|
Search the dblp DataBase
Amir Moradi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
A Generalized Method of Differential Fault Attack Against AES Cryptosystem. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:91-100 [Conf]
- Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
Compact and Secure Design of Masked AES S-Box. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:216-229 [Conf]
- Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
Power Analysis Attacks on MDPL and DRSL Implementations. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:259-272 [Conf]
Enhanced cross-diamond-hexagonal search algorithms for fast block motion estimation. [Citation Graph (, )][DBLP]
Correlation-Enhanced Power Analysis Collision Attack. [Citation Graph (, )][DBLP]
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. [Citation Graph (, )][DBLP]
Lightweight Cryptography and DPA Countermeasures: A Survey. [Citation Graph (, )][DBLP]
KeeLoq and Side-Channel Analysis-Evolution of an Attack. [Citation Graph (, )][DBLP]
Power Analysis of Single-Rail Storage Elements as Used in MDPL. [Citation Graph (, )][DBLP]
A secure and low-energy logic style using charge recovery approach. [Citation Graph (, )][DBLP]
Charge recovery logic as a side channel attack countermeasure. [Citation Graph (, )][DBLP]
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. [Citation Graph (, )][DBLP]
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. [Citation Graph (, )][DBLP]
Practical Power Analysis Attacks on Software Implementations of McEliece. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|