Follow
Amir Moradi
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
8542016
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
5982011
Leakage assessment methodology: A clear roadmap for side-channel evaluations
T Schneider, A Moradi
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
512*2015
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
4072008
On the vulnerability of FPGA bitstream encryption against power analysis attacks: Extracting keys from Xilinx Virtex-II FPGAs
A Moradi, A Barenghi, T Kasper, C Paar
Proceedings of the 18th ACM conference on Computer and communications …, 2011
3212011
Correlation-enhanced power analysis collision attack
A Moradi, O Mischke, T Eisenbarth
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
2802010
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24, 322-345, 2011
2652011
An inside job: Remote power analysis attacks on FPGAs
F Schellenberg, DRE Gnad, A Moradi, MB Tahoori
IEEE Design & Test 38 (3), 58-66, 2021
2452021
A generalized method of differential fault attack against AES cryptosystem
A Moradi, MTM Shalmani, M Salmasizadeh
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
2352006
Generic side-channel countermeasures for reconfigurable devices
T Güneysu, A Moradi
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2011
2342011
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
C Beierle, G Leander, A Moradi, S Rasoolzadeh
IACR Transactions on Symmetric Cryptology 2019 (1), 2019
1882019
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
1512016
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering
A Moradi, D Oswald, C Paar, P Swierczynski
Proceedings of the ACM/SIGDA international symposium on Field programmable …, 2013
1372013
Black-box side-channel attacks highlight the importance of countermeasures: An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
A Moradi, M Kasper, C Paar
Cryptographers’ Track at the RSA Conference, 1-18, 2012
1352012
The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series {FPGAs}
M Ender, A Moradi, C Paar
29th USENIX Security Symposium (USENIX Security 20), 1803-1819, 2020
1272020
Leakage detection with the x2-test
A Moradi, B Richter, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-237, 2018
1132018
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
A Moradi, T Schneider
International workshop on constructive side-channel analysis and secure …, 2016
1122016
Side-channel leakage through static power: Should we care about in practice?
A Moradi
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
1092014
Moments-correlating DPA
A Moradi, FX Standaert
Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, 5-15, 2016
1002016
SILVER–statistical independence and leakage verification
D Knichel, P Sasdrich, A Moradi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
992020
The system can't perform the operation now. Try again later.
Articles 1–20