ResearcherID Thomson Reuters  

Moradi, Amir
Create a ResearcherID badge for this researcher View publications analytics for this researcher
Close
ResearcherID: R-6834-2016
URL: http://www.researcherid.com/rid/R-6834-2016
ORCID: http://orcid.org/0000-0002-4032-7433
My Institutions (more details)
Primary Institution:
Sub-org/Dept:
Role:
 
 

This list contains papers that I have authored.

publication(s)  
First Page Previous Page Page   of  5  Go Next Page Last Page
  Sort by:    Results per page: 
1.  Title: Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
 Author(s): Moradi, A.; Schneider, T.
 Source: Constructive Side-Channel Analysis and Secure Design, Cosade 2016 Volume: 9689 Pages: 71-87 Published: 2016
 Times Cited: 0
 DOI: 10.1007/978-3-319-43283-0_5
added
05-Apr-17
2.  Title: Large Laser Spots and Fault Sensitivity Analysis
 Author(s): Schellenberg, F.; Finkeldey, M.; Gerhardt, N.; et al.
 Source: Proceedings of the 2016 Ieee International Symposium on Hardware Oriented Security and Trust (Host) Pages: 203-208 Published: 2016
 Times Cited: 1
added
05-Apr-17
3.  Title: Leakage assessment methodology
 Author(s): Schneider, T.; Moradi, A.
 Source: Journal of Cryptographic Engineering Volume: 6 Issue: 2 Pages: 85-99 Published: 2016
 Times Cited: 1
 DOI: 10.1007/s13389-016-0120-y
added
05-Apr-17
4.  Title: Moments-Correlating DPA
 Author(s): Moradi, A.; Standaert, F. X.; Acm,
 Source: Proceedings of the 2016 Acm Workshop on the Theory of Implementation Security (Tis'16) Pages: 5-15 Published: 2016
 Times Cited: 0
 DOI: 10.1145/2996366.2996369
added
05-Apr-17
5.  Title: ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
 Author(s): Schneider, T.; Moradi, A.; Guneysu, T.; et al.
 Source: Proceedings of the 2016 Acm Workshop on the Theory of Implementation Security (Tis'16) Pages: 39 Published: 2016
 Times Cited: 0
 DOI: 10.1145/2996366.2996427
added
05-Apr-17
6.  Title: Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
 Author(s): Schneider, T.; Moradi, A.; Guneysu, T.
 Source: Constructive Side-Channel Analysis and Secure Design, Cosade 2016 Volume: 9689 Pages: 199-217 Published: 2016
 Times Cited: 0
 DOI: 10.1007/978-3-319-43283-0_12
added
05-Apr-17
7.  Title: Side-Channel Analysis Protection and Low-Latency in Action - Case Study of PRINCE and Midori
 Author(s): Moradi, A.; Schneider, T.
 Source: Advances in Cryptology - Asiacrypt 2016, Pt I Volume: 10031 Pages: 517-547 Published: 2016
 Times Cited: 1
 DOI: 10.1007/978-3-662-53887-6_19
added
05-Apr-17
8.  Title: Strong 8-bit Sboxes with Efficient Masking in Hardware
 Author(s): Boss, E.; Grosso, V.; Guneysu, T.; et al.
 Source: Cryptographic Hardware and Embedded Systems - Ches 2016 Volume: 9813 Pages: 171-193 Published: 2016
 Times Cited: 0
 DOI: 10.1007/978-3-662-53140-2_9
added
05-Apr-17
9.  Title: A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation
 Author(s): Gornik, A.; Moradi, A.; Oehm, J.; et al.
 Source: Ieee Transactions on Computer-Aided Design of Integrated Circuits and Systems Volume: 34 Issue: 8 Pages: 1308-1319 Published: 2015
 Times Cited: 2
 DOI: 10.1109/tcad.2015.2423274
added
05-Apr-17
10.  Title: Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
 Author(s): Sasdrich, P.; Moradi, A.; Mischke, O.; et al.
 Source: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Pages: 130-136 Published: 2015
 Times Cited: 1
added
05-Apr-17
publication(s)  
First Page Previous Page Page   of  5  Go Next Page Last Page
  Sort by:    Results per page: