Johann Großschädl
TitoloCitata daAnno
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
M Medwed, FX Standaert, J Großschädl, F Regazzoni
International Conference on Cryptology in Africa, 279-296, 2010
1162010
Instruction set extensions for efficient AES implementation on 32-bit processors
S Tillich, J Großschädl
Cryptographic Hardware and Embedded Systems---CHES 2006, 270-284, 2006
1092006
Triathlon of lightweight block ciphers for the internet of things
D Dinu, Y Le Corre, D Khovratovich, L Perrin, J Großschädl, A Biryukov
Journal of Cryptographic Engineering, 1-20, 2015
892015
Instruction set extensions for fast arithmetic in finite fields GF(p) and GF(2m)
J Großschädl, E Savaş
Cryptographic Hardware and Embedded Systems---CHES 2004, 133-147, 2004
842004
The energy cost of cryptographic key establishment in wireless sensor networks
J Großschädl, A Szekely, S Tillich
2nd ACM Symposium on Information, Computer and Communications Security …, 2007
762007
Efficient Ring-LWE encryption on 8-bit AVR processors
Z Liu, H Seo, SS Roy, J Großschädl, H Kim, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 663-682, 2015
732015
Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2<sup>m</sup>)
J Groszschaedl, GA Kamendje
14th IEEE Conference on Application-Specific Systems, Architectures, and …, 2003
722003
A bit-serial unified multiplier architecture for finite fields GF(p) and GF(2m)
J Großschädl
Cryptographic Hardware and Embedded Systems---CHES 2001, 202-219, 2001
70*2001
Energy-efficient software implementation of long integer modular arithmetic
J Großschädl, R Avanzi, E Savaş, S Tillich
Cryptographic Hardware and Embedded Systems---CHES 2005, 75-90, 2005
682005
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
C Lederer, R Mader, M Koschuch, J Großschädl, A Szekely, S Tillich
Information Security Theory and Practice---WISTP 2009, 112-127, 2009
672009
The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip
J Grossschadl
16th Annual Conference on Computer Security Applications (ACSAC 2000), 384-393, 2000
622000
Hardware/software co-design of elliptic curve cryptography on an 8051 microcontroller
M Koschuch, J Lechner, A Weitzer, J Großschädl, A Szekely, S Tillich, ...
Cryptographic Hardware and Embedded Systems---CHES 2006, 430-444, 2006
602006
Energy evaluation of software implementations of block ciphers under memory constraints
J Großschädl, S Tillich, C Rechberger, M Hofmann, M Medwed
10th Conference on Design, Automation and Test in Europe (DATE 2007), 1110-1115, 2007
522007
TinySA: A security architecture for wireless sensor networks
J Großschädl
Proceedings of the 2006 ACM CoNEXT conference, 55, 2006
522006
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
Z Liu, J Großschädl, Z Hu, K Järvinen, H Wang, I Verbauwhede
IEEE Transactions on Computers 66 (5), 773-785, 2017
512017
On software parallel implementation of cryptographic pairings
P Grabher, J Großschädl, D Page
Selected Areas in Cryptography---SAC 2008, 35-50, 2009
51*2009
An instruction set extension for fast and memory-efficient AES implementation
S Tillich, J Großschädl, A Szekely
Communications and Multimedia Security---CMS 2005, 11-21, 2005
512005
Design Strategies for ARX with Provable Bounds: Sparx and LAX
D Dinu, L Perrin, A Udovenko, V Velichkov, J Großschädl, A Biryukov
International Conference on the Theory and Application of Cryptology and …, 2016
49*2016
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
Z Liu, H Seo, J Großschädl, H Kim
IEEE Transactions on Information Forensics and Security 11 (7), 1385-1397, 2016
482016
MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks
Z Liu, E Wenger, J Großschädl
International Conference on Applied Cryptography and Network Security, 361-379, 2014
472014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20