Publications
  • Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain, Sergej Meschkov, Daniel Lammers, Mehdi Tahoori, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2025, No. 3.
  • One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES , Hemin Rahimi, Amir Moradi, Design, Automation & Test in Europe Conference & Exhibition, DATE 2025.
  • Exploiting the Central Reduction in Lattice-Based Cryptography, Tolun Tosun, Amir Moradi, Erkay Savas, IEEE Access, vol. 12, pp. 166814-166833, 2024.
  • Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue, Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert, IACR Communications in Cryptology, Vol. 1, No. 2, 2024.
  • Static Leakage in Dual-Rail Precharge Logics, Bijan Fadaeinia, Thorben Moos, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 4.
  • Robust but Relaxed Probing Model, Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 4.
  • Another Evidence to not Employ Customized Masked Hardware – Identifying and Fixing Flaws in SCARV, Felix Uhle, Florian Stolz, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 4.
  • PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software, Jannik Zeitschner, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3.
  • Automated Generation of Fault-Resistant Circuits, Nicolai Müller, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3.
  • A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL, Nicolai Müller, Daniel Lammers, Amir Moradi, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 3.
  • JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing, Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar, IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2024, No. 2.
  • A Thorough Evaluation of RAMBAM, Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’23). Association for Computing Machinery, 2023.
  • Automated Masking of FPGA-Mapped Designs, Nicolai Müller, Sergej Meschkov, Dennis Gnad, Mehdi Tahoori, Amir Moradi, Conference on Field-Programmable Logic and Applications, FPL 2023.
  • PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries, Jannik Zeitschner, Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
  • Deep Learning Side-Channel Collision Attack, Marvin Staib, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 3.
  • Energy Consumption of Protected Cryptographic Hardware Cores – An Experimental Study, Aein Rezaei Shahmirzadi, Thorben Moos, Amir Moradi, 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023.
  • Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations, Endres Puschner, Thorben Moos, Christian Kison, Steffen Becker, Amir Moradi, Christof Paar, IEEE Symposium on Security and Privacy (SP), 2023.
  • Low-Latency and Low-Randomness Second-Order Masked Cubic Functions, Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2023, No. 1, pp. 113-152.
  • Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits, Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 2, pp. 266-288.
  • Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks, David Knichel, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vo. 2022, No. 3, pp. 114-140.
  • Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures, Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 3, pp. 438-462.
  • Randomness Optimization for Gadget Compositions in Higher-Order Masking, Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 188-227.
  • PROLEAD A Probing-Based Hardware Leakage Detection Tool, Nicolai Müller, Amir Moradi, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 4, pp. 311-348.
  • Second-Order Low-Randomness d + 1 Hardware Sharing of the AES, Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 815-828, 2022.
  • Low-Latency Hardware Private Circuits, David Knichel, Amir Moradi, ACM SIGSAC Conference on Computer and Communications Security (CCS ’22). Association for Computing Machinery, pp. 1799-1812, 2022.
  • A Cautionary Note on Protecting Xilinx‘ UltraScale(+) Bitstream Encryption and Authentication Engine, Maik Ender, Gregor Leander, Amir Moradi, Christof Paar, IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 1-9, 2022.
  • Security Analysis of Delay-Based Strong PUFs with Multiple Delay Lines, Anita Aghaie, Amir Moradi, Johannes Tobisch, Nils Wisiol, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 125-128, 2022.
  • Does Aging Matter? The Curious Case of Fault Sensitivity Analysis, Mohammad Ebrahimabadi, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi, International Symposium on Quality Electronic Design (ISQED), pp. 84-89, 2022.
  • Au­to­ma­ted Ge­ne­ra­ti­on of Mas­ked Hard­ware, David Kni­chel, Amir Mo­ra­di, Ni­co­lai Mül­ler, Pas­cal Sas­d­rich – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 589-629.
  • Cryp­t­ana­ly­sis of Ef­fi­ci­ent Mas­ked Ciph­ers: Ap­p­li­ca­ti­ons to Low La­ten­cy, Tim Beyne, Sie­men Dhoo­g­he, Amir Mo­ra­di, Aein Re­za­ei Shah­mir­za­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 679-721.
  • Ge­ne­ric Hard­ware Pri­va­te Cir­cuits – Towards Au­to­ma­ted Ge­ne­ra­ti­on of Com­po­sa­ble Se­cu­re Gad­gets, David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2022, No. 1, pp. 323-344.
  • Low-La­ten­cy Hard­ware Mas­king of PRIN­CE, Ni­co­lai Mül­ler, Thor­ben Moos, Amir Mo­ra­di – 12th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2021, Luga­no, Swit­z­er­land, Oc­to­ber 25-27, 2021.
  • PUFs Phy­si­cal Le­arning: Ac­ce­le­ra­ting the En­roll­ment via De­lay-ba­sed Model Extrac­tion, Anita Ag­haie, Maik Ender, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, Vol. 10, No. 3, pp. 1621-1632, 2021.
  • FIVER – Ro­bust Ve­ri­fi­ca­ti­on of Coun­ter­me­a­su­res against Fault In­jec­tions, Jan Rich­ter-Brock­mann, Aein Re­za­ei Shah­mir­za­di, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 447-473.
  • Let’s Take it Off­line: Boos­ting Bru­te-Force At­tacks on iPho­ne’s User Au­then­ti­ca­ti­on through SCA, Olek­siy Li­so­vets, David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 496-519.
  • Low-La­ten­cy Kec­cak at any Ar­bi­tra­ry Order, Sara Zarei, Aein Re­za­ei Shah­mir­za­di, Hadi Solei­ma­ny, Ra­ziye Sala­rifard, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 388-411.
