Follow
Johann Großschädl
Johann Großschädl
Other namesJohann Groszschaedl, Johann Grossschadl
Research Specialist, University of Luxembourg
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
Triathlon of lightweight block ciphers for the internet of things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering, 1-20, 2015
2322015
Design Strategies for ARX with Provable Bounds: Sparx and LAX
D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
201*2016
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
M Medwed, FX Standaert, J Großschädl, F Regazzoni
International Conference on Cryptology in Africa, 279-296, 2010
2002010
Instruction set extensions for efficient AES implementation on 32-bit processors
S Tillich, J Großschädl
Cryptographic Hardware and Embedded Systems---CHES 2006, 270-284, 2006
1412006
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography
Z Liu, KKR Choo, J Großschädl
IEEE Communications Magazine 56 (2), 158-162, 2018
1372018
Efficient Ring-LWE encryption on 8-bit AVR processors
Z Liu, H Seo, S Sinha Roy, J Großschädl, H Kim, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1292015
Felics–fair evaluation of lightweight cryptographic systems
D Dinu, A Biryukov, J Großschädl, D Khovratovich, Y Le Corre, L Perrin
NIST Workshop on Lightweight Cryptography 128, 2015
127*2015
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
Z Liu, J Großschädl, Z Hu, K Järvinen, H Wang, I Verbauwhede
IEEE Transactions on Computers 66 (5), 773-785, 2017
1102017
Secure conversion between boolean and arithmetic masking of any order
JS Coron, J Großschädl, PK Vadnala
International Workshop on Cryptographic Hardware and Embedded Systems, 188-205, 2014
1082014
The energy cost of cryptographic key establishment in wireless sensor networks
J Großschädl, A Szekely, S Tillich
2nd ACM Symposium on Information, Computer and Communications Security …, 2007
1012007
Conversion from arithmetic to boolean masking with logarithmic complexity
JS Coron, J Großschädl, M Tibouchi, PK Vadnala
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
952015
Instruction set extensions for fast arithmetic in finite fields GF(p) and GF(2m)
J Großschädl, E Savaş
Cryptographic Hardware and Embedded Systems---CHES 2004, 133-147, 2004
942004
Energy-efficient software implementation of long integer modular arithmetic
J Großschädl, R Avanzi, E Savaş, S Tillich
Cryptographic Hardware and Embedded Systems---CHES 2005, 75-90, 2005
872005
Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family
C Beierle, A Biryukov, L Cardoso dos Santos, J Großschädl, L Perrin, ...
862019
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2016
832016
Side-channel analysis of cryptographic software via early-terminating multiplications
J Großschädl, E Oswald, D Page, M Tunstall
Information Security and Cryptology---ICISC 2009, 176-192, 2010
792010
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
C Lederer, R Mader, M Koschuch, J Großschädl, A Szekely, S Tillich
Information Security Theory and Practice---WISTP 2009, 112-127, 2009
792009
The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip
J Grossschadl
16th Annual Conference on Computer Security Applications (ACSAC 2000), 384-393, 2000
772000
Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2<sup>m</sup>)
J Groszschaedl, GA Kamendje
14th IEEE Conference on Application-Specific Systems, Architectures, and …, 2003
762003
Lightweight AEAD and hashing using the sparkle permutation family
C Beierle, A Biryukov, LC dos Santos, J Großschädl, L Perrin, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 208-261, 2020
722020
The system can't perform the operation now. Try again later.
Articles 1–20