Amir Moradi

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Energy consumption of protected cryptographic hardware cores. An experimental study
Constructive Side-Channel Analysis and Secure Design
2023-11-16Paper
SILVER -- statistical independence and leakage verification2023-03-21Paper
Impeccable Circuits
IEEE Transactions on Computers
2020-10-02Paper
A first-order SCA resistant AES without fresh randomness
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Threshold implementation in software. Case study of PRESENT
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY
Lecture Notes in Computer Science
2020-06-24Paper
Spin me right round rotational symmetry for FPGA-specific AES: extended version
Journal of Cryptology
2020-06-15Paper
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
Constructive Side-Channel Analysis and Secure Design
2019-12-05Paper
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs
IEEE Transactions on Computers
2018-06-27Paper
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs
IEEE Transactions on Computers
2018-06-27Paper
White-box cryptography in the gray box
Fast Software Encryption
2018-05-09Paper
The first thorough side-channel hardware Trojan2018-04-06Paper
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms2018-02-16Paper
Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?2018-02-14Paper
Leakage assessment methodology. A clear roadmap for side-channel evaluations2018-02-14Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
IEEE Transactions on Computers
2017-07-12Paper
Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Affine equivalence and its application to tightening threshold implementations
Lecture Notes in Computer Science
2016-05-19Paper
Arithmetic Addition over Boolean Masking
Applied Cryptography and Network Security
2016-03-10Paper
Full-size high-security ECC implementation on MSP430 microcontrollers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Wire-tap codes as side-channel countermeasure
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Early propagation and imbalanced routing, how to diminish in FPGAs
Advanced Information Systems Engineering
2015-07-21Paper
Comprehensive evaluation of AES dual ciphers as a side-channel countermeasure
Information and Communications Security
2014-09-29Paper
Detecting hidden leakages
Applied Cryptography and Network Security
2014-07-07Paper
On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme)
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Side-channel resistant crypto for less than 2,300 GE
Journal of Cryptology
2012-01-18Paper
Generic Side-Channel Countermeasures for Reconfigurable Devices
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Pushing the limits: a very compact and a threshold implementation of AES
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Correlation-enhanced power analysis collision attack
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Practical power analysis attacks on software implementations of McEliece
Post-Quantum Cryptography
2010-06-17Paper
On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
Communications in Computer and Information Science
2009-05-20Paper
Dual-rail transition logic: A logic style for counteracting power analysis attacks
Computers and Electrical Engineering
2009-03-20Paper
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Lecture Notes in Computer Science
2009-02-10Paper


Research outcomes over time


This page was built for person: Amir Moradi