.
Victor Arribas
Felix Wegener
Amir Moradi
Svetla Nikova
2020
conf/asiacrypt
SILVER - Statistical Independence and Leakage Verification.
David Knichel
Pascal Sasdrich
Amir Moradi
2019
journals/tches
Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed.
Thorben Moos
Amir Moradi
Tobias Schneider
François-Xavier Standaert
2019
journals/tches
Exploring the Effect of Device Aging on Static Power Analysis Attacks.
Naghmeh Karimi
Thorben Moos
Amir Moradi
2019
journals/tosc
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.
Christof Beierle
Gregor Leander
Amir Moradi
Shahram Rasoolzadeh
2018
journals/tches
Hardware Masking, Revisited.
Thomas De Cnudde
Maik Ender
Amir Moradi
2018
journals/tches
Leakage Detection with the x2-Test.
Amir Moradi
Bastian Richter
Tobias Schneider
François-Xavier Standaert
2018
journals/tches
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES.
Lauren De Meyer
Amir Moradi
Felix Wegener
2017
conf/ches
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
Jérémy Jean
Amir Moradi
Thomas Peyrin
Pascal Sasdrich
2017
conf/ctrsa
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2017
conf/asiacrypt
The First Thorough Side-Channel Hardware Trojan.
Maik Ender
Samaneh Ghandali
Amir Moradi
Christof Paar
2016
conf/fse
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2016
conf/ccs
Moments-Correlating DPA.
Amir Moradi
François-Xavier Standaert
2016
conf/ccs
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks.
Tobias Schneider
Amir Moradi
Tim Güneysu
2016
conf/crypto
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks.
Tobias Schneider
Amir Moradi
Tim Güneysu
2016
conf/crypto
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2016
conf/ches
Strong 8-bit Sboxes with Efficient Masking in Hardware.
Erik Boss
Vincent Grosso
Tim Güneysu
Gregor Leander
Amir Moradi
Tobias Schneider
2016
conf/host
Large laser spots and fault sensitivity analysis.
Falk Schellenberg
Markus Finkeldey
Nils Gerhardt
Martin Hofmann
Amir Moradi
Christof Paar
2016
conf/asiacrypt
Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -.
Amir Moradi
Tobias Schneider
2016
conf/sacrypt
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms.
Tobias Schneider
Amir Moradi
François-Xavier Standaert
Tim Güneysu
2015
conf/acns
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
Tobias Schneider
Amir Moradi
Tim Güneysu
2015
conf/ches
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations.
Tobias Schneider
Amir Moradi
2015
conf/ches
Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
Amir Moradi
Alexander Wild
2015
conf/host
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs.
Pascal Sasdrich
Amir Moradi
Oliver Mischke
Tim Güneysu
2015
conf/sacrypt
Affine Equivalence and Its Application to Tightening Threshold Implementations.
Pascal Sasdrich
Amir Moradi
Tim Güneysu
2014
conf/latincrypt
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers.
Gesine Hinterwälder
Amir Moradi
Michael Hutter
Peter Schwabe
Christof Paar
2014
conf/acns
Detecting Hidden Leakages.
Amir Moradi
Sylvain Guilley
Annelie Heuser
2014
conf/ches
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs.
Amir Moradi
Vincent Immler
2014
conf/ches
Side-Channel Leakage through Static Power - Should We Care about in Practice?
Amir Moradi
2014
conf/fdtc
Fault Sensitivity Analysis Meets Zero-Value Attack.
Oliver Mischke
Amir Moradi
Tim Güneysu
2013
conf/acns
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware.
Alexander Wild
Tim Güneysu
Amir Moradi
2013
conf/ches
On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme).
Amir Moradi
Oliver Mischke
2013
conf/icics
Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure.
Amir Moradi
Oliver Mischke
2012
conf/ches
How Far Should Theory Be from Practice? - Evaluation of a Countermeasure.
Amir Moradi
Oliver Mischke
2012
conf/host
Glitch-free implementation of masking in modern FPGAs.
Amir Moradi
Oliver Mischke
2012
conf/ctrsa
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism.
Amir Moradi
Markus Kasper
Christof Paar
2012
conf/eurocrypt
Statistical Tools Flavor Side-Channel Collision Attacks.
Amir Moradi
2011
journals/joc
Side-Channel Resistant Crypto for Less than 2, 300 GE.
Axel Poschmann
Amir Moradi
Khoongming Khoo
Chu-Wee Lim
Huaxiong Wang
San Ling
2011
conf/ccs
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs.
Amir Moradi
Alessandro Barenghi
Timo Kasper
Christof Paar
2011
conf/ches
Generic Side-Channel Countermeasures for Reconfigurable Devices.
Tim Güneysu
Amir Moradi
2011
conf/ches
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
Amir Moradi
Oliver Mischke
Christof Paar
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/host
Practical evaluation of DPA countermeasures on reconfigurable hardware.
Amir Moradi
Oliver Mischke
Christof Paar
2011
conf/eurocrypt
Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Amir Moradi
Axel Poschmann
San Ling
Christof Paar
Huaxiong Wang
2010
conf/fc
Lightweight Cryptography and DPA Countermeasures: A Survey.
