Publications
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
2021 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 3. [pdf]SILVER - Statistical Independence and Leakage Verification
2020 - David Knichel, Pascal Sasdrich, Amir Moradi
26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. [pdf] [GitHub] [DOI]Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
2020 - Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 28, Issue 6, 2020. [pdf] [doi]Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
2019 - Felix Wegener, Christian Baiker, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, Darmstadt, Germany, April 3-5, 2019. [pdf] [doi]Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection
2018 - Pascal Sasdrich, Tim Güneysu
Journal of Hardware and Systems Security, December 2018, Volume 2, Issue 4, pp 297–313 [pdf]Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking
2018 - Pascal Sasdrich, Michael Hutter
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018.Threshold Implementation in Software - Case Study of PRESENT
2018 - Pascal Sasdrich, Rene Bock, Amir Moradi
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
2016 - Amir Moradi, Tobias Schneider
International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Vietnam, December 4 - 8, 2016. [pdf] [DOI]Strong 8-bit Sboxes with Efficient Masking in Hardware
2016 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, California, USA, August 17 - 19, 2016. [pdf] [DOI]ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
2016 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Cryptology Conference - CRYPTO 2016, Santa Barbara, California, USA, August 14 - 18, 2016. [pdf] [DOI]Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
2016 - Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
23nd International Conference on Selected Areas in Cryptography, SAC 2016, St. John's, NL, Canada, August 10–12, 2016. [pdf] [DOI]A Grain in the Silicon: SCA-Protected AES in Less than 30 Slices
2016 - Pascal Sasdrich, Tim Güneysu
27th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP 2016, London, United Kingdom, July 6-8 2016, to appear [DOI] [pdf]White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
2016 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
23rd International Conference on Fast Software Encryption, FSE 2016, Bochum, Germany, March 20-23 2016 [pdf]Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast
2015 - Christian Kison, Jürgen Frinken, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [Springer]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
2015 - Amir Moradi, Alexander Wild
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper candidate). [pdf] [DOI]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
2015 - Tobias Schneider, Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]Affine Equivalence and its Application to Tightening Threshold Implementations
2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]