Prof. Dr. Amir Mo­ra­di

Implementation Security

Address:
Ruhr-University Bochum
Faculty of Computer Science
Implementation Security
Universitätsstr. 150
–D-44801 Bochum

 

Room: MB 3/167

 

Telephone: (+49)(0)234 / 32 – 27219

 

Office Hours: By arrangement

 

E-Mail: amir.moradi@rub.de 🔑 PGP

 

©RUB, Marquard

this webpage will not be updated. For more recent version please refer to ImpSec @ TU Darmstadt.

 

 

Vita

  • Since 10/2023: W3 Pro­fes­sor for Implementation Security
    Department of Computer Science, Technische Uni­ver­si­tät Darmstadt, Ger­ma­ny
  • 8/2022-10/2023: W2 Pro­fes­sor for Implementation Security
    Fa­cul­ty of Computer Science, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 10/2021-8/2022: W2 Pro­fes­sor for IT-Se­cu­ri­ty
    In­sti­tu­te of Com­pu­ter Sci­ence, Uni­ver­si­ty of Co­lo­gne, Ger­ma­ny
  • 4/2021-10/2021: Ex­tra­or­di­na­ry Pro­fes­sor (Au­ßer­plan­mä­ßi­ger Pro­fes­sor)
    Fa­cul­ty of Elec­tri­cal En­gi­nee­ring and In­for­ma­ti­on Sci­en­ces, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 1/2020-10/2021: Aca­de­mic Coun­cilor (Aka­de­mi­scher Rat)
    Se­cu­ri­ty En­gi­nee­ring, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 2016-2019: Aca­de­mic Coun­cilor (Aka­de­mi­scher Rat)
    Em­bed­ded Se­cu­ri­ty, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 10/2015-4/2021: Fa­cul­ty Mem­ber (Pri­vat­do­zent)
    Fa­cul­ty of Elec­tri­cal En­gi­nee­ring and In­for­ma­ti­on Sci­en­ces, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 2015: Ha­bi­li­ta­ti­on in Em­bed­ded Se­cu­ri­ty (Ad­van­ces in Si­de-Chan­nel Se­cu­ri­ty)
    Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 2009-2016: post-doc­to­ral re­se­ar­cher
    Em­bed­ded Se­cu­ri­ty, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 2008: PhD in Com­pu­ter En­gi­nee­ring
    Sharif Uni­ver­si­ty of Tech­no­lo­gy, Tehr­an, Iran
  • 2007-2008: vi­sit­ing PhD stu­dent
    Em­bed­ded Se­cu­ri­ty, Ruhr-Uni­ver­si­tät Bo­chum, Ger­ma­ny
  • 2004: MSc in Com­pu­ter En­gi­nee­ring
    Sharif Uni­ver­si­ty of Tech­no­lo­gy, Tehr­an, Iran
  • 2001: BSc in Com­pu­ter En­gi­nee­ring
    Shahid Be­hesh­ti Uni­ver­si­ty, Tehr­an, Iran

Re­se­arch

  • Topics

    • Implementation Security
    • Si­de-Chan­nel Analysis and Countermeasures
    • Fault-Injection Attacks and Countermeasures
    • Ef­fi­ci­ent Im­ple­men­ta­ti­on of Cryp­to­gra­phic Primitives
    • Applied Cryptography
  • Profiles

Awards/Ho­nors

  • Distinguished Paper Award at IEEE S&P 2023.
  • Awarded by 100,000 € (1st place) in the 9th German IT Security Award 2022, announcement.
  • Highest number of publications at CHES in one year for the entire history of CHES, with 10 publications at CHES 2021, announcement.
  • Currently the 2nd prolific author of CHES.
  • Highest number of publications at CHES 2022 with 8 papers, announcement.
  • Dis­tin­gu­is­hed Paper award at USE­NIX Se­cu­ri­ty Sym­po­si­um – USE­NIX 2020.
  • Best paper award at Con­fe­rence on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2019.
  • Co-aut­hor of the Best Stu­dent-Pa­per Award at IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust – HOST 2016.
  • Best Pa­per Award at In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign – CO­SA­DE 2015.
  • Co-aut­hor of the Best Stu­dent-Pa­per Award at In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2014.
  • No­mi­na­ted for the best paper award at De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on – DATE 2018.
  • No­mi­na­ted for the best paper award at De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on – DATE 2017.
  • No­mi­na­ted for the best paper award at Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2015.

Pro­gram Com­mit­tee Mem­bership

Edi­to­ri­al Board Mem­bership

  • PC co-chair of Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence (CAR­DIS 2014).
  • PC co-chair of In­ter­na­tio­nal Work­shop on Light­weight Cryp­to­gra­phy for Se­cu­ri­ty & Pri­va­cy (Light­Sec 2015).
  • PC co-chair of Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems (CHES 2020).
  • Steering Committee Member of CHES, since 2019.
  • Steering Committee Member of CARDIS, since 2014.
  • Chair of the CHES Test of Time Award Committee, 2022 & 2023.
  • As­so­cia­te Edi­tor of In­ter­na­tio­nal Jour­nal of Ap­p­lied Cryp­to­gra­phy, 2011-2020 (IJACT).
  • As­so­cia­te Edi­tor of IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, 2019-2021 (IEEE-TETC).
  • As­so­cia­te Edi­tor of Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, 2019-2022 (JCEN).

Selec­ted Talks

  • Sta­tis­ti­cal Tools Fla­vor Si­de-Chan­nel Col­li­si­on At­tacks, EU­RO­CRYPT 2012, April 17, Cam­bridge, UK. (talk)
  • Brea­king the Bit­stream De­cryp­ti­on of FPGAs, in­vi­ted talk at ECRYPT II Sum­mer School: Chal­len­ges in Se­cu­ri­ty En­gi­nee­ring, 2012, Sep­tem­ber 5, Bo­chum, Ger­ma­ny.
  • How Far Should Theo­ry Be from Prac­tice? Eva­lua­ti­on of a Coun­ter­me­a­su­re, CHES 2012, Sep­tem­ber 10, Leu­ven, Bel­gi­um.
  • On the Sim­pli­ci­ty of Con­ver­ting Le­a­ka­ges from Mul­ti­va­ria­te to Uni­va­ria­te, CHES 2013, Au­gust 21, Santa Bar­ba­ra, US.
  • Al­te­ra vs. Xi­l­inx which one keeps your de­sign hi­d­den? rump ses­si­on CHES 2013, Au­gust 22, Santa Bar­ba­ra, US.
  • Si­de-Chan­nel Coun­ter­me­a­su­res for Hard­ware: is There a Light at the End of the Tun­nel? in­vi­ted talk at Worces­ter Po­ly­tech­nic In­sti­tu­te, 2013, Sep­tem­ber 11, Worces­ter, US.
  • Eva­lua­ti­on of Si­de-Chan­nel Le­a­ka­ges through Sta­tis­ti­cal Mo­ments in­vi­ted talk at Bosch GmbH, 2014, March 13, Stutt­gart, Ger­ma­ny.
  • Si­de-Chan­nel Le­a­ka­ge through Sta­tic Power Should We Care about in Prac­tice? in­vi­ted talk at NXP Se­mi­con­duc­tors, 2014, April 22, Ham­burg, Ger­ma­ny (+ CHES 2014, Sep­tem­ber 26, Busan, South Korea).
  • Early Pro­pa­ga­ti­on and Im­ba­lan­ced Rou­ting, How to Di­mi­nish in FPGAs, CHES 2014, Sep­tem­ber 26, Busan, South Korea.
  • Phy­si­cal At­tacks, extrac­ting the secrets from cryp­to­gra­phic de­vices, in­vi­ted talk at Bau­haus-Uni­ver­si­tät Wei­mar, 2015, Ja­nu­a­ry 22, Wei­mar, Ger­ma­ny.
  • Si­de-Chan­nel Se­cu­ri­ty Ana­ly­sis of Ul­tra-Low-Power FRAM-ba­sed MCUs, CO­SA­DE 2015, April 14, Ber­lin, Ger­ma­ny.
  • Hiding Hig­her-Or­der Le­a­ka­ges in Hard­ware in­vi­ted talk at TI day, KU Leu­ven, Bel­gi­um.
  • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – a clear road­map for si­de-chan­nel eva­lua­ti­ons, in­vi­ted talk at Sharif Uni­ver­si­ty of Tech­no­lo­gy, 2015, Au­gust 29, Tehr­an, Iran.
  • Im­pro­ved Si­de-Chan­nel Ana­ly­sis At­tacks on Xi­l­inx Bit­stream En­cryp­ti­on of 5, 6, and 7 Se­ries, CO­SA­DE 2016, April 14, Graz, Aus­tria.
  • Mas­king as a Si­de-Chan­nel Coun­ter­me­a­su­re in Hard­ware, in­vi­ted tu­to­ri­al at ISCISC 2016, Sep­tem­ber 6, Tehr­an, Iran.
  • Mo­ments-Cor­re­la­ting DPA, CCS 2016 Work­shops (TIS), Oc­to­ber 24, Vi­en­na, Aus­tria.
  • Si­de-Chan­nel Ana­ly­sis Pro­tec­tion and Low-La­ten­cy in Ac­tion – case study of PRIN­CE and Mi­do­ri, ASI­A­CRYPT 2016, De­cem­ber 07, Hanio, Viet­nam. (talk)
  • Bit-Sli­ding: A Ge­ne­ric Tech­ni­que for Bit-Se­ri­al Im­ple­men­ta­ti­ons of SPN-ba­sed Pri­mi­ti­ves, CHES 2017, Sep­tem­ber 28, Tai­pei, Tai­wan. (talk)
  • The First Tho­rough Si­de-Chan­nel Hard­ware Tro­jan, ASI­A­CRYPT 2017, De­cem­ber 05, Hong Kong, China. (talk) + at Theo­ry of Im­ple­men­ta­ti­on Se­cu­ri­ty (TIS) Work­shop 2018, Ja­nu­a­ry 09, Zu­rich, Swit­z­er­land
  • Ex­plo­ring the Ef­fect of De­vice Aging on Sta­tic Power Ana­ly­sis At­tacks, CHES 2019, Au­gust 28, At­lan­ta, USA. (talk)
  • How to Apply Thres­hold Im­ple­men­ta­ti­on to any PUF Pri­mi­ti­ve, in­vi­ted talk at Theo­ry of Im­ple­men­ta­ti­on Se­cu­ri­ty (TIS) Work­shop 2019, No­vem­ber 11, Lon­don, Eng­land
  • Threshold Implementation and Leakage Assessment, invited talk at Qualcomm, December 14, 2020
  • Tools for Verification and Automatic Generation of Secure Hardware Circuits, invited talk at National Institute for Standard and Technology, USA, March 10, 2021
  • Verification and Automatic Generation of Masked Hardware Designs, invited talk at Worcester Polytechnic Institute, USA, November 10, 2021
  • Hardware Masking. Past, Present, and the Future, invited talk at Microsoft, December 8, 2021
  •  Automated Generation of Masked Hardware, CHES 2022, September 19, Leuven, Belgium. (talk)

Cur­rent PhDs

Joint Su­per­vi­si­on

Fi­nis­hed PhDs

Funded DFG Pro­jects

  • NaS­CA- Na­no-Sca­le Si­de-Chan­nel Ana­ly­sis: Phy­si­cal Se­cu­ri­ty for Next-Ge­ne­ra­ti­on CMOS ICs (DFG 2016-2020)
  • Green­Sec- Se­cu­ri­ty for In­ter­net of Things with Low En­er­gy and Low Power Con­sump­ti­on (DFG 2018-2021)
  • SuC­CESS- Sym­me­triC Ci­phEr de­sign with in­herent phy­Si­cal Se­cu­ri­ty (DFG 2019-2023)
  • Aged but Fit- Long Las­ting Se­cu­ri­ty for Trusted Plat­forms (DFG 2020-2022)
  • SAU­BER – phy­Si­cAl­ly se­cU­re re­con­fi­gura­BlE plat­foRm (DFG 2020-2024)
  • SecFS­ha­re – Se­cu­re Sharing of FPGAs in Clouds (DFG 2021-2024)
  • SSIMA – Scalable Side-Channel Immune Micro-Architecture (DFG 2024-2026)

Funded EU Pro­ject(s)

  • enCRYPTON – Twinning towards excellence for Privacy Enhancing Technologies leveraging Homomorphic Encryption (HORIZON-CSA 2022-2025)

Funded BMBF Pro­jects

  • Ve­ri­Sec- Com­pu­ter-As­sis­ted In­te­gra­ti­on and Ve­ri­fi­ca­ti­on of Mas­king in Cryp­to­gra­phic Im­ple­men­ta­ti­ons (BMBF 2017-2020)
  • Sys­Kit- A De­ve­lop­ment Tool for Se­cu­re Com­mu­ni­ca­ti­ons in In­dus­try 4.0 (BMBF 2017-2020)
  • mIND­FUL – In­tru­si­on De­tec­tion in In­dus­try 4.0 via Fu­si­on of Phy­si­cal Chan­nels using Ar­ti­fi­ci­al In­tel­li­gence (BMBF 2020-2023)
  • KOSEF – Cost-optimized and Effective Protection against Electromagnetic Fault Injection to Ensure Data and Operational Reliability in loT Systems. (BMBF 2022-2025)
  • DevToSCA – Developer-Centric Tools for Side-Channel Analysis (BMBF 2022-2025)
  • ProPair – Context-based Trust Initialization of Telemedicine Micro Devices (BMBF 2022-2025)

Teaching

  • 212415: MSc Lab Course “Side-Channel Analysis Attacks”
  • 211034: MSc Lecture “Physical Attacks and Countermeasures”
  • 141304: BSc Lecture “Digital Circuit Design” (Digitaltechnik)
  • 212126: BSc Seminar “Implementation Security”
  • 212126: MSc Seminar “Implementation Security”

