Amir Moradi

From MaRDI portal
Person:656518

Available identifiers

zbMath Open moradi.amirMaRDI QIDQ656518

List of research outcomes





PublicationDate of PublicationType
Energy consumption of protected cryptographic hardware cores. An experimental study2023-11-16Paper
SILVER -- statistical independence and leakage verification2023-03-21Paper
Impeccable Circuits2020-10-02Paper
A first-order SCA resistant AES without fresh randomness2020-07-20Paper
Threshold implementation in software. Case study of PRESENT2020-07-20Paper
Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY2020-06-24Paper
Spin me right round rotational symmetry for FPGA-specific AES: extended version2020-06-15Paper
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series2019-12-05Paper
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs2018-06-27Paper
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs2018-06-27Paper
White-box cryptography in the gray box2018-05-09Paper
The first thorough side-channel hardware Trojan2018-04-06Paper
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms2018-02-16Paper
Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads?2018-02-14Paper
Leakage assessment methodology. A clear roadmap for side-channel evaluations2018-02-14Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores2017-07-12Paper
Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware2017-04-12Paper
Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori2017-02-01Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS2016-10-27Paper
ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks2016-10-27Paper
Affine equivalence and its application to tightening threshold implementations2016-05-19Paper
Arithmetic Addition over Boolean Masking2016-03-10Paper
Full-size high-security ECC implementation on MSP430 microcontrollers2015-09-17Paper
Wire-tap codes as side-channel countermeasure2015-09-10Paper
Early propagation and imbalanced routing, how to diminish in FPGAs2015-07-21Paper
Comprehensive evaluation of AES dual ciphers as a side-channel countermeasure2014-09-29Paper
Detecting hidden leakages2014-07-07Paper
On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme)2013-10-10Paper
Side-channel resistant crypto for less than 2,300 GE2012-01-18Paper
Generic Side-Channel Countermeasures for Reconfigurable Devices2011-10-07Paper
Pushing the limits: a very compact and a threshold implementation of AES2011-05-27Paper
Correlation-enhanced power analysis collision attack2010-08-17Paper
Practical power analysis attacks on software implementations of McEliece2010-06-17Paper
On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices2009-05-20Paper
Dual-rail transition logic: A logic style for counteracting power analysis attacks2009-03-20Paper
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme2009-02-10Paper

Research outcomes over time

This page was built for person: Amir Moradi