Amir Moradi 0001 Home Page Coauthor index pubzone.org

Facets and more with CompleteSearch

Ruhr University Bochum, Germany

Listing of the DBLP Bibliography Server - FAQ
Other views (modern): by type - by year
Other mirrors: Trier II - Dagstuhl


other persons with the same name:


Ask others: ACM DL/Guide - CiteSeerx - CSB - MetaPress - Google - Bing - Yahoo
DBLP keys2017
i38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThorben Moos, Amir Moradi: On the Easiness of Turning Higher-Order Leakages into First-Order. IACR Cryptology ePrint Archive 2017: 283 (2017)
i37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMaik Ender, Alexander Wild, Amir Moradi: SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. IACR Cryptology ePrint Archive 2017: 284 (2017)
j13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider: Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptographic Engineering 7(2): 149-165 (2017)
c55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. CT-RSA 2017: 131-146
c54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFlorian Bache, Tobias Schneider, Amir Moradi, Tim Giineysu: SPARX - A side-channel protected processor for ARX-based cryptography. DATE 2017: 990-995
c53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThorben Moos, Amir Moradi, Bastian Richter: Static power side-channel analysis of a threshold implementation prototype chip. DATE 2017: 1324-1329
2016
i36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. IACR Cryptology ePrint Archive 2016: 203 (2016)
i35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Tobias Schneider: Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. IACR Cryptology ePrint Archive 2016: 249 (2016)
i34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Tobias Schneider: Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori. IACR Cryptology ePrint Archive 2016: 481 (2016)
i33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar: Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs. IACR Cryptology ePrint Archive 2016: 641 (2016)
i32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider: Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016)
i31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. IACR Cryptology ePrint Archive 2016: 648 (2016)
i30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim: The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptology ePrint Archive 2016: 660 (2016)
i29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu: Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. IACR Cryptology ePrint Archive 2016: 719 (2016)
i28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. IACR Cryptology ePrint Archive 2016: 1111 (2016)
i27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThorben Moos, Amir Moradi, Bastian Richter: Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip. IACR Cryptology ePrint Archive 2016: 1135 (2016)
j12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi: Leakage assessment methodology - Extended version. J. Cryptographic Engineering 6(2): 85-99 (2016)
c52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Tobias Schneider: Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -. ASIACRYPT (1) 2016: 517-547
c51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLErik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider: Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193
c50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Tobias Schneider: Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. COSADE 2016: 71-87
c49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. COSADE 2016: 199-217
c48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153
c47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. CRYPTO (2) 2016: 302-332
c46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. FSE 2016: 185-203
c45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFalk Schellenberg, Markus Finkeldey, Nils Gerhardt, Martin Hofmann, Amir Moradi, Christof Paar: Large laser spots and fault sensitivity analysis. HOST 2016: 203-208
e2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTim Güneysu, Gregor Leander, Amir Moradi: Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers .Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5
2015
i26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. IACR Cryptology ePrint Archive 2015: 66 (2015)
i25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlexander Wild, Amir Moradi, Tim Güneysu: GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. IACR Cryptology ePrint Archive 2015: 124 (2015)
i24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu: Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. IACR Cryptology ePrint Archive 2015: 198 (2015)
i23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Gesine Hinterwälder: Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. IACR Cryptology ePrint Archive 2015: 199 (2015)
i22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlexander Wild, Amir Moradi, Tim Güneysu: Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. IACR Cryptology ePrint Archive 2015: 200 (2015)
i21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu: Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. IACR Cryptology ePrint Archive 2015: 203 (2015)
i20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi: Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. IACR Cryptology ePrint Archive 2015: 207 (2015)
i19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar: A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. IACR Cryptology ePrint Archive 2015: 348 (2015)
i18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. IACR Cryptology ePrint Archive 2015: 571 (2015)
i17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Alexander Wild: Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? IACR Cryptology ePrint Archive 2015: 597 (2015)
i16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: Affine Equivalence and its Application to Tightening Threshold Implementations. IACR Cryptology ePrint Archive 2015: 749 (2015)
i15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar: Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive. IACR Cryptology ePrint Archive 2015: 768 (2015)
j11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar: A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation. IEEE Trans. on CAD of Integrated Circuits and Systems 34(8): 1308-1319 (2015)
j10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPawel Swierczynski, Amir Moradi, David Oswald, Christof Paar: Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs. TRETS 7(4): 34:1-34:23 (2015)
c44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi, Tim Güneysu: Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578
c43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Alexander Wild: Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads? CHES 2015: 453-474
c42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTobias Schneider, Amir Moradi: Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. CHES 2015: 495-513
c41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlexander Wild, Amir Moradi, Tim Güneysu: Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. COSADE 2015: 81-94
c40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu: Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. COSADE 2015: 95-107
c39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Gesine Hinterwälder: Side-Channel Security Analysis of Ultra-Low-Power FRAM-Based MCUs. COSADE 2015: 239-254
c38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi: Side-channel attacks from static power: when should we care? DATE 2015: 145-150
c37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu: Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. HOST 2015: 130-136
c36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPascal Sasdrich, Amir Moradi, Tim Güneysu: Affine Equivalence and Its Application to Tightening Threshold Implementations. SAC 2015: 263-276
e1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarc Joye, Amir Moradi: Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers .Lecture Notes in Computer Science 8968, Springer 2015, ISBN 978-3-319-16762-6
2014
i14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi: Side-Channel Leakage through Static Power - Should We Care about in Practice? -. IACR Cryptology ePrint Archive 2014: 25 (2014)
i13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, François-Xavier Standaert: Moments-Correlating DPA. IACR Cryptology ePrint Archive 2014: 409 (2014)
i12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Vincent Immler: Early Propagation and Imbalanced Routing, How to Diminish in FPGAs. IACR Cryptology ePrint Archive 2014: 454 (2014)
i11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi: Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment. IACR Cryptology ePrint Archive 2014: 716 (2014)
c35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Sylvain Guilley, Annelie Heuser: Detecting Hidden Leakages. ACNS 2014: 324-342
c34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi: Side-Channel Leakage through Static Power - Should We Care about in Practice? CHES 2014: 562-579
c33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Vincent Immler: Early Propagation and Imbalanced Routing, How to Diminish in FPGAs. CHES 2014: 598-615
c32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLOliver Mischke, Amir Moradi, Tim Güneysu: Fault Sensitivity Analysis Meets Zero-Value Attack. FDTC 2014: 59-67
c31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi: Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -. INDOCRYPT 2014: 341-359
c30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar: Full-Size High-Security ECC Implementation on MSP430 Microcontrollers. LATINCRYPT 2014: 31-47
2013
i10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Sylvain Guilley, Annelie Heuser: Detecting Hidden Leakages. IACR Cryptology ePrint Archive 2013: 842 (2013)
j9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi: Introducing proxy zero-knowledge proof and utilization in anonymous credential systems. Security and Communication Networks 6(2): 161-172 (2013)
j8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Christof Paar: One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores. IEEE Trans. Computers 62(9): 1786-1798 (2013)
c29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlexander Wild, Tim Güneysu, Amir Moradi: Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. ACNS 2013: 389-404
c28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke: On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme). CHES 2013: 1-20
c27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, David Oswald, Christof Paar, Pawel Swierczynski: Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering. FPGA 2013: 91-100
c26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke: Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure. ICICS 2013: 245-258
2012
i9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke: On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme - .IACR Cryptology ePrint Archive 2012: 472 (2012)
j7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarkus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson: Side channels as building blocks. J. Cryptographic Engineering 2(3): 143-159 (2012)
j6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Christof Paar: Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods. IEEE Trans. VLSI Syst. 20(9): 1578-1589 (2012)
c25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke: How Far Should Theory Be from Practice? - Evaluation of a Countermeasure. CHES 2012: 92-106
c24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Markus Kasper, Christof Paar: Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism. CT-RSA 2012: 1-18
c23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi: Statistical Tools Flavor Side-Channel Collision Attacks. EUROCRYPT 2012: 428-445
c22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke: Glitch-free implementation of masking in modern FPGAs. HOST 2012: 89-95
c21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndrey Bogdanov, Amir Moradi, Tolga Yalçin: Efficient and side-channel resistant authenticated encryption of FPGA bitstreams. ReConFig 2012: 1-6
2011
j5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarkus Kasper, Timo Kasper, Amir Moradi, Christof Paar: Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs. Datenschutz und Datensicherheit 35(11): 779-785 (2011)
i8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Christof Paar: Collision Timing Attack when Breaking 42 AES ASIC Cores. IACR Cryptology ePrint Archive 2011: 162 (2011)
i7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar: On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs. IACR Cryptology ePrint Archive 2011: 390 (2011)
i6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Markus Kasper, Christof Paar: On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism. IACR Cryptology ePrint Archive 2011: 391 (2011)
j4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehrdad Khatir, Alireza Ejlali, Amir Moradi: Improving the energy efficiency of reversible logic circuits by the combined use of adiabatic styles. Integration 44(1): 12-21 (2011)
j3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAxel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling: Side-Channel Resistant Crypto for Less than 2, 300 GE. J. Cryptology 24(2): 322-345 (2011)
c20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar: On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs. ACM Conference on Computer and Communications Security 2011: 111-124
c19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTim Güneysu, Amir Moradi: Generic Side-Channel Countermeasures for Reconfigurable Devices. CHES 2011: 33-48
c18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama: On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting. CHES 2011: 292-311
c17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang: Pushing the Limits: A Very Compact and a Threshold Implementation of AES. EUROCRYPT 2011: 69-88
c16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Christof Paar: Practical evaluation of DPA countermeasures on reconfigurable hardware. HOST 2011: 154-160
2010
i5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Thomas Eisenbarth: Correlation-Enhanced Power Analysis Collision Attack. IACR Cryptology ePrint Archive 2010: 297 (2010)
c15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Oliver Mischke, Thomas Eisenbarth: Correlation-Enhanced Power Analysis Collision Attack. CHES 2010: 125-139
c14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Axel Poschmann: Lightweight Cryptography and DPA Countermeasures: A Survey. Financial Cryptography Workshops 2010: 68-79
c13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGeorg T. Becker, Markus Kasper, Amir Moradi, Christof Paar: Side-channel based Watermarks for Integrated Circuits. HOST 2010: 30-35
c12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLStefan Heyse, Amir Moradi, Christof Paar: Practical Power Analysis Attacks on Software Implementations of McEliece. PQCrypto 2010: 108-125
2009
j2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh: Dual-rail transition logic: A logic style for counteracting power analysis attacks. Computers & Electrical Engineering 35(2): 359-369 (2009)
j1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth: Vulnerability modeling of cryptographic hardware to power analysis attacks. Integration 42(4): 468-478 (2009)
c11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMarkus Kasper, Timo Kasper, Amir Moradi, Christof Paar: Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. AFRICACRYPT 2009: 403-420
c10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi: KeeLoq and Side-Channel Analysis-Evolution of an Attack. FDTC 2009: 65-69
c9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Thomas Eisenbarth, Axel Poschmann, Christof Paar: Power Analysis of Single-Rail Storage Elements as Used in MDPL. ICISC 2009: 146-160
c8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani: Charge recovery logic as a side channel attack countermeasure. ISQED 2009: 686-691
c7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh: A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. WISA 2009: 193-205
2008
i4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani: Physical Cryptanalysis of KeeLoq Code Hopping Applications. IACR Cryptology ePrint Archive 2008: 58 (2008)
i3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehrdad Khatir, Amir Moradi: Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style. IACR Cryptology ePrint Archive 2008: 123 (2008)
i2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh: Information Leakage of Flip-Flops in DPA-Resistant Logic Styles. IACR Cryptology ePrint Archive 2008: 188 (2008)
i1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani: Investigating the DPA-Resistance Property of Charge Recovery Logics. IACR Cryptology ePrint Archive 2008: 192 (2008)
c6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. CRYPTO 2008: 203-220
c5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh: A secure and low-energy logic style using charge recovery approach. ISLPED 2008: 259-264
2007
c4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBabak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani: Compact and Secure Design of Masked AES S-Box. ICICS 2007: 216-229
c3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani: Power Analysis Attacks on MDPL and DRSL Implementations. ICISC 2007: 259-272
2006
c2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh: A Generalized Method of Differential Fault Attack Against AES Cryptosystem. CHES 2006: 91-100
2005
c1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAmir Moradi, Rouhollah Dianat, Shohreh Kasaei, Mohammad Taghi Manzuri Shalmani: Enhanced cross-diamond-hexagonal search algorithms for fast block motion estimation. AVSS 2005: 558-563

Coauthor Index

1Florian Bache[c54]
2Alessandro Barenghi[i7] [c20]
3Georg T. Becker[i33] [j7] [c13]
4Christof Beierle[i30] [c48]
5Andrey Bogdanov[c21]
6Erik Boss[j13] [i32] [c51]
7Wayne P. Burleson
Wayne Burleson
[j7]
8Rouhollah Dianat[c1]
9Thomas Eisenbarth[j6] [i5] [c15] [j1] [c10] [c9] [i4] [i2] [c6]
10Alireza Ejlali[j4] [c5]
11Maik Ender[i37]
12Markus Finkeldey[c45]
13Marc Fyrbiak[i15]
14Nils Gerhardt[c45]
15Tim Giineysu[c54]
16Andreas Gornik[i19] [j11]
17Vincent Grosso[j13] [i32] [c51]
18Sylvain Guilley[c35] [i10]
19Tim Güneysu[j13] [c55] [i36] [i32] [i31] [i29] [i28] [c51] [c49] [c47] [c46] [e2] [i26] [i25] [i24] [i22] [i21] [i18] [i16] [c44] [c41] [c40] [c37] [c36] [c32] [c29] [j7] [c19]
20Annelie Heuser[c35] [i10]
21Stefan Heyse[c12]
22Gesine Hinterwälder[i23] [c39] [c30]
23Martin Hofmann[c45]
24Michael Hutter[c30]
25Vincent Immler[i12] [c33]
26Hoda Jannati[j9]
27Jérémy Jean[i30] [c48]
28Marc Joye[e1]
29Dina Kamel[c38]
30Shohreh Kasaei[c1]
31Markus Kasper[j7] [c24] [j5] [i6] [c13] [c11] [c10]
32Timo Kasper[j5] [i7] [c20] [c11] [c10] [i4] [c6]
33Mehrdad Khatir[j4] [c8] [i3] [i1] [c5]
34Khoongming Khoo[j3]
35Mario Kirschbaum[j6]
36Stefan Kölbl[i30] [c48]
37Philipp Koppe[i15]
38Gregor Leander[j13] [i32] [i30] [c51] [c48] [e2]
39Yang Li 0001[c18]
40Chu-Wee Lim[j3]
41San Ling[j3] [c17]
42Oliver Mischke[i24] [i21] [c40] [c37] [c32] [j8] [c28] [c26] [i9] [j7] [c25] [c22] [i8] [c18] [c16] [i5] [c15]
43Javad Mohajeri[j9]
44Thorben Moos[i38] [c53] [i27]
45Nima Mousavi[c7]
46Jürgen Oehm[i19] [j11]
47Kazuo Ohta[c18]
48David Oswald[j10] [c27]
49Christof Paar[i33] [c45] [i19] [i15] [j11] [j10] [c30] [j8] [c27] [j7] [j6] [c24] [j5] [i8] [i7] [i6] [c20] [c18] [c17] [c16] [c13] [c12] [c11] [c10] [c9] [c7] [i4] [i2] [c6]
50Thomas Peyrin[i30] [c48]
51Axel Poschmann[j3] [c17] [c14] [c9] [i2]
52Santos Merino Del Pozo[c38]
53Bastian Richter[c53] [i27]
54Carsten Rolfes[i2]
55Kazuo Sakiyama[c18]
56Mahmoud Salmasizadeh[j9] [j2] [j1] [c8] [c7] [i4] [i2] [i1] [c6] [c5] [c4] [c3] [c2]
57Yu Sasaki[i30] [c48]
58Pascal Sasdrich[c55] [i36] [i30] [i28] [c48] [c46] [i24] [i21] [i16] [c40] [c37] [c36]
59Falk Schellenberg[c45]
60Tobias Schneider 0002[j13] [c54] [i35] [i34] [i32] [i31] [i29] [j12] [c52] [c51] [c50] [c49] [c47] [i26] [i20] [i18] [c44] [c42]
61Peter Schwabe[c30]
62Mohammad T. Manzuri Shalmani
Mohammad Taghi Manzuri Shalmani
[j2] [j1] [c8] [i4] [i2] [i1] [c6] [c5] [c4] [c3] [c2] [c1]
63Siang Meng Sim[i30] [c48]
64François-Xavier Standaert[i29] [c38] [i13]
65Pawel Swierczynski[i33] [i15] [j10] [c27]
66Mahmoud Tabandeh[c4]
67Huaxiong Wang[j3] [c17]
68Alexander Wild[i37] [i25] [i22] [i17] [c43] [c41] [c29]
69Tolga Yalçin[c21]
70Babak Zakeri[c4]

 

Last update 2017-06-23 19:05 CEST by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page