Amir Moradi
Axel Poschmann
2010
conf/ches
Correlation-Enhanced Power Analysis Collision Attack.
Amir Moradi
Oliver Mischke
Thomas Eisenbarth
2010
conf/host
Side-channel based Watermarks for Integrated Circuits.
Georg T. Becker
Markus Kasper
Amir Moradi
Christof Paar
2009
conf/icisc
Power Analysis of Single-Rail Storage Elements as Used in MDPL.
Amir Moradi
Thomas Eisenbarth
Axel Poschmann
Christof Paar
2009
conf/wisa
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.
Amir Moradi
Nima Mousavi
Christof Paar
Mahmoud Salmasizadeh
2009
conf/fdtc
KeeLoq and Side-Channel Analysis-Evolution of an Attack.
Christof Paar
Thomas Eisenbarth
Markus Kasper
Timo Kasper
Amir Moradi
2009
conf/africacrypt
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.
Markus Kasper
Timo Kasper
Amir Moradi
Christof Paar
2008
conf/crypto
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Thomas Eisenbarth
Timo Kasper
Amir Moradi
Christof Paar
Mahmoud Salmasizadeh
Mohammad T. Manzuri Shalmani
2007
conf/icisc
Power Analysis Attacks on MDPL and DRSL Implementations.
Amir Moradi
Mahmoud Salmasizadeh
Mohammad T. Manzuri Shalmani
2007
conf/icics
Compact and Secure Design of Masked AES S-Box.
Babak Zakeri
Mahmoud Salmasizadeh
Amir Moradi
Mahmoud Tabandeh
Mohammad T. Manzuri Shalmani
2006
conf/ches
A Generalized Method of Differential Fault Attack Against AES Cryptosystem.
Amir Moradi
Mohammad T. Manzuri Shalmani
Mahmoud Salmasizadeh
Coauthors
Aein Rezaei Shahmirzadi
(9)
Alessandro Barenghi
(1)
Alexander Wild
(2)
Amir Moradi
(96)
Anita Aghaie
(3)
Annelie Heuser
(1)
Axel Poschmann
(4)
Babak Zakeri
(1)
Bastian Richter
(1)
Bijan Fadaeinia
(1)
Charles Momin
(1)
Christian Kison
(1)
Christof Beierle
(3)
Christof Paar
(17)
Chu-Wee Lim
(1)
Daniel Lammers
(4)
David Knichel
(8)
Dusan Bozilov
(1)
Endres Puschner
(1)
Erik Boss
(1)
Falk Schellenberg
(2)
Fatemeh Ganji
(1)
Felix Hahn
(1)
Felix Uhle
(2)
Felix Wegener
(4)
Florian Stolz
(1)
François-Xavier Standaert
(5)
Gaëtan Cassiers
(1)
Georg T. Becker
(1)
Gesine Hinterwälder
(1)
Gregor Leander
(5)
Hadi Soleimany
(1)
Huaxiong Wang
(2)
Jakob Feldtkeller
(1)
Jan Richter-Brockmann
(1)
Jannik Zeitschner
(2)
Jean-Pierre Seifert
(1)
Jérémy Jean
(3)
Johannes Tobisch
(1)
Kazuo Ohta
(1)
Kazuo Sakiyama
(1)
Khoongming Khoo
(1)
Lauren De Meyer
(2)
Loïc Masure
(1)
Mahmoud Salmasizadeh
(5)
Mahmoud Tabandeh
(1)
Maik Ender
(4)
Marc Fyrbiak
(1)
Markus Finkeldey
(1)
Markus Kasper
(4)
Martin Hofmann
(1)
Marvin Staib
(1)
Mehdi B. Tahoori
(1)
Michael Hutter
(1)
Mohammad T. Manzuri Shalmani
(4)
Naghmeh Karimi
(1)
Nicolai Müller
(10)
Nils Gerhardt
(1)
Nils Wisiol
(1)
Nima Mousavi
(1)
Oleksiy Lisovets
(1)
Oliver Mischke
(9)
Pascal Sasdrich
(13)
Peter Schwabe
(1)
Raziyeh Salarifard
(1)
Samaneh Ghandali
(1)
San Ling
(2)
Sara Zarei
(1)
Sergej Meschkov
(1)
Shahin Tajik
(1)
Shahram Rasoolzadeh
(2)
Siang Meng Sim
(2)
Siemen Dhooghe
(4)
Stefan Kölbl
(2)
Steffen Becker
(1)
Sven Bettendorf
(1)
Svetla Nikova
(1)
Sylvain Guilley
(1)
Thilo Krachenfels
(1)
Thomas De Cnudde
(1)
Thomas Eisenbarth
(4)
Thomas Peyrin
(3)
Thorben Moos
(10)
Tim Beyne
(1)
Tim Güneysu
(14)
Timo Bartkewitz
(1)
Timo Kasper
(4)
Tobias Schneider
(9)
Victor Arribas
(1)
Vincent Grosso
(1)
Vincent Immler
(1)
Yang Li
(1)
Yu Sasaki
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to