Johann Großschädl
Orcid: 0009-0006-3210-3102Affiliations:
- University of Luxembourg
According to our database1,
Johann Großschädl
authored at least 123 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on wwwde.uni.lu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Step-by-Step Simulation and Statistical Analysis of C and Assembly Programs for MSP430.
Proceedings of the 11th International Conference on Future Internet of Things and Cloud, 2024
RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023
2022
Efficient Software Implementation of the SIKE Protocol Using a New Data Representation.
IEEE Trans. Computers, 2022
Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the Smart Card Research and Advanced Applications, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
An Evaluation of the Multi-platform Efficiency of Lightweight Cryptographic Permutations.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Faster Software Implementation of the SIKE Protocol Based on A New Data Representation.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Proceedings of the Mobile, Secure, and Programmable Networking, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
J. Cryptogr. Eng., 2019
Proceedings of the Information Security Theory and Practice, 2019
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
Proceedings of the Smart Card Research and Advanced Applications, 2019
2018
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Commun. Mag., 2018
Proceedings of the Information Security Theory and Practice, 2018
Efficient Implementation of the SHA-512 Hash Function for 8-Bit AVR Microcontrollers.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things.
IEEE Trans. Computers, 2017
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Mobile, Secure, and Programmable Networking, 2017
Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares.
Proceedings of the Information Security - 20th International Conference, 2017
2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016
J. Cryptogr. Eng., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Secur. Commun. Networks, 2014
IACR Cryptol. ePrint Arch., 2014
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Fundam. Informaticae, 2012
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012
2011
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
IACR Cryptol. ePrint Arch., 2011
A Unified Multiply/Accumulate Unit for Pairing-Based Cryptography over Prime, Binary and Ternary Fields.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011
2010
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Proceedings of the Trusted Systems - Second International Conference, 2010
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Proceedings of the Progress in Cryptology, 2010
2009
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.
Trans. Comput. Sci., 2009
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the 4th Workshop on Embedded Systems Security, 2009
2008
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box.
J. Signal Process. Syst., 2008
IACR Cryptol. ePrint Arch., 2008
Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security.
Proceedings of the ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 2008
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Cryptography and Coding, 2007
Performance Evaluation of Instruction Set Extensions for Long Integer Modular Arithmetic on a SPARC V8 Processor.
Proceedings of the Tenth Euromicro Conference on Digital System Design: Architectures, 2007
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits.
Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 2007
Energy evaluation of software implementations of block ciphers under memory constraints.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box.
Proceedings of the Embedded Computer Systems: Architectures, 2006
Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography.
Proceedings of the Conference on Design, Automation and Test in Europe, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Architectural Enhancements to Support Digital Signal Processing and Public-Key Cryptography.
Proceedings of the Second Workshop on Intelligent Solutions in Embedded Systems, 2004
Proceedings of the Computer and Information Sciences, 2004
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2<sup>m</sup>).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004
A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2<sup>m</sup>).
Proceedings of the Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, 2004
2003
Int. J. High Perform. Comput. Appl., 2003
Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2<sup>m</sup>).
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Security in Pervasive Computing, 2003
A Versatile and Scalable Digit-Serial/Parallel Multiplier Architecture for Finite Fields GF(2m).
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
A single-cycle (32×32+32+64)-bit multiply/accumulate unit for digital signal processing and public-key cryptography.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Instruction Set Extension for Fast Elliptic Curve Cryptography over Binary Finite Fields GF(2m).
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Instruction Set Extension for Long Integer Modulo Arithmetic on RISC-Based Smart Cards.
Proceedings of the 14th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2002), 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
2001
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2<sup>m</sup>).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
A New Serial/Parallel Architecture for a Low Power Modular Multiplier.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000