  • New First-Or­der Se­cu­re AES Per­for­mance Re­cords, Aein Re­za­ei Shah­mir­za­di, Dušan Božilov, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 2, pp. 304-327.
  • Re-Con­so­li­da­ting First-Or­der Mas­king Sche­mes – Nul­li­fy­ing Fresh Ran­dom­ness, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 1, pp. 305-342.
  • Se­cond-Or­der SCA Se­cu­ri­ty with al­most no Fresh Ran­dom­ness, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 708-755.
  • Coun­ter­me­a­su­res against Sta­tic Power At­tacks – Com­pa­ring Ex­haus­ti­ve Logic Ba­lan­cing and Other Pro­tec­tion Sche­mes in 28 nm CMOS, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 780-805.
  • DL-LA: Deep Le­arning Le­a­ka­ge As­sess­ment: A mo­dern road­map for SCA eva­lua­ti­ons, Thor­ben Moos, Felix We­ge­ner, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 552-598.
  • In­con­sis­ten­cy of Si­mu­la­ti­on and Prac­tice in De­lay-ba­sed Strong PUFs, Anita Ag­haie, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 3, pp. 520-551.
  • The SPEE­DY Fa­mi­ly of Block Ciph­ers – En­gi­nee­ring an Ultra Low-La­ten­cy Ci­pher from Gate Level for Se­cu­re Pro­ces­sor Ar­chi­tec­tu­res, Gre­gor Le­an­der, Thor­ben Moos, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2021, No. 4, pp. 510-545.
  • Im­pecca­ble Cir­cuits III, Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – IEEE In­ter­na­tio­nal Test Con­fe­rence, ITC 2021, Oc­to­ber 10-15, 2021
  • Ba­lan­cing the Le­a­ka­ge Cur­rents in Na­no­me­ter CMOS Logic — A Chal­len­ging Goal, Bijan Fada­ei­nia, Thor­ben Moos, Amir Mo­ra­di – Ap­p­lied Sci­en­ces Vol. 11, no. 15:7143, Spe­cial Issue on Side Chan­nel At­tacks in Em­bed­ded Sys­tems, 2021.
  • Mas­ked SABL: a Long Las­ting Si­de-Chan­nel Pro­tec­tion De­sign Me­tho­do­lo­gy, Bijan Fada­ei­nia, Md Tou­fiq Hasan Anik, Nagh­meh Ka­ri­mi, Amir Mo­ra­di – IEEE Ac­cess, Vo­lu­me 9, Pages 90455 – 90464, 2021.
  • Re­al-World Snap­shots vs. Theo­ry: Ques­tio­ning the t-Pro­bing Se­cu­ri­ty Model, Thilo Kra­chen­fels, Fa­te­meh Ganji, Amir Mo­ra­di, Shahin Tajik, Jean-Pier­re Sei­fert – IEEE Symposium on Security and Privacy (SP), pp. 1955-1971, 2021.
  • Au­to­ma­ted Mas­king of Soft­ware Im­ple­men­ta­ti­ons on In­dus­tri­al Micro­con­trol­lers, Ar­nold Ab­rom­eit, Flo­ri­an Bache, Leon A. Be­cker, Marc Gour­jon, Tim Gü­ney­su, Sab­ri­na Jorn, Amir Mo­ra­di, Ma­xi­mi­li­an Orlt, Falk Schel­len­berg – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
  • Ste­althy Logic Mi­suse for Power Ana­ly­sis At­tacks in Mul­ti-Ten­ant FPGAs, Den­nis R. E. Gnad, Vin­cent Mey­ers, Nguy­en Minh Dang, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2021, Fe­bru­ary 1 – 5 , 2021.
  • On the Im­pact of Aging on Power Ana­ly­sis At­tacks Tar­ge­ting Power-Equa­li­zed Cryp­to­gra­phic Cir­cuits, Md Tou­fiq Hasan Anik, Bijan Fada­ei­nia, Amir Mo­ra­di, Nagh­meh Ka­ri­mi – 26th Asia and South Pa­ci­fic De­sign Au­to­ma­ti­on Con­fe­rence, ASP-DAC 2021, Ja­nu­a­ry 18-21, 2021
  • SIL­VER – Sta­tis­ti­calIn­de­pen­dence and Le­a­ka­ge Ve­ri­fi­ca­ti­on, David Kni­chel, Pas­cal Sas­d­rich, Amir Mo­ra­di – 26th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­on of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2020, De­cem­ber 6-10, 2020.
  • Clock Glitch ver­sus SIFA, Aein Re­za­ei Shah­mir­za­di, Amir Mo­ra­di – 33rd IEEE In­ter­na­tio­nal Sym­po­si­um on De­fect and Fault To­leran­ce in VLSI and Na­no­tech­no­lo­gy Sys­tems, DFT 2020, ESA-ES­RIN, Fras­ca­ti, Italy, Oc­to­ber 19-21, 2020.
  • Unrolled Cryptography on Silicon A Physical Security Analysis, Thorben Moos, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2020. No. 4, pp. 416-442.
  • The Un­patcha­ble Si­li­con: A Full Break of the Bit­stream En­cryp­ti­on of Xi­l­inx 7-Se­ries FPGAs, Maik Ender, Amir Mo­ra­di, Chris­tof Paar – 29th USE­NIX Se­cu­ri­ty Sym­po­si­um (USE­NIX Se­cu­ri­ty 20), Bos­ton, MA, USA, Au­gust 12-14, 2020. Dis­tin­gu­is­hed Paper Award
  • Im­pecca­ble Cir­cuits II, Aein Re­za­ei Shah­mir­za­di, Shahram Ra­so­olz­adeh, Amir Mo­ra­di – 57th An­nual De­sign Au­to­ma­ti­on Con­fe­rence 2020, DAC 2020, San Fran­cis­co, CA, USA, July 19-23, 2020.
  • Light­weight Ciph­ers on a 65 nm ASIC – A Com­pa­ra­ti­ve Study on En­er­gy Con­sump­ti­on, Bas­ti­an Rich­ter, Amir Mo­ra­di – IEEE Com­pu­ter So­cie­ty An­nual Sym­po­si­um on VLSI (IS­VL­SI) 2020, Li­mas­sol, CY­PRUS, July 6-8, 2020.
  • The Risk of Out­sour­cing: Hi­d­den SCA Tro­jans in Third-Par­ty IP-Cores Threa­ten Cryp­to­gra­phic ICs, David Kni­chel, Thor­ben Moos, Amir Mo­ra­di – 25th IEEE Eu­ropean Test Sym­po­si­um, Tal­lin, Es­to­nia, May 25-29, 2020.
  • Tem­pla­te at­tacks on na­no-sca­le CMOS de­vices, Bas­ti­an Rich­ter, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 10, pages 275–285, 2020.
  • Cryp­to­gra­phic Fault Dia­gno­sis using VerFI, Vic­tor Ar­ri­bas, Felix We­ge­ner, Amir Mo­ra­di, Svet­la Ni­ko­va – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2020, San Jose, USA, May 4-7, 2020.
  • Si­de-Chan­nel Hard­ware Tro­jan for Prov­a­b­ly-Se­cu­re SCA-Pro­tec­ted Im­ple­men­ta­ti­ons, Sa­ma­neh Ghan­da­li, Thor­ben Moos, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, Vo­lu­me 28, Issue 6, 2020.
  • TI-PUF: Toward Si­de-Chan­nel Re­sis­tant Phy­si­cal Un­clonable Func­tions, Anita Ag­haie, Amir Mo­ra­di – IEEE Tran­sac­tions on In­for­ma­ti­on Fo­ren­sics and Se­cu­ri­ty, Vo­lu­me 15, Pages 3470 – 3481, 2020.
  • 3-Pha­se Adia­ba­tic Logic and its Sound SCA Eva­lua­ti­on, Bijan Fada­ei­nia, Amir Mo­ra­di – IEEE Tran­sac­tions on Emer­ging To­pics in Com­pu­ting, vol. 9, no. 4, pp. 2175-2188, 2020.
  • Spin Me Right Round Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES: Ex­ten­ded Ver­si­on, Felix We­ge­ner, Lau­ren De Meyer, Amir Mo­ra­di – Jour­nal of Cryp­to­lo­gy vo­lu­me 33, pages 1114–1155, 2020.
  • Re­mo­te Elec­tri­cal-le­vel Se­cu­ri­ty Thre­ats to Mul­ti-Ten­ant FPGAs, Den­nis R.E. Gnad, Falk Schel­len­berg, Jonas Kraut­ter, Amir Mo­ra­di, Mehdi B. Taho­o­ri – IEEE De­sign & Test, Vo­lu­me 37, Issue 2, April 2020.
  • A Com­pa­ri­son of χ²-Test and Mu­tu­al In­for­ma­ti­on as Dis­tin­gu­is­her for Si­de-Chan­nel Ana­ly­sis, Bas­ti­an Rich­ter, David Kni­chel, Amir Mo­ra­di – 18th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2019, Pra­gue, Czech Re­pu­blic, No­vem­ber 11-13, 2019.
  • Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments, Thorben Moos, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019. No. 3, pp. 202-232.
  • Combining Optimization Objectives: New Modeling Attacks on Strong PUFs, Johannes Tobisch, Anita Aghaie, Georg T. Becker, IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vo. 2021, No. 2, pp. 357-389.
  • Ac­tive Fen­ces against Vol­ta­ge-ba­sed Side Chan­nels in Mul­ti-Ten­ant FPGAs, Jonas Kraut­ter, Den­nis Gnad, Falk Schel­len­berg, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
  • Au­to­ma­ted Probe Re­po­si­tio­ning for On-Die EM Me­a­su­re­ments, Bas­ti­an Rich­ter, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2019, West­mins­ter, Co­lo­ra­do, USA, No­vem­ber 4-7, 2019.
  • Im­pecca­ble Cir­cuits, Anita Ag­haie, Amir Mo­ra­di, Shahram Ra­so­olz­adeh, Aein Re­za­ei Shah­mir­za­di, Falk Schel­len­berg, To­bi­as Schnei­der – IEEE Tran­sac­tions on Com­pu­ters, 2019.
  • Sta­tic Power Si­de-Chan­nel Ana­ly­sis – An In­ves­ti­ga­ti­on of Me­a­su­re­ment Fac­tors, Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on (VLSI) Sys­tems, 2019.
  • Ex­plo­ring the Ef­fect of De­vice Aging on Sta­tic Power Ana­ly­sis At­tacks, Nagh­meh Ka­ri­mi, Thor­ben Moos, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 3, pp 233-256, 2019.
  • Glitch-Re­sis­tant Mas­king Re­vi­si­ted or Why Pro­ofs in the Ro­bust Pro­bing Model are Nee­ded, Thor­ben Moos, Amir Mo­ra­di, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2019, No. 2, pp 256-292, 2019. best paper award
  • Shuf­fle and Mix: On the Dif­fu­si­on of Ran­dom­ness in Thres­hold Im­ple­men­ta­ti­ons of Kec­cak, Felix We­ge­ner, Chris­ti­an Bai­ker, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2019, Darm­stadt, Ger­ma­ny, April 3-5, 2019.
  • CRAFT: Light­weight Twe­a­ka­ble Block Ci­pher with Ef­fi­ci­ent Pro­tec­tion Against DFA At­tacks, Chris­tof Bei­er­le, Gre­gor Le­an­der, Amir Mo­ra­di, Shahram Ra­so­olz­adeh – IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp 5-45, 2019.
  • Yet Ano­ther Size Re­cord for AES: A First-Or­der SCA Se­cu­re AES S-box Based on GF(2^8) Mul­ti­pli­ca­ti­on, Felix We­ge­ner, Amir Mo­ra­di – 17th Smart Card Re­se­arch and Ad­van­ced Ap­p­li­ca­ti­on Con­fe­rence, CAR­DIS 2018, Mont­pel­lier, Fran­ce, No­vem­ber 12-14, 2018.
  • Re­mo­te In­ter-Chip Power Ana­ly­sis Si­de-Chan­nel At­tacks at Board-Le­vel, Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – In­ter­na­tio­nal Con­fe­rence On Com­pu­ter Aided De­sign, ICCAD 2018, San Diego, CA, USA, No­vem­ber 5-8, 2018.
  • Hard­ware Mas­king, Re­vi­si­ted, Tho­mas De Cnud­de, Maik Ender, Amir Mo­ra­di – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 2, pp 123-148, 2018.
  • Le­a­ka­ge De­tec­tion with the χ²-Test, Amir Mo­ra­di, Bas­ti­an Rich­ter, To­bi­as Schnei­der, François-Xa­vier Stan­da­ert – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 1, pp 209-237, 2018.
  • Spin Me Right Round – Ro­ta­tio­nal Sym­me­try for FP­GA-Spe­ci­fic AES, Lau­ren De Meyer, Amir Mo­ra­di, Felix We­ge­ner – IACR Tran­sac­tions on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, Vol. 2018, No. 3, pp 596-626, 2018.
  • Thres­hold Im­ple­men­ta­ti­on in Soft­ware – Case Study of PRE­SENT, Pas­cal Sas­d­rich, Rene Bock, Amir Mo­ra­di – 9th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
  • A First-Or­der SCA Re­sis­tant AES wi­thout Fresh Ran­dom­ness, Felix We­ge­ner, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2018, Sin­ga­po­re, April 23-24, 2018.
  • An In­si­de Job: Re­mo­te Power Ana­ly­sis At­tacks on FPGAs, Falk Schel­len­berg, Den­nis R.E. Gnad, Amir Mo­ra­di, Mehdi B. Taho­o­ri – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2018, Dres­den, Ger­ma­ny, March 18 – 23 , 2018. best paper can­di­da­te.
  • Bit­stream Fault In­jec­tions (BiFI) – Au­to­ma­ted Fault At­tacks against SRAM-ba­sed FPGAs, Pawel Swier­czyn­ski, Georg T. Be­cker, Amir Mo­ra­di, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 348-360, 2018.
  • Gli­F­reD: Glitch-Free Du­pli­ca­ti­on – Towards Power-Equa­li­zed Cir­cuits on FPGAs, Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – IEEE Tran­sac­tions on Com­pu­ters, vol. 67, no. 3, pp. 375-387, 2018
  • The First Tho­rough Si­de-Chan­nel Hard­ware Tro­jan, Maik Ender, Sa­ma­neh Ghan­da­li, Amir Mo­ra­di, Chris­tof Paar – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2017, Hong Kong, China, De­cem­ber 3 – 7, 2017.
  • Bit-Sli­ding: A Ge­ne­ric Tech­ni­que for Bit-Se­ri­al Im­ple­men­ta­ti­ons of SPN-ba­sed Pri­mi­ti­ves, Jérémy Jean, Amir Mo­ra­di, Tho­mas Pey­rin, Pas­cal Sas­d­rich – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2017, Tai­pei, Tai­wan, Sep­tem­ber 25 – 28, 2017.
  • On the Ea­si­ness of Turning Hig­her-Or­der Le­a­ka­ges into First-Or­der, Thor­ben Moos, Amir Mo­ra­di – 8th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
  • SafeDRP: Yet Ano­ther Way Toward Power-Equa­li­zed De­signs in FPGA, Maik Ender, Alex­an­der Wild, Amir Mo­ra­di – In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, Fran­ce, April 13-14, 2017.
  • SPARX – A Si­de-Chan­nel Pro­tec­ted Pro­ces­sor for ARX-ba­sed Cryp­to­gra­phy, Flo­ri­an Bache, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017.
  • Sta­tic Power Si­de-Chan­nel Ana­ly­sis of a Thres­hold Im­ple­men­ta­ti­on Pro­to­ty­pe Chip, Thor­ben Moos, Amir Mo­ra­di, Bas­ti­an Rich­ter – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2017, Lausan­ne, Swit­z­er­land, March 27 – 31 , 2017. best paper can­di­da­te.
  • Hiding Hig­her-Or­der Si­de-Chan­nel Le­a­ka­ge – Ran­do­mi­zing Cryp­to­gra­phic Im­ple­men­ta­ti­ons in Re­con­fi­gura­ble Hard­ware, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – RSA Con­fe­rence Cryp­to­graph­ers’ Track, CT-RSA 2017, San Fran­cis­co, Fe­bru­ary 14-17 2017.
  • Si­de-Chan­nel Ana­ly­sis Pro­tec­tion and Low-La­ten­cy in Ac­tion – case study of PRIN­CE and Mi­do­ri, Amir Mo­ra­di, To­bi­as Schnei­der – In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2016, Hanoi, Viet­nam, De­cem­ber 4 – 8, 2016.
  • Mo­ments-Cor­re­la­ting DPA, Amir Mo­ra­di, François-Xa­vier Stan­da­ert – Theo­ry of Im­ple­men­ta­ti­on Se­cu­ri­ty (TIs) Work­shop (of ACM CCS 2016), Vi­en­na, Aus­tria, Oc­to­ber 24, 2016.
