Ruhr-Uni-Bochum
Amir Moradi

Amir Moradi

Institution: CASA - Cyber Security in the Age of Large-Scale Adversaries

Research Hub(s):

Hub B: Eingebettete Sicherheit

E-Mail: amir.moradi@rub.de

Adresse: ID 2/605

Publikationen:

FIVER – Robust Verification of Countermeasures against Fault Injections Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets Automated Generation of Masked Hardware Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits Inconsistency of Simulation and Practice inDelay-based Strong PUFs Countermeasures against Static Power Attacks – Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS Second-Order SCA Securitywith almost no Fresh Randomness Low-Latency Keccak at any Arbitrary Order DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations Randomness Optimization for Gadget Compositions in Higher-Order Masking SKINNY-AEAD and SKINNY-Hash Clock Glitch versus SIFA When Real-World Snapshots Question Theory – Revisiting the t-Probing Security Model Impeccable Circuits PROLEAD - A Probing-Based Hardware Leakage Detection Tool Low-Latency Hardware Private Circuits Composable Gadgets with Reused Fresh Masks: First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks Beware of Insufficient Redundancy: An Experimental Evaluation of Code-based FI Countermeasures Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations Cryptographic Fault Diagnosis using VerFI Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version 3-Phase Adiabatic Logic and its Sound SCA Evaluation TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions A Comparison of x²-Test and Mutual Information as Distinguisher for Side-Channel Analysis The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs Impeccable Circuits II The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs Glitch-Resistant Masking Revisited Exploring the Effect of Device Aging on Static Power Analysis Attacks Lightweight Ciphers on a 65 nm ASIC A Comparative Study on Energy Consumption Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA New First-Order Secure AES Performance Records Re-Consolidating First-Order Masking Schemes Template attacks on nano-scale CMOS devices Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model SILVER – Statistical Independence and Leakage Verification Static Power Side-Channel Analysis – An Investigation of Measurement Factors Automated Probe Repositioning for On-Die EM Measurements