idw – Informationsdienst Wissenschaft

Nachrichten, Termine, Experten

Grafik: idw-Logo
Science Video Project

idw-News App:


Google Play Store



05/16/2023 - 05/16/2023 | Darmstadt

ATHENE Lecture with Amir Moradi | hybrid

Prof. Amir Moradi from the Ruhr-Universität Bochum is our guest at the ATHENE Lecture Series. He talks about: "Simply Secure: Tools for Automated Generation and Evaluation of Protected Hardware"

At the ATHENE Lectures, we invite established national and inter­national cybersecurity experts to give us insights into their latest research findings.
The lectures are mostly held hybrid (on-site at Fraunhofer SIT in Darmstadt), so that there is also the possibility to meet and exchange with the key players in cybersecurity in person after the lecture with tasty snacks and drinks.
The language of the lecture is English.
ATHENE Lecture Series are organized by Prof. Haya Shulman, ATHENE | Goethe University Frankfurt | Fraunhofer SIT.

On May 16, Amir Moradi from the Ruhr-Universität Bochum will be our guest.

Title: Simply Secure: Tools for Automated Generation and Evaluation of Protected Hardware

Implementing cryptographic functions securely in the presence of physical adversaries is still a challenge although a lion's share of research in the physical security domain has been put in development of countermeasures. Among several protection schemes, masking has absorbed the most attention of researchers in both academic and industrial communities. This is due to its theoretical foundation allowing to provide proofs, and model the achieved security level. In return, masking schemes are difficult to realize as the implementation process often is manual, complex, and error-prone, and requires a high level of expertise. This motivated the need for tools that allow the designers and engineers to evaluate as well as generate masked (protected) implementations through an automated fashion.

In this talk, in addition to the basics of hardware masking, a set of tools are presented, which supports developers in the process of designing secure hardware circuits. The toolbox enables (1) fully automated protection of insecure circuits against side-channel analysis attacks and (2) efficient verification of their SCA resistance. As a result, circuits dealing with sensitive data can be reliably protected against such implementation attacks even by inexperienced engineers and developers.

Information on participating / attending:
The lectures are open to the public. Interested visitors are welcome to attend.
Please register at:


05/16/2023 14:00 - 05/16/2023 15:00

Event venue:

hybrid: on-site at Fraunhofer SIT, Rheinstr. 75, Darmstadt / online via Zoom
64295 Darmstadt

Target group:

Scientists and scholars, Students

Email address:


transregional, national

Subject areas:

Information technology

Types of events:

Presentation / colloquium / lecture




Cornelia Reitz


Presse- und Öffentlichkeitsarbeit

Event is free:


Language of the text:


URL of this event:


Search / advanced search of the idw archives
Combination of search terms

You can combine search terms with and, or and/or not, e.g. Philo not logy.


You can use brackets to separate combinations from each other, e.g. (Philo not logy) or (Psycho and logy).


Coherent groups of words will be located as complete phrases if you put them into quotation marks, e.g. “Federal Republic of Germany”.

Selection criteria

You can also use the advanced search without entering search terms. It will then follow the criteria you have selected (e.g. country or subject area).

If you have not selected any criteria in a given category, the entire category will be searched (e.g. all subject areas or all countries).