  • Strong 8-bit Sbo­xes with Ef­fi­ci­ent Mas­king in Hard­ware, Erik Boss, Vin­cent Gros­so, Tim Gü­ney­su, Gre­gor Le­an­der, Amir Mo­ra­di, To­bi­as Schnei­der – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 17 – 19, 2016.
  • ParTI – Towards Com­bined Hard­ware Coun­ter­me­a­su­res against Si­de-Chan­nel and Fault-In­jec­tion At­tacks, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
  • The SKIN­NY Fa­mi­ly of Block Ciph­ers and its Low-La­ten­cy Va­ri­ant MAN­TIS, Chris­tof Bei­er­le, Jérémy Jean, Ste­fan Kölbl, Gre­gor Le­an­der, Amir Mo­ra­di, Tho­mas Pey­rin, Yu Sasa­ki, Pas­cal Sas­d­rich, Siang Meng Sim – In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence – CRYP­TO 2016, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 14 – 18, 2016.
  • Brid­ging the Gap: Ad­van­ced Tools for Si­de-Chan­nel Le­a­ka­ge Esti­ma­ti­on bey­ond Gaus­si­an Tem­pla­tes and His­to­grams, To­bi­as Schnei­der, Amir Mo­ra­di, François-Xa­vier Stan­da­ert, Tim Gü­ney­su – 23nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2016, St. John’s, NL, Ca­na­da, Au­gust 10–12, 2016.
  • In­ter­dic­tion in Prac­tice – Hard­ware Tro­jan Against a High-Se­cu­ri­ty USB Flash Drive, Pawel Swier­czyn­ski, Marc Fyr­bi­ak, Phil­ipp Koppe, Amir Mo­ra­di, Chris­tof Paar – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Sprin­ger, June 2016.
  • Large Laser Spots and Fault Sen­si­ti­vi­ty Ana­ly­sis, Falk Schel­len­berg, Mar­kus Fin­kel­dey, Nils C. Ger­hardt, Mar­tin R. Hof­mann , Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2016, McLe­an, VA, USA, May 3-5, 2016. best student-pa­per award.
  • Im­pro­ved Si­de-Chan­nel Ana­ly­sis At­tacks on Xi­l­inx Bit­stream En­cryp­ti­on of 5, 6, and 7 Se­ries, Amir Mo­ra­di, To­bi­as Schnei­der – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
  • Ro­bust and One-Pass Par­al­lel Com­pu­ta­ti­on of Cor­re­la­ti­on-Ba­sed At­tacks at Ar­bi­tra­ry Order, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – 7th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2016, Gray, Aus­tria, April 14-15, 2016.
  • Whi­te-Box Cryp­to­gra­phy in the Gray Box – A Hard­ware Im­ple­men­ta­ti­on and its Side Chan­nels, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 23rd In­ter­na­tio­nal Con­fe­rence on Fast Soft­ware En­cryp­ti­on, FSE 2016, Bo­chum, Ger­ma­ny, March 20-23 2016.
  • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – Ex­ten­ded Ver­si­on, To­bi­as Schnei­der, Amir Mo­ra­di – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring June 2016, Vo­lu­me 6, Issue 2, pp 85–99.
  • As­sess­ment of Hiding the Hig­her-Or­der Le­a­ka­ges in Hard­ware – what are the achie­ve­ments ver­sus over­heads?, Amir Mo­ra­di, Alex­an­der Wild – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015. best paper can­di­da­te.
  • Le­a­ka­ge As­sess­ment Me­tho­do­lo­gy – a clear road­map for si­de-chan­nel eva­lua­ti­ons, To­bi­as Schnei­der, Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 – 16, 2015.
  • Af­fi­ne Equi­va­lence and its Ap­p­li­ca­ti­on to Tigh­te­ning Thres­hold Im­ple­men­ta­ti­ons, Pas­cal Sas­d­rich, Amir Mo­ra­di, Tim Gü­ney­su – 22nd In­ter­na­tio­nal Con­fe­rence on Selec­ted Areas in Cryp­to­gra­phy, SAC 2015, Mount All­i­son Uni­ver­si­ty Sack­vil­le, New Bruns­wick, Ca­na­da, Au­gust 12-14 2015.
  • Ad­van­ces in Si­de-Chan­nel Se­cu­ri­ty, Amir Mo­ra­di – Ha­bi­li­ta­ti­on The­sis, Ruhr University Bochum, Germany, 2015.
  • Arith­me­tic Ad­di­ti­on over Boo­le­an Mas­king – Towards First- and Se­cond-Or­der Re­sis­tan­ce in Hard­ware, To­bi­as Schnei­der, Amir Mo­ra­di, Tim Gü­ney­su – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2015, New York, USA, 2–5 June 2015.
  • Achie­ving Si­de-Chan­nel Pro­tec­tion with Dy­na­mic Logic Re­con­fi­gu­ra­ti­on on Mo­dern FPGAs, Pas­cal Sas­d­rich, Amir Mo­ra­di, Oli­ver Misch­ke, Tim Gü­ney­su – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware Ori­en­ted Se­cu­ri­ty and Trust, HOST 2015, McLe­an, VA, USA, May 5-7, 2015.
  • A Hard­ware-ba­sed Coun­ter­me­a­su­re to Re­du­ce Si­de-Chan­nel Le­a­ka­ge – De­sign, Im­ple­men­ta­ti­on, and Eva­lua­ti­on, An­dre­as Gor­nik, Amir Mo­ra­di, Jür­gen Oehm, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ter-Ai­ded De­sign of In­te­gra­ted Cir­cuits and Sys­tems, Vol. 34, No.8, pages 1308-1319, 2015.
  • Eva­lua­ting the Du­pli­ca­ti­on of Du­al-Rail Prech­ar­ge Lo­gics on FPGAs, Alex­an­der Wild, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
  • Si­de-Chan­nel Pro­tec­tion by Ran­do­mi­zing Look-Up Ta­bles on Re­con­fi­gura­ble Hard­ware – Pit­falls of Me­mo­ry Pri­mi­ti­ves, Pas­cal Sas­d­rich, Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015.
  • Si­de-Chan­nel Se­cu­ri­ty Ana­ly­sis of Ul­tra-Low-Power FRAM-ba­sed MCUs, Amir Mo­ra­di, Ge­si­ne Hin­ter­wäl­der – 6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015. best pa­per award.
  • Si­de-Chan­nel At­tacks from Sta­tic Power: When Should we Care?, San­tos Me­ri­no Del Pozo, François-Xa­vier Stan­da­ert, Dina Kamel, Amir Mo­ra­di – De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 – 13 , 2015.
  • Wire-Tap Codes as Si­de-Chan­nel Coun­ter­me­a­su­re – an FP­GA-ba­sed ex­pe­ri­ment, Amir Mo­ra­di – 15th In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in India, In­docrypt 2014, New Delhi, De­cem­ber 14 – 17, 2014.
  • Phy­si­cal Se­cu­ri­ty Eva­lua­ti­on of the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II and Stra­tix III FPGAs, Pawel Swier­czyn­ski, Amir Mo­ra­di, David Os­wald, Chris­tof Paar – ACM Tran­sac­tions on Re­con­fi­gura­ble Tech­no­lo­gy and Sys­tems (TRETS), Vo­lu­me 7 Issue 4, De­cem­ber 2014.
  • Full-Si­ze High-Se­cu­ri­ty ECC Im­ple­men­ta­ti­on on MSP430 Micro­con­trol­lers, Ge­si­ne Hin­ter­wäl­der, Amir Mo­ra­di, Micha­el Hut­ter, Peter Schwa­be, Chris­tof Paar – Third In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty in Latin Ame­ri­ca, La­tin­crypt 2014, Flo­ri­anópolis, Bra­zil, Sep­tem­ber 17 – 19, 2014.
  • Early Pro­pa­ga­ti­on and Im­ba­lan­ced Rou­ting, How to Di­mi­nish in FPGAs, Amir Mo­ra­di, Vin­cent Imm­ler – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
  • Si­de-Chan­nel Le­a­ka­ge through Sta­tic Power – Should We Care about in Prac­tice?, Amir Mo­ra­di – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 – 26, 2014.
  • Fault Sen­si­ti­vi­ty Ana­ly­sis Meets Ze­ro-Va­lue At­tack, Oli­ver Misch­ke, Amir Mo­ra­di, Tim Gü­ney­su – Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2014, Busan, Korea, Sep­tem­ber 23, 2014.
  • De­tec­ting Hi­d­den Le­a­ka­ges, Amir Mo­ra­di, Syl­vain Guil­ley, An­ne­lie Heu­ser – In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – ACNS 2014, Lausan­ne, Swit­z­er­land, June 10 – 13, 2014. best-pa­per award.
  • Com­pre­hen­si­ve Eva­lua­ti­on of AES Dual Ciph­ers as a Si­de-Chan­nel Coun­ter­me­a­su­re, Amir Mo­ra­di, Oli­ver Misch­ke – In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, ICICS 2013, Bei­jing, China, No­vem­ber 20 – 22, 2013.
  • One At­tack to Rule Them All: Col­li­si­on Ti­ming At­tack ver­sus 42 AES ASIC Cores, Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – IEEE Tran­sac­tions on Com­pu­ters, vol. 62, no. 9, pp. 1786-1798, Sept. 2013.
  • On the Sim­pli­ci­ty of Con­ver­ting Le­a­ka­ges from Mul­ti­va­ria­te to Uni­va­ria­te – Case Study of a Glitch-Re­sis­tant Mas­king Sche­me, Amir Mo­ra­di, Oli­ver Misch­ke – Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 – 23, 2013.
  • At­ta­cking Atmel’s Cryp­to­M­emo­ry EE­PROM with Spe­cial-Pur­po­se Hard­ware, Alex­an­der Wild, Tim Gü­ney­su, Amir Mo­ra­di – Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty – 11th In­ter­na­tio­nal Con­fe­rence, ACNS 2013, Banff, AB, Ca­na­da, June 25-28, 2013.
  • Si­de-Chan­nel At­tacks on the Bit­stream En­cryp­ti­on Me­cha­nism of Al­te­ra Stra­tix II – Fa­ci­li­ta­ting Black-Box Ana­ly­sis using Soft­ware Re­ver­se-En­gi­nee­ring, Amir Mo­ra­di, David Os­wald, Chris­tof Paar, Pawel Swier­czyn­ski – 21st ACM/SIGDA In­ter­na­tio­nal Sym­po­si­um on Field-Pro­gramma­ble Gate Ar­rays- FPGA 2013, pages 91-100, Fe­bru­ary 11 – 13. ACM, 2013.
  • Side Chan­nels as Buil­ding Blocks, Mar­kus Kas­per, Amir Mo­ra­di, Georg T. Be­cker, Oli­ver Misch­ke, Tim Gü­ney­su, Chris­tof Paar, Wayne Bur­le­son – Jour­nal of Cryp­to­gra­phic En­gi­nee­ring, Vo­lu­me 2, Num­ber 3, pages 143-159, 2012, Sprin­ger.
  • How Far Should Theo­ry be from Prac­tice? – Eva­lua­ti­on of a Coun­ter­me­a­su­re, Amir Mo­ra­di, Oli­ver Misch­ke – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2012 – 14th In­ter­na­tio­nal Work­shop, Leu­ven, Bel­gi­um, Sep­tem­ber 9-12, 2012.
  • Glitch-Free Im­ple­men­ta­ti­on of Mas­king in Mo­dern FPGAs, Amir Mo­ra­di, Oli­ver Misch­ke – 2012 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust, HOST 2012, San Fran­cis­co, CA, USA, June 3-4, 2012.
  • Sta­tis­ti­cal Tools Fla­vor Si­de-Chan­nel Col­li­si­on At­tacks, Amir Mo­ra­di – Ad­van­ces in Cryp­to­lo­gy – EU­RO­CRYPT 2012 – 31th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Cam­bridge, United King­dom, April 15-19, 2012, pages 428-445.
  • Black-Box Si­de-Chan­nel At­tacks High­light the Im­port­an­ce of Coun­ter­me­a­su­res – An Ana­ly­sis of the Xi­l­inx Vir­tex-4 and Vir­tex-5 Bit­stream En­cryp­ti­on Me­cha­nism, Amir Mo­ra­di, Mar­kus Kas­per, Chris­tof Paar – To­pics in Cryp­to­lo­gy – CT-RSA 2012 – The Cryp­to­graph­ers‘ Track at the RSA Con­fe­rence, San Fran­cis­co, CA, USA, Fe­bru­ary 27- March 2, 2012, pages 1-18.
  • Prak­ti­sche An­grif­fe auf die Bit­strom­ver­schlüs­se­lung von Xi­l­inx FPGAs, Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – Da­ten­schutz und Da­ten­si­cher­heit – DuD – Aus­ga­be 11/2011.
  • On the Vul­nerabi­li­ty of FPGA Bit­stream En­cryp­ti­on against Power Ana­ly­sis At­tacks – Extrac­ting Keys from Xi­l­inx Vir­tex-II FPGAs, Amir Mo­ra­di, Ales­san­dro Ba­renghi, Timo Kas­per, Chris­tof Paar – 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty, CCS 2011, Chi­ca­go, IL, USA, Oc­to­ber 17-21, 2011, pages 111-124.
  • Ge­ne­ric Si­de-Chan­nel Coun­ter­me­a­su­res for Re­con­fi­gura­ble De­vices, Tim Gü­ney­su, Amir Mo­ra­di – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
  • On the Power of Fault Sen­si­ti­vi­ty Ana­ly­sis and Col­li­si­on Si­de-Chan­nel At­tacks in a Com­bined Set­ting, Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar, Yang Li, Kazuo Ohta, Kazuo Sa­kiyama – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems – CHES 2011 – 13th In­ter­na­tio­nal Work­shop, Nara, Japan, Sep­tem­ber 28 – Oc­to­ber 1, 2011.
  • Mas­ked Du­al-Rail Prech­ar­ge Logic En­coun­ters Sta­te-of-the-Art Power Ana­ly­sis Me­thods, Amir Mo­ra­di, Mario Kirsch­baum, Tho­mas Ei­sen­barth, Chris­tof Paar – IEEE Tran­sac­tions on Very Large Scale In­te­gra­ti­on Sys­tems, Vo­lu­me 20 , Issue 9, Pages 1578 – 1589, 2012.
  • Prac­tical Eva­lua­ti­on of DPA Coun­ter­me­a­su­res on Re­con­fi­gura­ble Hard­ware, Amir Mo­ra­di, Oli­ver Misch­ke, Chris­tof Paar – HOST 2011, Pro­cee­dings of the 2011 IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST), 5-6 June 2011, San Diego, Ca­li­for­nia, USA.
  • Pus­hing the Li­mits: A Very Com­pact and a Thres­hold Im­ple­men­ta­ti­on of AES, Amir Mo­ra­di, Dipl.-Kfm. Axel Po­sch­mann, San Ling, Chris­tof Paar, Hua­xi­ong Wang – Ad­van­ces in Cryp­to­lo­gy – EU­ROCRYPT 2011 – 30th An­nual In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­gra­phic Tech­ni­ques, Tal­linn, Es­to­nia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger.
  • Si­de-Chan­nel Re­sis­tant Cryp­to for less than 2,300 GE, Axel Po­sch­mann, Amir Mo­ra­di, Khoong­ming Khoo, Chu-Wee Lim, Hua­xi­ong Wang, San Ling – Jour­nal of Cryp­to­lo­gy, Spe­cial Issue on Hard­ware and Se­cu­ri­ty, Vo­lu­me 24, Num­ber 2, pages 322-345, April 2011.
  • Si­de-chan­nel based wa­ter­marks for IP Pro­tec­tion, Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – CO­SA­DE 2010 – First In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign.
  • Cor­re­la­ti­on-En­han­ced Power Ana­ly­sis Col­li­si­on At­tack, Amir Mo­ra­di, Oli­ver Misch­ke, Tho­mas Ei­sen­barth – Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2010, 12th In­ter­na­tio­nal Work­shop, Santa Bar­ba­ra, CA, USA, Au­gust 17-20, 2010. Pro­cee­dings
  • Si­de-chan­nael based wa­ter­marks for in­te­gra­ted cir­cuits, Georg T. Be­cker, Mar­kus Kas­per, Amir Mo­ra­di, Chris­tof Paar – IEEE In­ter­na­tio­nal Sym­po­si­um on Hard­ware-Ori­en­ted Se­cu­ri­ty and Trust (HOST 2010), Ana­heim­CA , USA, 13-14 June 2010.
  • Prac­tical Power Ana­ly­sis At­tacks on Soft­ware Im­ple­men­ta­ti­ons of McE­lie­ce, Ste­fan Heyse, Amir Mo­ra­di, Chris­tof Paar – Post-Quan­tum Cryp­to­gra­phy, Third In­ter­na­tio­nal Work­shop, PQCryp­to 2010, Darm­stadt, Ger­ma­ny, May 25-28, 2010. Pro­cee­dings
  • Light­weight Cryp­to­gra­phy and DPA Coun­ter­me­a­su­res: A Sur­vey, Amir Mo­ra­di, Axel Po­sch­mann – First In­ter­na­tio­nal Work­shop on Light­weight Cryp­to­gra­phy for Re­sour­ce-Cons­trained De­vices, WLC 2010 (co-lo­ca­ted with Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty – FC 2010), Te­ne­ri­fe, Cana­ry Is­lands, Spain, Ja­nu­ar 25-28, 2010.
  • A New Re­mo­te Key­less Entry Sys­tem Re­sis­tant to Power Ana­ly­sis At­tacks, Amir Mo­ra­di, Timo Kas­per – 7th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on, Com­mu­ni­ca­ti­ons and Si­gnal Pro­ces­sing, ICICS 2009, Macau, China, December 7-10, 2009.
  • Power Ana­ly­sis of Sin­gle-Rail Sto­r­a­ge Ele­ments as used in MDPL, Amir Mo­ra­di, Tho­mas Ei­sen­barth, Dipl.-Kfm. Axel Po­sch­mann, Chris­tof Paar – 12th In­ter­na­tio­nal Con­fe­rence on In­for­ma­ti­on Se­cu­ri­ty and Cryp­to­lo­gy – ICISC 2009, Seoul, Korea, De­cem­ber 2-4, 2009.
  • Kee­Loq and Si­de-Chan­nel Ana­ly­sis – Evo­lu­ti­on of an At­tack, Chris­tof Paar, Tho­mas Ei­sen­barth, Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di – 6th IEEE Work­shop on Fault Dia­gno­sis and To­leran­ce in Cryp­to­gra­phy – FDTC 2009.Lausan­ne, Swit­z­er­land, Sep­tem­ber 6, 2009.
  • A Com­pa­ra­ti­ve Study of Mu­tu­al In­for­ma­ti­on Ana­ly­sis under a Gaus­si­an As­sump­ti­on, Amir Mo­ra­di, Nima Mou­sa­vi, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh – 10th In­ter­na­tio­nal Work­shop on In­for­ma­ti­on Se­cu­ri­ty Ap­p­li­ca­ti­ons, WISA 2009, Busan, Korea. Au­gust 25-27, 2009.
  • Brea­king Kee­Loq in a Flash: On Extrac­ting Keys at Light­ning Speed, Mar­kus Kas­per, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar – 2nd In­ter­na­tio­nal Con­fe­rence on Cryp­to­lo­gy in Af­ri­ca, Pro­gress in Cryp­to­lo­gy – AF­RI­CA­CRYPT 2009, Gam­marth, Tu­ni­sia, 21-25 Juni, 2009.
  • Dual-rail transition logic: A logic style for counteracting power analysis attacks, Amir Moradi, Mohammad Taghi Manzuri Shalmani, Mahmoud Salmasizadeh, Computers & Electrical Engineering, Volume 35, Issue 2, Pages 359-369, 2009.
  • Vulnerability modeling of cryptographic hardware to power analysis attacks, Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Thomas Eisenbarth, Integration, Volume 42, Issue 4, Pages 468-478, 2009.
  • Charge recovery logic as a side channel attack countermeasure, Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, 10th International Symposium on Quality Electronic Design (ISQED), pp. 686-691, 2009.
  • A Comparative Study of Mutual Information Analysis under a Gaussian Assumption, Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh, Information Security Applications, 10th International Workshop (WISA), Lecture Notes in Computer Science, vol 5932., pp. 193-205, 2009.
  • On the Power of Power Ana­ly­sis in the Real World: A Com­ple­te Break of the Kee­Loq Code Hop­ping Sche­me, Tho­mas Ei­sen­barth, Timo Kas­per, Amir Mo­ra­di, Chris­tof Paar, Mahmoud Sal­ma­si­z­adeh, Mo­ham­mad T. Man­zu­ri Shal­ma­ni – 28th In­ter­na­tio­nal Cryp­to­lo­gy Con­fe­rence — CRYP­TO 2008. Santa Bar­ba­ra, Ca­li­for­nia, USA. Au­gust 17-21, 2008.
  • Sus­cep­ti­bi­li­ty of eS­TREAM Can­di­da­tes towards Side Chan­nel Ana­ly­sis, Be­ne­dikt Gier­lichs, Lejla Ba­ti­na, Chris­to­phe Cla­vier, Tho­mas Ei­sen­barth, Aline Gouget, He­le­na Hand­schuh, Timo Kas­per, Kers­tin Lem­ke-Rust, Ste­fan Man­gard, Amir Mo­ra­di, Eli­sa­beth Os­wald – The State of the Art of Stream Ciph­ers, SASC 2008, Lausan­ne, Swit­z­er­land. Fe­bru­ar, 13-14 2008.
  • On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices, Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6., pp. 661-670, 2008.
  • A secure and low-energy logic style using charge recovery approach, Mehrdad Khatir, Amir Moradi, Alireza Ejlali, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, international symposium on Low Power Electronics & Design (ISLPED ’08). Association for Computing Machinery, pp. 259-264, 2008.
  • Compact and Secure Design of Masked AES S-Box, Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani, Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861, pp. 216-229, 2007.
  • Power Analysis Attacks on MDPL and DRSL Implementations, Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani, Information Security and Cryptology – ICISC 2007. Lecture Notes in Computer Science, vol 4817, pp. 259-272, 2007.
  • A Generalized Method of Differential Fault Attack Against AES Cryptosystem, Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh, Cryptographic Hardware and Embedded Systems – CHES 2006. Lecture Notes in Computer Science, vol 4249, pp. 91-100, 2006.