Publications

  • PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
    Jannik Zeitschner, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2024, No. 3.
  • Automated Generation of Fault-Resistant Circuits
    Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2024, No. 3.
  • A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL
    Nicolai Müller, Daniel Lammers, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2024, No. 3.
  • JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
    Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2024, No. 2.
  • A Thorough Evaluation of RAMBAM
    Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’23). Association for Computing Machinery, 2023.
  • Automated Masking of FPGA-Mapped Designs
    Nicolai Müller, Sergej Meschkov, Dennis Gnad, Mehdi Tahoori, Amir Moradi, Conference on Field-Programmable Logic and Applications, FPL 2023.
  • PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
    Jannik Zeitschner, Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
  • Deep Learning Side-Channel Collision Attack
    Marvin Staib, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
  • Energy Consumption of Protected Cryptographic Hardware Cores – An Experimental Study
    Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi, 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023.
  • Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
    Endres Puschner, Thorben Moos, Christian Kison, Steffen Becker, Amir Moradi, Christof Paar, IEEE Symposium on Security and Privacy (SP), 2023.
  • Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
    Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 1, pp. 113-152.
  • Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits
    Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 2, pp. 266-288.
  • Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
    David Knichel, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vo. 2022, No. 3, pp. 114-140.
  • Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures
    Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 3, pp. 438-462.
  • Randomness Optimization for Gadget Compositions in Higher-Order Masking
    Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 188-227.
  • PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR Trans
    Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 311-348.
  • Second-Order Low-Randomness d + 1 Hardware Sharing of the AES
    Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 815-828, 2022.
  • Low-Latency Hardware Private Circuits
    David Knichel, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 1799-1812, 2022.
  • A Cautionary Note on Protecting Xilinx‘ UltraScale(+) Bitstream Encryption and Authentication Engine
    Maik Ender, Gregor Leander, Amir Moradi, Christof Paar, IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM),  pp. 1-9, 2022.
  • Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
    Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 125-128, 2022.
  • Does Aging Matter? The Curious Case of Fault Sensitivity Analysis
    Mohammad Ebrahimabadi, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi, International Symposium on Quality Electronic Design (ISQED), pp. 84-89, 2022.
  • Au­to­ma­ted Ge­ne­ra­ti­on of Mas­ked Hard­ware
    David Kni­chel, Amir Mo­ra­di, Ni­co­lai Mül­ler, Pas­cal Sas­d­rich – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 589-629.
  • Cryp­t­ana­ly­sis of Ef­fi­ci­ent Mas­ked Ciph­ers: Ap­p­li­ca­ti­ons to Low La­ten­cy
    Tim Beyne, Sie­men Dhoo­g­he, Amir Mo­ra­di, Aein Re­za­ei Shah­mir­za­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 679-721.
  • Ge­ne­ric Hard­ware Pri­va­te Cir­cuits – Towards Au­to­ma­ted Ge­ne­ra­ti­on of Com­po­sa­ble Se­cu­re Gad­gets
    David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 323-344.
  • Low-La­ten­cy Hard­ware Mas­king of PRIN­CE
    Ni­co­lai Mül­ler, Thor­ben Moos, Amir Mo­ra­di – 12th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2021, Luga­no, Swit­z­er­land, Oc­to­ber 25-27, 2021.
  • PUFs Phy­si­cal Le­arning: Ac­ce­le­ra­ting the En­roll­ment via De­lay-ba­sed Model Extrac­tion
    Anita Ag­haie, Maik Ender, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, Vol. 10, No. 3, pp. 1621-1632, 2021.
  • FIVER – Ro­bust Ve­ri­fi­ca­ti­on of Coun­ter­me­a­su­res against Fault In­jec­tions
    Jan Rich­ter-Brock­mann, Aein Re­za­ei Shah­mir­za­di, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 447-473.
  • Let’s Take it Off­line: Boos­ting Bru­te-Force At­tacks on iPho­ne’s User Au­then­ti­ca­ti­on through SCA
    Olek­siy Li­so­vets, David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 496-519.
  • Low-La­ten­cy Kec­cak at any Ar­bi­tra­ry Order
    Sara Zarei, Aein Re­za­ei Shah­mir­za­di, Hadi Solei­ma­ny, Ra­ziye Sala­rifard, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 388-411.
  • New First-Or­der Se­cu­re AES Per­for­mance Re­cords
    Aein Re­za­ei Shah­mir­za­di, Dušan Božilov, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 2, pp. 304-327.
  • Re-Con­so­li­da­ting First-Or­der Mas­king Sche­mes – Nul­li­fy­ing Fresh Ran­dom­ness
    Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 1, pp. 305-342.
  • Se­cond-Or­der SCA Se­cu­ri­ty with al­most no Fresh Ran­dom­ness
    Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 708-755.
  • Coun­ter­me­a­su­res against Sta­tic Power At­tacks – Com­pa­ring Ex­haus­ti­ve Logic Ba­lan­cing and Other Pro­tec­tion Sche­mes in 28 nm CMOS
    Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 780-805.
  • DL-LA: Deep Le­arning Le­a­ka­ge As­sess­ment: A mo­dern road­map for SCA eva­lua­ti­ons
    Thor­ben Moos, Felix We­ge­ner, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 552-598.
  • In­con­sis­ten­cy of Si­mu­la­ti­on and Prac­tice in De­lay-ba­sed Strong PUFs
    Anita Ag­haie, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 520-551.
  • The SPEE­DY Fa­mi­ly of Block Ciph­ers – En­gi­nee­ring an Ultra Low-La­ten­cy Ci­pher from Gate Level for Se­cu­re Pro­ces­sor Ar­chi­tec­tu­res
    Gre­gor Le­an­der, Thor­ben Moos, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 510-545.
  • Im­pecca­ble Cir­cuits III
    Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IEEE In­ter­na­tio­nal Test Con­fe­rence, ITC 2021, Oc­to­ber 10-15, 2021
  • Ba­lan­cing the Le­a­ka­ge Cur­rents in Na­no­me­ter CMOS Logic — A Chal­len­ging Goal
    Bijan Fada­ei­nia, Thor­ben Moos, Amir Mo­ra­di – Ap­p­lied Sci­en­ces Vol. 11, no. 15:7143, Spe­cial Issue on Side Chan­nel At­tacks in Em­bed­ded Sys­tems, 2021.
  • Mas­ked SABL: a Long Las­ting Si­de-Chan­nel Pro­tec­tion De­sign Me­tho­do­lo­gy
    Bijan Fada­ei­nia, Md Tou­fiq Hasan Anik, Nagh­meh Ka­ri­mi, Amir Mo­ra­di – IEEE Ac­cess, Vo­lu­me 9, Pages 90455 – 90464, 2021.
  • Re­al-World Snap­shots vs. Theo­ry: Ques­tio­ning the t-Pro­bing Se­cu­ri­ty Model
    Thilo Kra­chen­fels, Fa­te­meh Ganji, Amir Mo­ra­di, Shahin Tajik, Jean-Pier­re Sei­fert – IEEE Symposium on Security and Privacy (SP), pp. 1955-1971, 2021.
  • Au­to­ma­ted Mas­king of Soft­ware Im­ple­men­ta­ti­ons on In­dus­tri­al Micro­con­trol­lers
    Ar­nold Ab­rom­eit, Flo­ri­an Bache, Leon A. Be­cker, Marc Gour­jon, Tim Gü­ney­su, Sab­ri­na Jorn, Amir Mo­ra­di, Ma­xi­mi­li­an Orlt, Falk Schel­len­berg – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
  • Ste­althy Logic Mi­suse for Power Ana­ly­sis At­tacks in Mul­ti-Ten­ant FPGAs
    Den­nis R. E. Gnad, Vin­cent Mey­ers, Nguy­en Minh Dang, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
  • On the Im­pact of Aging on Power Ana­ly­sis At­tacks Tar­ge­ting Power-Equa­li­zed Cryp­to­gra­phic Cir­cuits
    Md Tou­fiq Hasan Anik, Bijan Fada­ei­nia, Amir Mo­ra­di, Nagh­meh Ka­ri­mi – 26th Asia and South Pa­ci­fic De­sign Au­to­ma­ti­on Con­fe­rence, ASP-DAC 2021, Ja­nu­a­ry 18-21, 2021.
  • SIL­VER – Sta­tis­ti­cal In­de­pen­dence and Le­a­ka­ge Ve­ri­fi­ca­ti­on
    David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – 26th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­on of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2020, De­cem­ber 6-10, 2020.
  • Clock Glitch ver­sus SIFA
    Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – 33rd IEEE In­ter­na­tio­nal Sym­po­si­um on De­fect and Fault To­leran­ce in VLSI and Na­no­tech­no­lo­gy Sys­tems, DFT 2020, ESA-ES­RIN, Fras­ca­ti, Italy, Oc­to­ber 19-21, 2020.
  • The Un­patcha­ble Si­li­con: A Full Break of the Bit­stream En­cryp­ti­on of Xi­l­inx 7-Se­ries FPGAs
    Maik Ender, Amir Mo­ra­di, Chris­tof Paar – 29th USE­NIX Se­cu­ri­ty Sym­po­si­um (USE­NIX Se­cu­ri­ty 20), Bos­ton, MA, USA, Au­gust 12-14, 2020. Dis­tin­gu­is­hed Paper Award
  • Im­pecca­ble Cir­cuits II
    Aein Re­za­ei Shah­mir­za­di, Shahram Ra­so­olz­adeh, Amir Mo­ra­di – 57th An­nual De­sign Au­to­ma­ti­on Con­fe­rence 2020, DAC 2020, San Fran­cis­co, CA, USA, July 19-23, 2020.
  • Light­weight Ciph­ers on a 65 nm ASIC – A Com­pa­ra­ti­ve Study on En­er­gy Con­sump­ti­on
    Bas­ti­an Rich­ter, Amir Mo­ra­di – IEEE Com­pu­ter So­cie­ty An­nual Sym­po­si­um on VLSI (IS­VL­SI) 2020, Li­mas­sol, CY­PRUS, July 6-8, 2020.
  • The Risk of Out­sour­cing: Hi­d­den SCA Tro­jans in Third-Par­ty IP-Cores Threa­ten Cryp­to­gra­phic ICs
    David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – 25th IEEE Eu­ropean Test Sym­po­si­um, Tal­lin, Es­to­nia, May 25-29, 2020.
  • Tem­pla­te at­tacks on na­no-sca­le CMOS de­vices
    Bas­ti­an Rich­ter, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 10, pages 275–285, 2020.
  • Cryp­to­gra­phic Fault Dia­gno­sis using VerFI
    Vic­tor Ar­ri­bas, Felix We­ge­ner, Amir Mo­ra­di, Svet­la Ni­ko­va – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2020, San Jose, USA, May 4-7, 2020.
  • Si­de-Chan­nel Hard­ware Tro­jan for Prov­a­b­ly-Se­cu­re SCA-Pro­tec­ted Im­ple­men­ta­ti­ons
    Sa­ma­neh Ghan­da­li, Thor­ben Moos, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, Vo­lu­me 28, Issue 6, 2020.
  • TI-PUF: Toward Si­de-Chan­nel Re­sis­tant Phy­si­cal Un­clonable Func­tions
    Anita Ag­haie, Amir Mo­ra­di – IEEE Tran­sac­tions on In­for­ma­ti­on Fo­ren­sics and Se­cu­ri­ty, Vo­lu­me 15, Pages 3470 – 3481, 2020.
  • 3-Pha­se Adia­ba­tic Logic and its Sound SCA Eva­lua­ti­on
    Bijan Fada­ei­nia, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, vol. 9, no. 4, pp. 2175-2188, 2020.
  • Spin Me Right Round Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES: Ex­ten­ded Ver­si­on
    Felix We­ge­ner, Lau­ren De Meyer, Amir Mo­ra­di – Jour­nal of Cryp­to­lo­gy vo­lu­me 33, pages 1114–1155, 2020.
  • Re­mo­te Elec­tri­cal-le­vel Se­cu­ri­ty Thre­ats to Mul­ti-Ten­ant FPGAs
    Den­nis R.E. Gnad, Falk Schel­len­berg, Jonas Kraut­ter, Amir Mo­ra­di, Mehdi B. Taho­o­ri – IEEE De­sign & Test, Vo­lu­me 37, Issue 2, April 2020.
  • A Com­pa­ri­son of χ²-Test and Mu­tu­al In­for­ma­ti­on as Dis­tin­gu­is­her for Si­de-Chan­nel Ana­ly­sis
    Bas­ti­an Rich­ter, David Kni­chel, Amir Mo­ra­di – 18th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2019, Pra­gue, Czech Re­pu­blic, No­vem­ber 11-13, 2019.
  • Ac­tive Fen­ces against Vol­ta­ge-ba­sed Side Chan­nels in Mul­ti-Ten­ant FPGAs
    Jonas Kraut­ter, Den­nis Gnad, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
  • Au­to­ma­ted Probe Re­po­si­tio­ning for On-Die EM Me­a­su­re­ments
    Bas­ti­an Rich­ter, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
  • Im­pecca­ble Cir­cuits
    Anita Ag­haie, Amir Mo­ra­di, Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Falk Schel­len­berg, To­bi­as Schnei­der – IEEE Tran­sac­tions on Com­pu­ters, 2019.
  • Sta­tic Power Si­de-Chan­nel Ana­ly­sis – An In­ves­ti­ga­ti­on of Me­a­su­re­ment Fac­tors
    Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, 2019.
  • Ex­plo­ring the Ef­fect of De­vice Aging on Sta­tic Power Ana­ly­sis At­tacks
    Nagh­meh Ka­ri­mi, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 3, pp 233-256, 2019.
  • Glitch-Re­sis­tant Mas­king Re­vi­si­ted or Why Pro­ofs in the Ro­bust Pro­bing Model are Nee­ded
    Thor­ben Moos, Amir Mo­ra­di, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 2, pp 256-292, 2019. best paper award
  • Shuf­fle and Mix: On the Dif­fu­si­on of Ran­dom­ness in Thres­hold Im­ple­men­ta­ti­ons of Kec­cak
    Felix We­ge­ner, Chris­ti­an Bai­ker, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2019, Darm­stadt, Ger­ma­ny, April 3-5, 2019.
  • CRAFT: Light­weight Twe­a­ka­ble Block Ci­pher with Ef­fi­ci­ent Pro­tec­tion Against DFA At­tacks
    Chris­tof Bei­er­le, Gre­gor Le­an­der, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp 5-45, 2019.
  • Yet Ano­ther Size Re­cord for AES: A First-Or­der SCA Se­cu­re AES S-box Based on GF(2^8) Mul­ti­pli­ca­ti­on
    Felix We­ge­ner, Amir Mo­ra­di – 17th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2018, Mont­pel­lier, Fran­ce, No­vem­ber 12-14, 2018.
  • Re­mo­te In­ter-Chip Power Ana­ly­sis Si­de-Chan­nel At­tacks at Board-Le­vel
    Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2018, San Diego, CA, USA, No­vem­ber 5-8, 2018.
  • Hard­ware Mas­king, Re­vi­si­ted
    Tho­mas De Cnud­de, Maik Ender, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 2, pp 123-148, 2018.
  • Le­a­ka­ge De­tec­tion with the χ²-Test
    Amir Mo­ra­di, Bas­ti­an Rich­ter, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 1, pp 209-237, 2018.
  • Spin Me Right Round – Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES
    Lau­ren De Meyer, Amir Mo­ra­di, Felix We­ge­ner – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 3, pp 596-626, 2018.
  • Thres­hold Im­ple­men­ta­ti­on in Soft­ware – Case Study of PRE­SENT
    Pas­cal Sas­d­rich, Rene Bock, Amir Mo­ra­di – 9th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
  • A First-Or­der SCA Re­sis­tant AES wi­thout Fresh Ran­dom­ness
    Felix We­ge­ner, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
  • An In­si­de Job: Re­mo­te Power Ana­ly­sis At­tacks on FPGAs
    Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2018, Dres­den, Ger­ma­ny, March 18 – 23 , 2018. best paper can­di­da­te.
  • Bit­stream Fault In­jec­tions (BiFI) – Au­to­ma­ted Fault At­tacks against SRAM-ba­sed FPGAs
    Pawel Swier­czyn­ski, Georg T. Be­cker, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 348-360, 2018.Gli­F­reD: Glitch-Free Du­pli­ca­ti­on – Towards Power-Equa­li­zed Cir­cuits on FPGAs
    Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 375-387, 2018.
  • The First Tho­rough Si­de-Chan­nel Hard­ware Tro­jan
    Maik Ender, Sa­ma­neh Ghan­da­li, Amir Mo­ra­di, Chris­tof Paar – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2017, Hong Kong, China, De­cem­ber 3 – 7, 2017.
  • Bit-Sli­ding: A Ge­ne­ric Tech­ni­que for Bit-Se­ri­al Im­ple­men­ta­ti­ons of SPN-ba­sed Pri­mi­ti­ves
    Jérémy Jean, Amir Mo­ra­di, Tho­mas Pey­rin, Pas­cal Sas­d­rich – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2017, Tai­pei, Tai­wan, Sep­tem­ber 25 – 28, 2017.
  • On the Ea­si­ness of Turning Hig­her-Or­der Le­a­ka­ges into First-Or­der
    Thor­ben Moos, Amir Mo­ra­di – 8th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
  • SafeDRP: Yet Ano­ther Way Toward Power-Equa­li­zed De­signs in FPGA
    Maik Ender, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
  • SPARX – A Si­de-Chan­nel Pro­tec­ted Pro­ces­sor for ARX-ba­sed Cryp­to­gra­phy
    Flo­ri­an Bache, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017.
  • Sta­tic Power Si­de-Chan­nel Ana­ly­sis of a Thres­hold Im­ple­men­ta­ti­on Pro­to­ty­pe Chip
    Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017. best paper can­di­da­te.
  • Hiding Hig­her-Or­der Si­de-Chan­nel Le­a­ka­ge – Ran­do­mi­zing Cryp­to­gra­phic Im­ple­men­ta­ti­ons in Re­con­fi­gura­ble Hard­ware
    Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – RSA Con­fe­rence Cryp­to­graph­ers’ Track, CT-RSA 2017, San Fran­cis­co, Fe­bru­ary 14-17 2017.
  • Si­de-Chan­nel Ana­ly­sis Pro­tec­tion and Low-La­ten­cy in Ac­tion – case study of PRIN­CE and Mi­do­ri
    Amir Mo­ra­di, To­bi­as Schnei­der – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2016, Hanoi, Viet­nam, De­cem­ber 4 – 8, 2016.
  • Mo­ments-Cor­re­la­ting DPA
    Amir Mo­ra­di, François-Xa­vier Stan­da­ert – Theo­ry of Im­ple­men­ta­ti­on Se­cu­ri­ty (TIs) Work­shop (of ACM CCS 2016), Vi­en­na, Aus­tria, Oc­to­ber 24, 2016.
  • Strong 8-bit Sbo­xes with Ef­fi­ci­ent Mas­king in Hard­ware
    Erik Boss, Vin­cent Gros­so, Tim Gü­ney­su, Gre­gor Le­an­der, Amir Mo­ra­di, To­bi­as Schnei­der – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 17 – 19, 2016.
  • ParTI – Towards Com­bined Hard­ware Coun­ter­me­a­su­res against Si­de-Chan­nel and Fault-In­jec­tion At­tacks
    To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
  • The SKIN­NY Fa­mi­ly of Block Ciph­ers and its Low-La­ten­cy Va­ri­ant MAN­TIS
    Chris­tof Bei­er­le, Jérémy Jean, Ste­fan Kölbl, Gre­gor Le­an­der, Amir Mo­ra­di, Tho­mas Pey­rin, Yu Sasa­ki, Pas­cal Sas­d­rich, Siang Meng Sim – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
  • Brid­ging the Gap: Ad­van­ced Tools for Si­de-Chan­nel Le­a­ka­ge Esti­ma­ti­on bey­ond Gaus­si­an Tem­pla­tes and His­to­grams
    To­bi­as Schnei­der, Amir Mo­ra­di, François-Xa­vier Stan­da­ert, Tim Gü­ney­su – 23nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2016, St. John’s, NL, Ca­na­da, Au­gust 10–12, 2016.
  • In­ter­dic­tion in Prac­tice – Hard­ware Tro­jan Against a High-Se­cu­ri­ty USB Flash Drive
    Pawel Swier­czyn­ski, Marc Fyr­bi­ak, Phil­ipp Koppe, Amir Mo­ra­di, Chris­tof Paar – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Sprin­ger, June 2016.
  • Large Laser Spots and Fault Sen­si­ti­vi­ty Ana­ly­sis
    Falk Schel­len­berg, Mar­kus Fin­kel­dey, Nils C. Ger­hardt, Mar­tin R. Hof­mann , Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2016, McLe­an, VA, USA, May 3-5, 2016. best student-pa­per award.
  • Im­pro­ved Si­de-Chan­nel Ana­ly­sis At­tacks on Xi­l­inx Bit­stream En­cryp­ti­on of 5, 6, and 7 Se­ries
    Amir Mo­ra­di, To­bi­as Schnei­der – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
  • Ro­bust and One-Pass Par­al­lel Com­pu­ta­ti­on of Cor­re­la­ti­on-Ba­sed At­tacks at Ar­bi­tra­ry Order
    To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
  • Whi­te-Box Cryp­to­gra­phy in the Gray Box – A Hard­ware Im­ple­men­ta­ti­on and its Side Chan­nels
    Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 23rd In­ter­na­tio­nal Con­fe­rence on Fast Soft­ware En­cryp­ti­on, FSE 2016, Bo­chum, Ger­ma­ny, March 20-23 2016.
  • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – Ex­ten­ded Ver­si­on
    To­bi­as Schnei­der, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring June 2016, Vo­lu­me 6, Issue 2, pp 85–99.
  • As­sess­ment of Hiding the Hig­her-Or­der Le­a­ka­ges in Hard­ware – what are the achie­ve­ments ver­sus over­heads?
    Amir Mo­ra­di, Alex­an­der Wild – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015. best paper can­di­da­te.
  • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – a clear road­map for si­de-chan­nel eva­lua­ti­ons
    To­bi­as Schnei­der, Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015.
  • Af­fi­ne Equi­va­lence and its Ap­p­li­ca­ti­on to Tigh­te­ning Thres­hold Im­ple­men­ta­ti­ons
    Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 22nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2015, Mount All­i­son Uni­ver­si­ty Sack­vil­le, New Bruns­wick, Ca­na­da, Au­gust 12-14 2015.
  • Ad­van­ces in Si­de-Chan­nel Se­cu­ri­ty
    Amir Mo­ra­di – Ha­bi­li­ta­ti­on The­sis, Ruhr University Bochum, Germany, 2015.
  • Arith­me­tic Ad­di­ti­on over Boo­le­an Mas­king – Towards First- and Se­cond-Or­der Re­sis­tan­ce in Hard­ware
    To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2015, New York, USA, 2–5 June 2015.
  • Achie­ving Si­de-Chan­nel Pro­tec­tion with Dy­na­mic Logic Re­con­fi­gu­ra­ti­on on Mo­dern FPGAs
    Pas­cal Sas­d­rich, Amir Mo­ra­di, Oli­ver Misch­ke, Tim Gü­ney­su – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2015, McLe­an, VA, USA, May 5-7, 2015.
  • A Hard­ware-ba­sed Coun­ter­me­a­su­re to Re­du­ce Si­de-Chan­nel Le­a­ka­ge – De­sign, Im­ple­men­ta­ti­on, and Eva­lua­ti­on
    An­dre­as Gor­nik, Amir Mo­ra­di, Jür­gen Oehm, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ter-Ai­ded De­sign of In­te­gra­ted Cir­cuits and Sys­tems, Vol. 34, No.8, pages 1308-1319, 2015.
  • Eva­lua­ting the Du­pli­ca­ti­on of Du­al-Rail Prech­ar­ge Lo­gics on FPGAs
    Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
  • Si­de-Chan­nel Pro­tec­tion by Ran­do­mi­zing Look-Up Ta­bles on Re­con­fi­gura­ble Hard­ware – Pit­falls of Me­mo­ry Pri­mi­ti­ves
    Pas­cal Sas­d­rich, Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
  • Si­de-Chan­nel Se­cu­ri­ty Ana­ly­sis of Ul­tra-Low-Power FRAM-ba­sed MCUs
    Amir Mo­ra­di, Ge­si­ne Hin­ter­wäl­der – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015. best pa­per award.
  • Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?
    San­tos Me­ri­no Del Pozo, François-Xa­vier Stan­da­ert, Dina Kamel, Amir Mo­ra­di – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 – 13 , 2015.
  • Wire-Tap Codes as Si­de-Chan­nel Coun­ter­me­a­su­re – an FP­GA-ba­sed ex­pe­ri­ment
    Amir Mo­ra­di – 15th In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in India, In­docrypt 2014, New Delhi, De­cem­ber 14 – 17, 2014.
  • Phy­si­cal Se­cu­ri­ty Eva­lua­ti­on of the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II and Stra­tix III FPGAs
    Pawel Swier­czyn­ski, Amir Mo­ra­di, David Os­wald, Chris­tof Paar – ACM Tran­sac­tions on Re­con­fi­gura­ble Tech­no­lo­gy and Sys­tems (TRETS), Vo­lu­me 7 Issue 4, De­cem­ber 2014.
  • Full-Si­ze High-Se­cu­ri­ty ECC Im­ple­men­ta­ti­on on MSP430 Micro­con­trol­lers
    Ge­si­ne Hin­ter­wäl­der, Amir Mo­ra­di, Micha­el Hut­ter, Peter Schwa­be, Chris­tof Paar – Third In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty in Latin Ame­ri­ca, La­tin­crypt 2014, Flo­ri­anópolis, Bra­zil, Sep­tem­ber 17 – 19, 2014.
  • Early Pro­pa­ga­ti­on and Im­ba­lan­ced Rou­ting, How to Di­mi­nish in FPGAs
    Amir Mo­ra­di, Vin­cent Imm­ler – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
  • Si­de-Chan­nel Le­a­ka­ge through Sta­tic Power – Should We Care about in Prac­tice?
    Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
  • Fault Sen­si­ti­vi­ty Ana­ly­sis Meets Ze­ro-Va­lue At­tack
    Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2014, Busan, Korea, Sep­tem­ber 23, 2013.
  • De­tec­ting Hi­d­den Le­a­ka­ges
    Amir Mo­ra­di, Syl­vain Guil­ley, An­ne­lie Heu­ser – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2014, Lausan­ne, Swit­z­er­land, June 10 – 13, 2014. best-pa­per award.
  • Com­pre­hen­si­ve Eva­lua­ti­on of AES Dual Ciph­ers as a Si­de-Chan­nel Coun­ter­me­a­su­re
    Amir Mo­ra­di, Oli­ver Misch­ke – In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, ICICS 2013, Bei­jing, China, No­vem­ber 20 – 22, 2013.
  • One At­tack to Rule Them All: Col­li­si­on Ti­ming At­tack ver­sus 42 AES ASIC Cores
    Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 62, no. 9, pp. 1786-1798, Sept. 2013.
  • On the Sim­pli­ci­ty of Con­ver­ting Le­a­ka­ges from Mul­ti­va­ria­te to Uni­va­ria­te – Case Study of a Glitch-Re­sis­tant Mas­king Sche­me
    Amir Mo­ra­di, Oli­ver Misch­ke – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 – 23, 2013.
  • At­ta­cking Atmel’s Cryp­to­M­emo­ry EE­PROM with Spe­cial-Pur­po­se Hard­ware
    Alex­an­der Wild, Tim Gü­ney­su, Amir Mo­ra­di – Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – 11th In­ter­na­tio­nal Con­fe­rence, ACNS 2013, Banff, AB, Ca­na­da, June 25-28, 2013.
  • Si­de-Chan­nel At­tacks on the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II – Fa­ci­li­ta­ting Black-Box Ana­ly­sis using Soft­ware Re­ver­se-En­gi­nee­ring
    Amir Mo­ra­di, David Os­wald, Chris­tof Paar, Pawel Swier­czyn­ski – 21st ACM/SIGDA In­ter­na­tio­nal Sym­po­si­um on Field-Pro­gramma­ble Gate Ar­rays- FPGA 2013, pages 91-100, Fe­bru­ary 11 – 13. ACM, 2013.
  • Side Chan­nels as Buil­ding Blocks
    Mar­kus Kas­per, Amir Mo­ra­di, Georg T. Be­cker, Oli­ver Misch­ke, Tim Gü­ney­su, Chris­tof Paar, Wayne Bur­le­son – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 2, Num­ber 3, pages 143-159, 2012, Sprin­ger.
  • How Far Should Theo­ry be from Prac­tice? – Eva­lua­ti­on of a Coun­ter­me­a­su­re
    Amir Mo­ra­di, Oli­ver Misch­ke – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2012 – 14th In­ter­na­tio­nal Work­shop, Leu­ven, Bel­gi­um, Sep­tem­ber 9-12, 2012.
  • Glitch-Free Im­ple­men­ta­ti­on of Mas­king in Mo­dern FPGAs
    Amir Mo­ra­di, Oli­ver Misch­ke – 2012 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust, HOST 2012, San Fran­cis­co, CA, USA, June 3-4, 2012.
  • Sta­tis­ti­cal Tools Fla­vor Si­de-Chan­nel Col­li­si­on At­tacks
    Amir Mo­ra­di – Ad­van­ces in Cryp­to­lo­gy – EU­RO­CRYPT 2012 – 31th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Cam­bridge, United King­dom, April 15-19, 2012, pages 428-445.
  • Black-Box Si­de-Chan­nel At­tacks High­light the Im­port­an­ce of Coun­ter­me­a­su­res – An Ana­ly­sis of the Xi­l­inx Vir­tex-4 and Vir­tex-5 Bit­stream En­cryp­ti­on Me­cha­nism
    Amir Mo­ra­di, Mar­kus Kas­per, Chris­tof Paar – To­pics in Cryp­to­lo­gy – CT-RSA 2012 – The Cryp­to­graph­ers‘ Track at the RSA Con­fe­rence, San Fran­cis­co, CA, USA, Fe­bru­ary 27- March 2, 2012, pages 1-18.
  • Prak­ti­sche An­grif­fe auf die Bit­strom­ver­schlüs­se­lung von Xi­l­inx FPGAs
    Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – Da­ten­schutz und Da­ten­si­cher­heit – DuD – Aus­ga­be 11/2011.
  • On the Vul­nerabi­li­ty of FPGA Bit­stream En­cryp­ti­on against Power Ana­ly­sis At­tacks – Extrac­ting Keys from Xi­l­inx Vir­tex-II FPGAs
    Amir Mo­ra­di, Ales­san­dro Ba­renghi, Timo Kas­per, Chris­tof Paar – 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, CCS 2011, Chi­ca­go, IL, USA, Oc­to­ber 17-21, 2011, pages 111-124.
  • Ge­ne­ric Si­de-Chan­nel Coun­ter­me­a­su­res for Re­con­fi­gura­ble De­vices
    Tim Gü­ney­su, Amir Mo­ra­di – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
  • On the Power of Fault Sen­si­ti­vi­ty Ana­ly­sis and Col­li­si­on Si­de-Chan­nel At­tacks in a Com­bined Set­ting
    Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar, Yang Li, Kazuo Ohta, Kazuo Sa­kiyama – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
  • Mas­ked Du­al-Rail Prech­ar­ge Logic En­coun­ters Sta­te-of-the-Art Power Ana­ly­sis Me­thods
    Amir Mo­ra­di, Mario Kirsch­baum, Tho­mas Ei­sen­barth, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on Sys­tems, Vo­lu­me 20 , Issue 9, Pages 1578 – 1589, 2012.
  • Prac­tical Eva­lua­ti­on of DPA Coun­ter­me­a­su­res on Re­con­fi­gura­ble Hard­ware
    Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – HOST 2011, Pro­cee­dings of the 2011 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST), 5-6 June 2011, San Diego, Ca­li­for­nia, USA.
  • Pus­hing the Li­mits: A Very Com­pact and a Thres­hold Im­ple­men­ta­ti­on of AES
    Amir Mo­ra­di, Dipl.-Kfm. Axel Po­sch­mann, San Ling, Chris­tof Paar, Hua­xi­ong Wang – Ad­van­ces in Cryp­to­lo­gy – EU­ROCRYPT 2011 – 30th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Tal­linn, Es­to­nia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger.
  • Si­de-Chan­nel Re­sis­tant Cryp­to for less than 2,300 GE
    Axel Po­sch­mann, Amir Mo­ra­di, Khoong­ming Khoo, Chu-Wee Lim, Hua­xi­ong Wang, San Ling – Jour­nal of Cryp­to­lo­gy, Spe­cial Issue on Hard­ware and Se­cu­ri­ty, Vo­lu­me 24, Num­ber 2, pages 322-345, April 2011.
  • Si­de-chan­nel based wa­ter­marks for IP Pro­tec­tion
    Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – CO­SA­DE 2010 – First In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign.
  • Cor­re­la­ti­on-En­han­ced Power Ana­ly­sis Col­li­si­on At­tack
    Amir Mo­ra­di, Oli­ver Misch­ke, Tho­mas Ei­sen­barth – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2010, 12th In­ter­na­tio­nal Work­shop, Santa Bar­ba­ra, CA, USA, Au­gust 17-20, 2010. Pro­cee­dings
  • Si­de-chan­nel based wa­ter­marks for in­te­gra­ted cir­cuits
    Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST 2010), Ana­heim­CA , USA, 13-14 June 2010.
  • Prac­tical Power Ana­ly­sis At­tacks on Soft­ware Im­ple­men­ta­ti­ons of McE­lie­ce
    Ste­fan Heyse, Amir Mo­ra­di, Chris­tof Paar – Post-Quan­tum Cryp­to­gra­phy, Third In­ter­na­tio­nal Work­shop, PQCryp­to 2010, Darm­stadt, Ger­ma­ny, May 25-28, 2010. Pro­cee­dings
  • Light­weight Cryp­to­gra­phy and DPA Coun­ter­me­a­su­res: A Sur­vey
    Amir Mo­ra­di, Axel Po­sch­mann – First In­ter­na­tio­nal Work­shop on Light­weight Cryp­to­gra­phy for Re­sour­ce-Cons­trained De­vices, WLC 2010 (co-lo­ca­ted with Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty – FC 2010), Te­ne­ri­fe, Cana­ry Is­lands, Spain, Ja­nu­ar 25-28, 2010.
  • A New Re­mo­te Key­less Entry Sys­tem Re­sis­tant to Power Ana­ly­sis At­tacks
    Amir Mo­ra­di, Timo Kas­per – 7th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on, Com­mu­ni­ca­ti­ons and Si­gnal Pro­ces­sing, ICICS 2009, Macau, China, December 7-10, 2009.
  • Power Ana­ly­sis of Sin­gle-Rail Sto­r­a­ge Ele­ments as used in MDPL
    Amir Mo­ra­di, Tho­mas Ei­sen­barth, Dipl.-Kfm. Axel Po­sch­mann, Chris­tof Paar – 12th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy – ICISC 2009, Seoul, Korea, De­cem­ber 2-4, 2009.
  • Kee­Loq and Si­de-Chan­nel Ana­ly­sis – Evo­lu­ti­on of an At­tack
    Chris­tof Paar, Tho­mas Ei­sen­barth, Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di – 6th IEEE Work­shop on Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2009.Lausan­ne, Swit­z­er­land, Sep­tem­ber 6, 2009.
  • A Com­pa­ra­ti­ve Study of Mu­tu­al In­for­ma­ti­on Ana­ly­sis under a Gaus­si­an As­sump­ti­on
    Amir Mo­ra­di, Nima Mou­sa­vi, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh – 10th In­ter­na­tio­nal Work­shop on In­for­ma­ti­on Se­cu­ri­ty Ap­p­li­ca­ti­ons, WISA 2009, Busan, Korea. Au­gust 25-27, 2009.
  • Brea­king Kee­Loq in a Flash: On Extrac­ting Keys at Light­ning Speed
    Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – 2nd In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in Af­ri­ca, Pro­gress in Cryp­to­lo­gy – AF­RI­CA­CRYPT 2009, Gam­marth, Tu­ni­sia, 21-25 Juni, 2009.
  • Dual-rail transition logic: A logic style for counteracting power analysis attacks
    Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh, Computers & Electrical Engineering, Volume 35, Issue 2, Pages 359-369, 2009.
  • Vulnerability modeling of cryptographic hardware to power analysis attacks
    Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth, Integration, Volume 42, Issue 4, Pages 468-478, 2009.
  • Charge recovery logic as a side channel attack countermeasure
    Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, 10th International Symposium on Quality Electronic Design (ISQED), pp. 686-691, 2009.
  • A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
    Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh, Information Security Applications, 10th International Workshop (WISA), Lecture Notes in Computer Science, vol 5932., pp. 193-205, 2009.
  • On the Power of Power Ana­ly­sis in the Real World: A Com­ple­te Break of the Kee­Loq Code Hop­ping Sche­me
    Tho­mas Ei­sen­barth, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh, Mo­ham­mad T. Man­zu­ri Shal­ma­ni – 28th In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence — CRYP­TO 2008. Santa Bar­ba­ra, Ca­li­for­nia, USA. Au­gust 17-21, 2008.
  • Sus­cep­ti­bi­li­ty of eS­TREAM Can­di­da­tes towards Side Chan­nel Ana­ly­sis
    Be­ne­dikt Gier­lichs, Lejla Ba­ti­na, Chris­to­phe Cla­vier, Tho­mas Ei­sen­barth, Aline Gouget, He­le­na Hand­schuh, Timo Kas­per, Kers­tin Lem­ke-Rust, Ste­fan Man­gard, Amir Mo­ra­di, Eli­sa­beth Os­wald – The State of the Art of Stream Ciph­ers, SASC 2008, Lausan­ne, Swit­z­er­land. Fe­bru­ar, 13-14 2008.
  • On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
    Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6., pp. 661-670, 2008.
  • A secure and low-energy logic style using charge recovery approach
    Mehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, international symposium on Low Power Electronics & Design (ISLPED ’08). Association for Computing Machinery, pp. 259-264, 2008.
  • Compact and Secure Design of Masked AES S-Box
    Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani, Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861, pp. 216-229, 2007.
  • Power Analysis Attacks on MDPL and DRSL Implementations
    Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Information Security and Cryptology – ICISC 2007. Lecture Notes in Computer Science, vol 4817, pp. 259-272, 2007.
  • A Generalized Method of Differential Fault Attack Against AES Cryptosystem
    Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, Cryptographic Hardware and Embedded Systems – CHES 2006. Lecture Notes in Computer Science, vol 4249, pp. 91-100, 2006.

Publications

  • 2023
    • PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries
      Jannik Zeitschner, Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
    • Deep Learning Side-Channel Collision Attack
      Marvin Staib, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
    • Energy Consumption of Protected Cryptographic Hardware Cores – An Experimental Study
      Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi, 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023.
    • Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
      Endres Puschner, Thorben Moos, Christian Kison, Steffen Becker, Amir Moradi, Christof Paar, IEEE Symposium on Security and Privacy (SP), 2023.
    • Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
      Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 1, pp. 113-152.
  • 2022
    • Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits
      Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 2, pp. 266-288.
    • Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
      David Knichel, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vo. 2022, No. 3, pp. 114-140.
    • Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures
      Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 3, pp. 438-462.
    • Randomness Optimization for Gadget Compositions in Higher-Order Masking
      Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 188-227.
    • PROLEAD A Probing-Based Hardware Leakage Detection Tool. IACR Trans
      Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 311-348.
    • Second-Order Low-Randomness d + 1 Hardware Sharing of the AES
      Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 815-828, 2022.
    • Low-Latency Hardware Private Circuits
      David Knichel, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 1799-1812, 2022.
    • A Cautionary Note on Protecting Xilinx‘ UltraScale(+) Bitstream Encryption and Authentication Engine
      Maik Ender, Gregor Leander, Amir Moradi, Christof Paar, IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM),  pp. 1-9, 2022.
    • Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines
      Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 125-128, 2022.
    • Does Aging Matter? The Curious Case of Fault Sensitivity Analysis
      Mohammad Ebrahimabadi, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi, International Symposium on Quality Electronic Design (ISQED), pp. 84-89, 2022.
    • Au­to­ma­ted Ge­ne­ra­ti­on of Mas­ked Hard­ware
      David Kni­chel, Amir Mo­ra­di, Ni­co­lai Mül­ler, Pas­cal Sas­d­rich – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 589-629.
    • Cryp­t­ana­ly­sis of Ef­fi­ci­ent Mas­ked Ciph­ers: Ap­p­li­ca­ti­ons to Low La­ten­cy
      Tim Beyne, Sie­men Dhoo­g­he, Amir Mo­ra­di, Aein Re­za­ei Shah­mir­za­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 679-721.
    • Ge­ne­ric Hard­ware Pri­va­te Cir­cuits – Towards Au­to­ma­ted Ge­ne­ra­ti­on of Com­po­sa­ble Se­cu­re Gad­gets
      David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 323-344.
  • 2021
    • Low-La­ten­cy Hard­ware Mas­king of PRIN­CE
      Ni­co­lai Mül­ler, Thor­ben Moos, Amir Mo­ra­di – 12th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2021, Luga­no, Swit­z­er­land, Oc­to­ber 25-27, 2021.
    • PUFs Phy­si­cal Le­arning: Ac­ce­le­ra­ting the En­roll­ment via De­lay-ba­sed Model Extrac­tion
      Anita Ag­haie, Maik Ender, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, Vol. 10, No. 3, pp. 1621-1632, 2021.
    • FIVER – Ro­bust Ve­ri­fi­ca­ti­on of Coun­ter­me­a­su­res against Fault In­jec­tions
      Jan Rich­ter-Brock­mann, Aein Re­za­ei Shah­mir­za­di, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 447-473.
    • Let’s Take it Off­line: Boos­ting Bru­te-Force At­tacks on iPho­ne’s User Au­then­ti­ca­ti­on through SCA
      Olek­siy Li­so­vets, David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 496-519.
    • Low-La­ten­cy Kec­cak at any Ar­bi­tra­ry Order
      Sara Zarei, Aein Re­za­ei Shah­mir­za­di, Hadi Solei­ma­ny, Ra­ziye Sala­rifard, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 388-411.
    • New First-Or­der Se­cu­re AES Per­for­mance Re­cords
      Aein Re­za­ei Shah­mir­za­di, Dušan Božilov, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 2, pp. 304-327.
    • Re-Con­so­li­da­ting First-Or­der Mas­king Sche­mes – Nul­li­fy­ing Fresh Ran­dom­ness
      Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 1, pp. 305-342.
    • Se­cond-Or­der SCA Se­cu­ri­ty with al­most no Fresh Ran­dom­ness
      Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 708-755.
    • Coun­ter­me­a­su­res against Sta­tic Power At­tacks – Com­pa­ring Ex­haus­ti­ve Logic Ba­lan­cing and Other Pro­tec­tion Sche­mes in 28 nm CMOS
      Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 780-805.
    • DL-LA: Deep Le­arning Le­a­ka­ge As­sess­ment: A mo­dern road­map for SCA eva­lua­ti­ons
      Thor­ben Moos, Felix We­ge­ner, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 552-598.
    • In­con­sis­ten­cy of Si­mu­la­ti­on and Prac­tice in De­lay-ba­sed Strong PUFs
      Anita Ag­haie, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 520-551.
    • The SPEE­DY Fa­mi­ly of Block Ciph­ers – En­gi­nee­ring an Ultra Low-La­ten­cy Ci­pher from Gate Level for Se­cu­re Pro­ces­sor Ar­chi­tec­tu­res
      Gre­gor Le­an­der, Thor­ben Moos, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 510-545.
    • Im­pecca­ble Cir­cuits III
      Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IEEE In­ter­na­tio­nal Test Con­fe­rence, ITC 2021, Oc­to­ber 10-15, 2021
    • Ba­lan­cing the Le­a­ka­ge Cur­rents in Na­no­me­ter CMOS Logic — A Chal­len­ging Goal
      Bijan Fada­ei­nia, Thor­ben Moos, Amir Mo­ra­di – Ap­p­lied Sci­en­ces Vol. 11, no. 15:7143, Spe­cial Issue on Side Chan­nel At­tacks in Em­bed­ded Sys­tems, 2021.
    • Mas­ked SABL: a Long Las­ting Si­de-Chan­nel Pro­tec­tion De­sign Me­tho­do­lo­gy
      Bijan Fada­ei­nia, Md Tou­fiq Hasan Anik, Nagh­meh Ka­ri­mi, Amir Mo­ra­di – IEEE Ac­cess, Vo­lu­me 9, Pages 90455 – 90464, 2021.
    • Re­al-World Snap­shots vs. Theo­ry: Ques­tio­ning the t-Pro­bing Se­cu­ri­ty Model
      Thilo Kra­chen­fels, Fa­te­meh Ganji, Amir Mo­ra­di, Shahin Tajik, Jean-Pier­re Sei­fert – IEEE Symposium on Security and Privacy (SP), pp. 1955-1971, 2021.
    • Au­to­ma­ted Mas­king of Soft­ware Im­ple­men­ta­ti­ons on In­dus­tri­al Micro­con­trol­lers
      Ar­nold Ab­rom­eit, Flo­ri­an Bache, Leon A. Be­cker, Marc Gour­jon, Tim Gü­ney­su, Sab­ri­na Jorn, Amir Mo­ra­di, Ma­xi­mi­li­an Orlt, Falk Schel­len­berg – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
    • Ste­althy Logic Mi­suse for Power Ana­ly­sis At­tacks in Mul­ti-Ten­ant FPGAs
      Den­nis R. E. Gnad, Vin­cent Mey­ers, Nguy­en Minh Dang, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
    • On the Im­pact of Aging on Power Ana­ly­sis At­tacks Tar­ge­ting Power-Equa­li­zed Cryp­to­gra­phic Cir­cuits
      Md Tou­fiq Hasan Anik, Bijan Fada­ei­nia, Amir Mo­ra­di, Nagh­meh Ka­ri­mi – 26th Asia and South Pa­ci­fic De­sign Au­to­ma­ti­on Con­fe­rence, ASP-DAC 2021, Ja­nu­a­ry 18-21, 2021.
  • 2020
    • SIL­VER – Sta­tis­ti­cal In­de­pen­dence and Le­a­ka­ge Ve­ri­fi­ca­ti­on
      David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – 26th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­on of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2020, De­cem­ber 6-10, 2020.
    • Clock Glitch ver­sus SIFA
      Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – 33rd IEEE In­ter­na­tio­nal Sym­po­si­um on De­fect and Fault To­leran­ce in VLSI and Na­no­tech­no­lo­gy Sys­tems, DFT 2020, ESA-ES­RIN, Fras­ca­ti, Italy, Oc­to­ber 19-21, 2020.
    • The Un­patcha­ble Si­li­con: A Full Break of the Bit­stream En­cryp­ti­on of Xi­l­inx 7-Se­ries FPGAs
      Maik Ender, Amir Mo­ra­di, Chris­tof Paar – 29th USE­NIX Se­cu­ri­ty Sym­po­si­um (USE­NIX Se­cu­ri­ty 20), Bos­ton, MA, USA, Au­gust 12-14, 2020. Dis­tin­gu­is­hed Paper Award
    • Im­pecca­ble Cir­cuits II
      Aein Re­za­ei Shah­mir­za­di, Shahram Ra­so­olz­adeh, Amir Mo­ra­di – 57th An­nual De­sign Au­to­ma­ti­on Con­fe­rence 2020, DAC 2020, San Fran­cis­co, CA, USA, July 19-23, 2020.
    • Light­weight Ciph­ers on a 65 nm ASIC – A Com­pa­ra­ti­ve Study on En­er­gy Con­sump­ti­on
      Bas­ti­an Rich­ter, Amir Mo­ra­di – IEEE Com­pu­ter So­cie­ty An­nual Sym­po­si­um on VLSI (IS­VL­SI) 2020, Li­mas­sol, CY­PRUS, July 6-8, 2020.
    • The Risk of Out­sour­cing: Hi­d­den SCA Tro­jans in Third-Par­ty IP-Cores Threa­ten Cryp­to­gra­phic ICs
      David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – 25th IEEE Eu­ropean Test Sym­po­si­um, Tal­lin, Es­to­nia, May 25-29, 2020.
    • Tem­pla­te at­tacks on na­no-sca­le CMOS de­vices
      Bas­ti­an Rich­ter, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 10, pages 275–285, 2020.
    • Cryp­to­gra­phic Fault Dia­gno­sis using VerFI
      Vic­tor Ar­ri­bas, Felix We­ge­ner, Amir Mo­ra­di, Svet­la Ni­ko­va – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2020, San Jose, USA, May 4-7, 2020.
    • Si­de-Chan­nel Hard­ware Tro­jan for Prov­a­b­ly-Se­cu­re SCA-Pro­tec­ted Im­ple­men­ta­ti­ons
      Sa­ma­neh Ghan­da­li, Thor­ben Moos, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, Vo­lu­me 28, Issue 6, 2020.
    • TI-PUF: Toward Si­de-Chan­nel Re­sis­tant Phy­si­cal Un­clonable Func­tions
      Anita Ag­haie, Amir Mo­ra­di – IEEE Tran­sac­tions on In­for­ma­ti­on Fo­ren­sics and Se­cu­ri­ty, Vo­lu­me 15, Pages 3470 – 3481, 2020.
    • 3-Pha­se Adia­ba­tic Logic and its Sound SCA Eva­lua­ti­on
      Bijan Fada­ei­nia, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, vol. 9, no. 4, pp. 2175-2188, 2020.
    • Spin Me Right Round Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES: Ex­ten­ded Ver­si­on
      Felix We­ge­ner, Lau­ren De Meyer, Amir Mo­ra­di – Jour­nal of Cryp­to­lo­gy vo­lu­me 33, pages 1114–1155, 2020.
    • Re­mo­te Elec­tri­cal-le­vel Se­cu­ri­ty Thre­ats to Mul­ti-Ten­ant FPGAs
      Den­nis R.E. Gnad, Falk Schel­len­berg, Jonas Kraut­ter, Amir Mo­ra­di, Mehdi B. Taho­o­ri – IEEE De­sign & Test, Vo­lu­me 37, Issue 2, April 2020.
  • 2019

    • A Com­pa­ri­son of χ²-Test and Mu­tu­al In­for­ma­ti­on as Dis­tin­gu­is­her for Si­de-Chan­nel Ana­ly­sis
      Bas­ti­an Rich­ter, David Kni­chel, Amir Mo­ra­di – 18th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2019, Pra­gue, Czech Re­pu­blic, No­vem­ber 11-13, 2019.
    • Ac­tive Fen­ces against Vol­ta­ge-ba­sed Side Chan­nels in Mul­ti-Ten­ant FPGAs
      Jonas Kraut­ter, Den­nis Gnad, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
    • Au­to­ma­ted Probe Re­po­si­tio­ning for On-Die EM Me­a­su­re­ments
      Bas­ti­an Rich­ter, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
    • Im­pecca­ble Cir­cuits
      Anita Ag­haie, Amir Mo­ra­di, Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Falk Schel­len­berg, To­bi­as Schnei­der – IEEE Tran­sac­tions on Com­pu­ters, 2019.
    • Sta­tic Power Si­de-Chan­nel Ana­ly­sis – An In­ves­ti­ga­ti­on of Me­a­su­re­ment Fac­tors
      Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, 2019.
    • Ex­plo­ring the Ef­fect of De­vice Aging on Sta­tic Power Ana­ly­sis At­tacks
      Nagh­meh Ka­ri­mi, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 3, pp 233-256, 2019.
    • Glitch-Re­sis­tant Mas­king Re­vi­si­ted or Why Pro­ofs in the Ro­bust Pro­bing Model are Nee­ded
      Thor­ben Moos, Amir Mo­ra­di, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 2, pp 256-292, 2019. best paper award
    • Shuf­fle and Mix: On the Dif­fu­si­on of Ran­dom­ness in Thres­hold Im­ple­men­ta­ti­ons of Kec­cak
      Felix We­ge­ner, Chris­ti­an Bai­ker, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2019, Darm­stadt, Ger­ma­ny, April 3-5, 2019.
    • CRAFT: Light­weight Twe­a­ka­ble Block Ci­pher with Ef­fi­ci­ent Pro­tec­tion Against DFA At­tacks
      Chris­tof Bei­er­le, Gre­gor Le­an­der, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp 5-45, 2019.
  • 2018
    • Yet Ano­ther Size Re­cord for AES: A First-Or­der SCA Se­cu­re AES S-box Based on GF(2^8) Mul­ti­pli­ca­ti­on
      Felix We­ge­ner, Amir Mo­ra­di – 17th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2018, Mont­pel­lier, Fran­ce, No­vem­ber 12-14, 2018.
    • Re­mo­te In­ter-Chip Power Ana­ly­sis Si­de-Chan­nel At­tacks at Board-Le­vel
      Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2018, San Diego, CA, USA, No­vem­ber 5-8, 2018.
    • Hard­ware Mas­king, Re­vi­si­ted
      Tho­mas De Cnud­de, Maik Ender, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 2, pp 123-148, 2018.
    • Le­a­ka­ge De­tec­tion with the χ²-Test
      Amir Mo­ra­di, Bas­ti­an Rich­ter, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 1, pp 209-237, 2018.
    • Spin Me Right Round – Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES
      Lau­ren De Meyer, Amir Mo­ra­di, Felix We­ge­ner – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 3, pp 596-626, 2018.
    • Thres­hold Im­ple­men­ta­ti­on in Soft­ware – Case Study of PRE­SENT
      Pas­cal Sas­d­rich, Rene Bock, Amir Mo­ra­di – 9th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
    • A First-Or­der SCA Re­sis­tant AES wi­thout Fresh Ran­dom­ness
      Felix We­ge­ner, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
    • An In­si­de Job: Re­mo­te Power Ana­ly­sis At­tacks on FPGAs
      Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2018, Dres­den, Ger­ma­ny, March 18 – 23 , 2018. best paper can­di­da­te.
    • Bit­stream Fault In­jec­tions (BiFI) – Au­to­ma­ted Fault At­tacks against SRAM-ba­sed FPGAs
      Pawel Swier­czyn­ski, Georg T. Be­cker, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 348-360, 2018.Gli­F­reD: Glitch-Free Du­pli­ca­ti­on – Towards Power-Equa­li­zed Cir­cuits on FPGAs
      Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 375-387, 2018.
  • 2017
    • The First Tho­rough Si­de-Chan­nel Hard­ware Tro­jan
      Maik Ender, Sa­ma­neh Ghan­da­li, Amir Mo­ra­di, Chris­tof Paar – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2017, Hong Kong, China, De­cem­ber 3 – 7, 2017.
    • Bit-Sli­ding: A Ge­ne­ric Tech­ni­que for Bit-Se­ri­al Im­ple­men­ta­ti­ons of SPN-ba­sed Pri­mi­ti­ves
      Jérémy Jean, Amir Mo­ra­di, Tho­mas Pey­rin, Pas­cal Sas­d­rich – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2017, Tai­pei, Tai­wan, Sep­tem­ber 25 – 28, 2017.
    • On the Ea­si­ness of Turning Hig­her-Or­der Le­a­ka­ges into First-Or­der
      Thor­ben Moos, Amir Mo­ra­di – 8th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
    • SafeDRP: Yet Ano­ther Way Toward Power-Equa­li­zed De­signs in FPGA
      Maik Ender, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
    • SPARX – A Si­de-Chan­nel Pro­tec­ted Pro­ces­sor for ARX-ba­sed Cryp­to­gra­phy
      Flo­ri­an Bache, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017.
    • Sta­tic Power Si­de-Chan­nel Ana­ly­sis of a Thres­hold Im­ple­men­ta­ti­on Pro­to­ty­pe Chip
      Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017. best paper can­di­da­te.
    • Hiding Hig­her-Or­der Si­de-Chan­nel Le­a­ka­ge – Ran­do­mi­zing Cryp­to­gra­phic Im­ple­men­ta­ti­ons in Re­con­fi­gura­ble Hard­ware
      Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – RSA Con­fe­rence Cryp­to­graph­ers’ Track, CT-RSA 2017, San Fran­cis­co, Fe­bru­ary 14-17 2017.
  • 2016
    • Si­de-Chan­nel Ana­ly­sis Pro­tec­tion and Low-La­ten­cy in Ac­tion – case study of PRIN­CE and Mi­do­ri
      Amir Mo­ra­di, To­bi­as Schnei­der – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2016, Hanoi, Viet­nam, De­cem­ber 4 – 8, 2016.
    • Mo­ments-Cor­re­la­ting DPA
      Amir Mo­ra­di, François-Xa­vier Stan­da­ert – Theo­ry of Im­ple­men­ta­ti­on Se­cu­ri­ty (TIs) Work­shop (of ACM CCS 2016), Vi­en­na, Aus­tria, Oc­to­ber 24, 2016.
    • Strong 8-bit Sbo­xes with Ef­fi­ci­ent Mas­king in Hard­ware
      Erik Boss, Vin­cent Gros­so, Tim Gü­ney­su, Gre­gor Le­an­der, Amir Mo­ra­di, To­bi­as Schnei­der – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 17 – 19, 2016.
    • ParTI – Towards Com­bined Hard­ware Coun­ter­me­a­su­res against Si­de-Chan­nel and Fault-In­jec­tion At­tacks
      To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
    • The SKIN­NY Fa­mi­ly of Block Ciph­ers and its Low-La­ten­cy Va­ri­ant MAN­TIS
      Chris­tof Bei­er­le, Jérémy Jean, Ste­fan Kölbl, Gre­gor Le­an­der, Amir Mo­ra­di, Tho­mas Pey­rin, Yu Sasa­ki, Pas­cal Sas­d­rich, Siang Meng Sim – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
    • Brid­ging the Gap: Ad­van­ced Tools for Si­de-Chan­nel Le­a­ka­ge Esti­ma­ti­on bey­ond Gaus­si­an Tem­pla­tes and His­to­grams
      To­bi­as Schnei­der, Amir Mo­ra­di, François-Xa­vier Stan­da­ert, Tim Gü­ney­su – 23nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2016, St. John’s, NL, Ca­na­da, Au­gust 10–12, 2016.
    • In­ter­dic­tion in Prac­tice – Hard­ware Tro­jan Against a High-Se­cu­ri­ty USB Flash Drive
      Pawel Swier­czyn­ski, Marc Fyr­bi­ak, Phil­ipp Koppe, Amir Mo­ra­di, Chris­tof Paar – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Sprin­ger, June 2016.
    • Large Laser Spots and Fault Sen­si­ti­vi­ty Ana­ly­sis
      Falk Schel­len­berg, Mar­kus Fin­kel­dey, Nils C. Ger­hardt, Mar­tin R. Hof­mann , Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2016, McLe­an, VA, USA, May 3-5, 2016. best student-pa­per award.
    • Im­pro­ved Si­de-Chan­nel Ana­ly­sis At­tacks on Xi­l­inx Bit­stream En­cryp­ti­on of 5, 6, and 7 Se­ries
      Amir Mo­ra­di, To­bi­as Schnei­der – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
    • Ro­bust and One-Pass Par­al­lel Com­pu­ta­ti­on of Cor­re­la­ti­on-Ba­sed At­tacks at Ar­bi­tra­ry Order
      To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
    • Whi­te-Box Cryp­to­gra­phy in the Gray Box – A Hard­ware Im­ple­men­ta­ti­on and its Side Chan­nels
      Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 23rd In­ter­na­tio­nal Con­fe­rence on Fast Soft­ware En­cryp­ti­on, FSE 2016, Bo­chum, Ger­ma­ny, March 20-23 2016.
    • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – Ex­ten­ded Ver­si­on
      To­bi­as Schnei­der, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring June 2016, Vo­lu­me 6, Issue 2, pp 85–99.
  • 2015
    • As­sess­ment of Hiding the Hig­her-Or­der Le­a­ka­ges in Hard­ware – what are the achie­ve­ments ver­sus over­heads?
      Amir Mo­ra­di, Alex­an­der Wild – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015. best paper can­di­da­te.
    • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – a clear road­map for si­de-chan­nel eva­lua­ti­ons
      To­bi­as Schnei­der, Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015.
    • Af­fi­ne Equi­va­lence and its Ap­p­li­ca­ti­on to Tigh­te­ning Thres­hold Im­ple­men­ta­ti­ons
      Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 22nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2015, Mount All­i­son Uni­ver­si­ty Sack­vil­le, New Bruns­wick, Ca­na­da, Au­gust 12-14 2015.
    • Ad­van­ces in Si­de-Chan­nel Se­cu­ri­ty
      Amir Mo­ra­di – Ha­bi­li­ta­ti­on The­sis, Ruhr University Bochum, Germany, 2015.
    • Arith­me­tic Ad­di­ti­on over Boo­le­an Mas­king – Towards First- and Se­cond-Or­der Re­sis­tan­ce in Hard­ware
      To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2015, New York, USA, 2–5 June 2015.
    • Achie­ving Si­de-Chan­nel Pro­tec­tion with Dy­na­mic Logic Re­con­fi­gu­ra­ti­on on Mo­dern FPGAs
      Pas­cal Sas­d­rich, Amir Mo­ra­di, Oli­ver Misch­ke, Tim Gü­ney­su – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2015, McLe­an, VA, USA, May 5-7, 2015.
    • A Hard­ware-ba­sed Coun­ter­me­a­su­re to Re­du­ce Si­de-Chan­nel Le­a­ka­ge – De­sign, Im­ple­men­ta­ti­on, and Eva­lua­ti­on
      An­dre­as Gor­nik, Amir Mo­ra­di, Jür­gen Oehm, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ter-Ai­ded De­sign of In­te­gra­ted Cir­cuits and Sys­tems, Vol. 34, No.8, pages 1308-1319, 2015.
    • Eva­lua­ting the Du­pli­ca­ti­on of Du­al-Rail Prech­ar­ge Lo­gics on FPGAs
      Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
    • Si­de-Chan­nel Pro­tec­tion by Ran­do­mi­zing Look-Up Ta­bles on Re­con­fi­gura­ble Hard­ware – Pit­falls of Me­mo­ry Pri­mi­ti­ves
      Pas­cal Sas­d­rich, Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
    • Si­de-Chan­nel Se­cu­ri­ty Ana­ly­sis of Ul­tra-Low-Power FRAM-ba­sed MCUs
      Amir Mo­ra­di, Ge­si­ne Hin­ter­wäl­der – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015. best pa­per award.
    • Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?
      San­tos Me­ri­no Del Pozo, François-Xa­vier Stan­da­ert, Dina Kamel, Amir Mo­ra­di – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 – 13 , 2015.
  • 2014
    • Wire-Tap Codes as Si­de-Chan­nel Coun­ter­me­a­su­re – an FP­GA-ba­sed ex­pe­ri­ment
      Amir Mo­ra­di – 15th In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in India, In­docrypt 2014, New Delhi, De­cem­ber 14 – 17, 2014.
    • Phy­si­cal Se­cu­ri­ty Eva­lua­ti­on of the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II and Stra­tix III FPGAs
      Pawel Swier­czyn­ski, Amir Mo­ra­di, David Os­wald, Chris­tof Paar – ACM Tran­sac­tions on Re­con­fi­gura­ble Tech­no­lo­gy and Sys­tems (TRETS), Vo­lu­me 7 Issue 4, De­cem­ber 2014.
    • Full-Si­ze High-Se­cu­ri­ty ECC Im­ple­men­ta­ti­on on MSP430 Micro­con­trol­lers
      Ge­si­ne Hin­ter­wäl­der, Amir Mo­ra­di, Micha­el Hut­ter, Peter Schwa­be, Chris­tof Paar – Third In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty in Latin Ame­ri­ca, La­tin­crypt 2014, Flo­ri­anópolis, Bra­zil, Sep­tem­ber 17 – 19, 2014.
    • Early Pro­pa­ga­ti­on and Im­ba­lan­ced Rou­ting, How to Di­mi­nish in FPGAs
      Amir Mo­ra­di, Vin­cent Imm­ler – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
    • Si­de-Chan­nel Le­a­ka­ge through Sta­tic Power – Should We Care about in Prac­tice?
      Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
    • Fault Sen­si­ti­vi­ty Ana­ly­sis Meets Ze­ro-Va­lue At­tack
      Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2014, Busan, Korea, Sep­tem­ber 23, 2013.
    • De­tec­ting Hi­d­den Le­a­ka­ges
      Amir Mo­ra­di, Syl­vain Guil­ley, An­ne­lie Heu­ser – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2014, Lausan­ne, Swit­z­er­land, June 10 – 13, 2014. best-pa­per award.
  • 2013
    • Com­pre­hen­si­ve Eva­lua­ti­on of AES Dual Ciph­ers as a Si­de-Chan­nel Coun­ter­me­a­su­re
      Amir Mo­ra­di, Oli­ver Misch­ke – In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, ICICS 2013, Bei­jing, China, No­vem­ber 20 – 22, 2013.
    • One At­tack to Rule Them All: Col­li­si­on Ti­ming At­tack ver­sus 42 AES ASIC Cores
      Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 62, no. 9, pp. 1786-1798, Sept. 2013.
    • On the Sim­pli­ci­ty of Con­ver­ting Le­a­ka­ges from Mul­ti­va­ria­te to Uni­va­ria­te – Case Study of a Glitch-Re­sis­tant Mas­king Sche­me
      Amir Mo­ra­di, Oli­ver Misch­ke – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 – 23, 2013.
    • At­ta­cking Atmel’s Cryp­to­M­emo­ry EE­PROM with Spe­cial-Pur­po­se Hard­ware
      Alex­an­der Wild, Tim Gü­ney­su, Amir Mo­ra­di – Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – 11th In­ter­na­tio­nal Con­fe­rence, ACNS 2013, Banff, AB, Ca­na­da, June 25-28, 2013.
    • Si­de-Chan­nel At­tacks on the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II – Fa­ci­li­ta­ting Black-Box Ana­ly­sis using Soft­ware Re­ver­se-En­gi­nee­ring
      Amir Mo­ra­di, David Os­wald, Chris­tof Paar, Pawel Swier­czyn­ski – 21st ACM/SIGDA In­ter­na­tio­nal Sym­po­si­um on Field-Pro­gramma­ble Gate Ar­rays- FPGA 2013, pages 91-100, Fe­bru­ary 11 – 13. ACM, 2013.
  • 2012
    • Side Chan­nels as Buil­ding Blocks
      Mar­kus Kas­per, Amir Mo­ra­di, Georg T. Be­cker, Oli­ver Misch­ke, Tim Gü­ney­su, Chris­tof Paar, Wayne Bur­le­son – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 2, Num­ber 3, pages 143-159, 2012, Sprin­ger.
    • How Far Should Theo­ry be from Prac­tice? – Eva­lua­ti­on of a Coun­ter­me­a­su­re
      Amir Mo­ra­di, Oli­ver Misch­ke – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2012 – 14th In­ter­na­tio­nal Work­shop, Leu­ven, Bel­gi­um, Sep­tem­ber 9-12, 2012.
    • Glitch-Free Im­ple­men­ta­ti­on of Mas­king in Mo­dern FPGAs
      Amir Mo­ra­di, Oli­ver Misch­ke – 2012 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust, HOST 2012, San Fran­cis­co, CA, USA, June 3-4, 2012.
    • Sta­tis­ti­cal Tools Fla­vor Si­de-Chan­nel Col­li­si­on At­tacks
      Amir Mo­ra­di – Ad­van­ces in Cryp­to­lo­gy – EU­RO­CRYPT 2012 – 31th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Cam­bridge, United King­dom, April 15-19, 2012, pages 428-445.
    • Black-Box Si­de-Chan­nel At­tacks High­light the Im­port­an­ce of Coun­ter­me­a­su­res – An Ana­ly­sis of the Xi­l­inx Vir­tex-4 and Vir­tex-5 Bit­stream En­cryp­ti­on Me­cha­nism
      Amir Mo­ra­di, Mar­kus Kas­per, Chris­tof Paar – To­pics in Cryp­to­lo­gy – CT-RSA 2012 – The Cryp­to­graph­ers‘ Track at the RSA Con­fe­rence, San Fran­cis­co, CA, USA, Fe­bru­ary 27- March 2, 2012, pages 1-18.
  • 2011
    • Prak­ti­sche An­grif­fe auf die Bit­strom­ver­schlüs­se­lung von Xi­l­inx FPGAs
      Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – Da­ten­schutz und Da­ten­si­cher­heit – DuD – Aus­ga­be 11/2011.
    • On the Vul­nerabi­li­ty of FPGA Bit­stream En­cryp­ti­on against Power Ana­ly­sis At­tacks – Extrac­ting Keys from Xi­l­inx Vir­tex-II FPGAs
      Amir Mo­ra­di, Ales­san­dro Ba­renghi, Timo Kas­per, Chris­tof Paar – 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, CCS 2011, Chi­ca­go, IL, USA, Oc­to­ber 17-21, 2011, pages 111-124.
    • Ge­ne­ric Si­de-Chan­nel Coun­ter­me­a­su­res for Re­con­fi­gura­ble De­vices
      Tim Gü­ney­su, Amir Mo­ra­di – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
    • On the Power of Fault Sen­si­ti­vi­ty Ana­ly­sis and Col­li­si­on Si­de-Chan­nel At­tacks in a Com­bined Set­ting
      Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar, Yang Li, Kazuo Ohta, Kazuo Sa­kiyama – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
    • Mas­ked Du­al-Rail Prech­ar­ge Logic En­coun­ters Sta­te-of-the-Art Power Ana­ly­sis Me­thods
      Amir Mo­ra­di, Mario Kirsch­baum, Tho­mas Ei­sen­barth, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on Sys­tems, Vo­lu­me 20 , Issue 9, Pages 1578 – 1589, 2012.
    • Prac­tical Eva­lua­ti­on of DPA Coun­ter­me­a­su­res on Re­con­fi­gura­ble Hard­ware
      Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – HOST 2011, Pro­cee­dings of the 2011 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST), 5-6 June 2011, San Diego, Ca­li­for­nia, USA.
    • Pus­hing the Li­mits: A Very Com­pact and a Thres­hold Im­ple­men­ta­ti­on of AES
      Amir Mo­ra­di, Dipl.-Kfm. Axel Po­sch­mann, San Ling, Chris­tof Paar, Hua­xi­ong Wang – Ad­van­ces in Cryp­to­lo­gy – EU­ROCRYPT 2011 – 30th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Tal­linn, Es­to­nia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger.
    • Si­de-Chan­nel Re­sis­tant Cryp­to for less than 2,300 GE
      Axel Po­sch­mann, Amir Mo­ra­di, Khoong­ming Khoo, Chu-Wee Lim, Hua­xi­ong Wang, San Ling – Jour­nal of Cryp­to­lo­gy, Spe­cial Issue on Hard­ware and Se­cu­ri­ty, Vo­lu­me 24, Num­ber 2, pages 322-345, April 2011.
  • 2010
    • Si­de-chan­nel based wa­ter­marks for IP Pro­tec­tion
      Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – CO­SA­DE 2010 – First In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign.
    • Cor­re­la­ti­on-En­han­ced Power Ana­ly­sis Col­li­si­on At­tack
      Amir Mo­ra­di, Oli­ver Misch­ke, Tho­mas Ei­sen­barth – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2010, 12th In­ter­na­tio­nal Work­shop, Santa Bar­ba­ra, CA, USA, Au­gust 17-20, 2010. Pro­cee­dings
    • Si­de-chan­nel based wa­ter­marks for in­te­gra­ted cir­cuits
      Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST 2010), Ana­heim­CA , USA, 13-14 June 2010.
    • Prac­tical Power Ana­ly­sis At­tacks on Soft­ware Im­ple­men­ta­ti­ons of McE­lie­ce
      Ste­fan Heyse, Amir Mo­ra­di, Chris­tof Paar – Post-Quan­tum Cryp­to­gra­phy, Third In­ter­na­tio­nal Work­shop, PQCryp­to 2010, Darm­stadt, Ger­ma­ny, May 25-28, 2010. Pro­cee­dings
    • Light­weight Cryp­to­gra­phy and DPA Coun­ter­me­a­su­res: A Sur­vey
      Amir Mo­ra­di, Axel Po­sch­mann – First In­ter­na­tio­nal Work­shop on Light­weight Cryp­to­gra­phy for Re­sour­ce-Cons­trained De­vices, WLC 2010 (co-lo­ca­ted with Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty – FC 2010), Te­ne­ri­fe, Cana­ry Is­lands, Spain, Ja­nu­ar 25-28, 2010.
  • 2009

    • A New Re­mo­te Key­less Entry Sys­tem Re­sis­tant to Power Ana­ly­sis At­tacks
      Amir Mo­ra­di, Timo Kas­per – 7th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on, Com­mu­ni­ca­ti­ons and Si­gnal Pro­ces­sing, ICICS 2009, Macau, China, December 7-10, 2009.
    • Power Ana­ly­sis of Sin­gle-Rail Sto­r­a­ge Ele­ments as used in MDPL
      Amir Mo­ra­di, Tho­mas Ei­sen­barth, Dipl.-Kfm. Axel Po­sch­mann, Chris­tof Paar – 12th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy – ICISC 2009, Seoul, Korea, De­cem­ber 2-4, 2009.
    • Kee­Loq and Si­de-Chan­nel Ana­ly­sis – Evo­lu­ti­on of an At­tack
      Chris­tof Paar, Tho­mas Ei­sen­barth, Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di – 6th IEEE Work­shop on Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2009.Lausan­ne, Swit­z­er­land, Sep­tem­ber 6, 2009.
    • A Com­pa­ra­ti­ve Study of Mu­tu­al In­for­ma­ti­on Ana­ly­sis under a Gaus­si­an As­sump­ti­on
      Amir Mo­ra­di, Nima Mou­sa­vi, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh – 10th In­ter­na­tio­nal Work­shop on In­for­ma­ti­on Se­cu­ri­ty Ap­p­li­ca­ti­ons, WISA 2009, Busan, Korea. Au­gust 25-27, 2009.
    • Brea­king Kee­Loq in a Flash: On Extrac­ting Keys at Light­ning Speed
      Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – 2nd In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in Af­ri­ca, Pro­gress in Cryp­to­lo­gy – AF­RI­CA­CRYPT 2009, Gam­marth, Tu­ni­sia, 21-25 Juni, 2009.
    • Dual-rail transition logic: A logic style for counteracting power analysis attacks
      Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh, Computers & Electrical Engineering, Volume 35, Issue 2, Pages 359-369, 2009.
    • Vulnerability modeling of cryptographic hardware to power analysis attacks
      Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth, Integration, Volume 42, Issue 4, Pages 468-478, 2009.
    • Charge recovery logic as a side channel attack countermeasure
      Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, 10th International Symposium on Quality Electronic Design (ISQED), pp. 686-691, 2009.
    • A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
      Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh, Information Security Applications, 10th International Workshop (WISA), Lecture Notes in Computer Science, vol 5932., pp. 193-205, 2009.
  •  2008
    • On the Power of Power Ana­ly­sis in the Real World: A Com­ple­te Break of the Kee­Loq Code Hop­ping Sche­me
      Tho­mas Ei­sen­barth, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh, Mo­ham­mad T. Man­zu­ri Shal­ma­ni – 28th In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence — CRYP­TO 2008. Santa Bar­ba­ra, Ca­li­for­nia, USA. Au­gust 17-21, 2008.
    • Sus­cep­ti­bi­li­ty of eS­TREAM Can­di­da­tes towards Side Chan­nel Ana­ly­sis
      Be­ne­dikt Gier­lichs, Lejla Ba­ti­na, Chris­to­phe Cla­vier, Tho­mas Ei­sen­barth, Aline Gouget, He­le­na Hand­schuh, Timo Kas­per, Kers­tin Lem­ke-Rust, Ste­fan Man­gard, Amir Mo­ra­di, Eli­sa­beth Os­wald – The State of the Art of Stream Ciph­ers, SASC 2008, Lausan­ne, Swit­z­er­land. Fe­bru­ar, 13-14 2008.
    • On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
      Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6., pp. 661-670, 2008.
    • A secure and low-energy logic style using charge recovery approach
      Mehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, international symposium on Low Power Electronics & Design (ISLPED ’08). Association for Computing Machinery, pp. 259-264, 2008.
  • 2007
    • Compact and Secure Design of Masked AES S-Box
      Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani, Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861, pp. 216-229, 2007.
    • Power Analysis Attacks on MDPL and DRSL Implementations
      Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Information Security and Cryptology – ICISC 2007. Lecture Notes in Computer Science, vol 4817, pp. 259-272, 2007.
  • 2006
    • A Generalized Method of Differential Fault Attack Against AES Cryptosystem
      Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, Cryptographic Hardware and Embedded Systems – CHES 2006. Lecture Notes in Computer Science, vol 4249, pp. 91-100, 2006.