Publications

Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast

2015 - Christian Kison, Jürgen Frinken, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [Springer]

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

2015 - Amir Moradi, Alexander Wild

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper can­di­da­te). [pdf] [DOI]

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations

2015 - Tobias Schneider, Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]

Affine Equivalence and its Application to Tightening Threshold Implementations

2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu

22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]

Advances in Side-Channel Security

2015 - Amir Moradi

Habilitation Thesis [pdf] [URN]
Page: