What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Johann Großschädl
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381.
Hao Cheng
Georgios Fotiadis
Johann Großschädl
Daniel Page
2023
journals/tches
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography.
Hao Cheng
Johann Großschädl
Ben Marshall
Dan Page
Thinh Hung Pham
2022
journals/tches
Highly Vectorized SIKE for AVX-512.
Hao Cheng
Georgios Fotiadis
Johann Großschädl
Peter Y. A. Ryan
2021
journals/tches
Batching CSIDH Group Actions using AVX-512.
Hao Cheng
Georgios Fotiadis
Johann Großschädl
Peter Y. A. Ryan
Peter B. Rønne
2021
journals/tches
An Instruction Set Extension to Support Software-Based Masking.
Si Gao
Johann Großschädl
Ben Marshall
Dan Page
Thinh Hung Pham
Francesco Regazzoni
2020
journals/tosc
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2020
conf/acisp
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2.
Junhao Huang
Zhe Liu
Zhi Hu
Johann Großschädl
2020
conf/crypto
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Christof Beierle
Alex Biryukov
Luan Cardoso dos Santos
Johann Großschädl
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Qingju Wang
2020
conf/sacrypt
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.
Hao Cheng
Johann Großschädl
Jiaqi Tian
Peter B. Rønne
Peter Y. A. Ryan
2016
journals/tifs
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2016
conf/acisp
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes.
Zhe Liu
Johann Großschädl
Lin Li
Qiuliang Xu
2016
conf/acns
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice.
Alex Biryukov
Daniel Dinu
Johann Großschädl
2016
conf/asiacrypt
Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Daniel Dinu
Léo Perrin
Aleksei Udovenko
Vesselin Velichkov
Johann Großschädl
Alex Biryukov
2015
conf/fse
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
Jean-Sébastien Coron
Johann Großschädl
Mehdi Tibouchi
Praveen Kumar Vadnala
2015
conf/ccs
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Zhe Liu
Hwajeong Seo
Zhi Hu
Xinyi Huang
Johann Großschädl
2015
conf/ches
Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Sujoy Sinha Roy
Johann Großschädl
Howon Kim
Ingrid Verbauwhede
2015
conf/ctrsa
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Junwei Wang
Praveen Kumar Vadnala
Johann Großschädl
Qiuliang Xu
2014
conf/acns
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks.
Zhe Liu
Erich Wenger
Johann Großschädl
2014
conf/icisc
Montgomery Modular Multiplication on ARM-NEON Revisited.
Hwajeong Seo
Zhe Liu
Johann Großschädl
Jongseok Choi
Howon Kim
2014
conf/ches
Secure Conversion between Boolean and Arithmetic Masking of Any Order.
Jean-Sébastien Coron
Johann Großschädl
Praveen Kumar Vadnala
2014
conf/icics
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2014
conf/africacrypt
New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers.
Zhe Liu
Johann Großschädl
2013
conf/ccs
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes.
Dalin Chu
Johann Großschädl
Zhe Liu
Volker Müller
Yang Zhang
2013
conf/icics
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2011
conf/ches
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension.
Philipp Grabher
Johann Großschädl
Simon Hoerder
Kimmo Järvinen
Dan Page
Stefan Tillich
Marcin Wójcik
2010
conf/africacrypt
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Marcel Medwed
François-Xavier Standaert
Johann Großschädl
Francesco Regazzoni
2010
conf/cans
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.
Johann Großschädl
Ilya Kizhvatov
2009
conf/icisc
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
Johann Großschädl
Elisabeth Oswald
Dan Page
Michael Tunstall
2009
conf/icics
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.
Manuel Koschuch
Johann Großschädl
Dan Page
Philipp Grabher
Matthias Hudler
Michael Krüger
2008
conf/ches
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography.
Philipp Grabher
Johann Großschädl
Dan Page
2008
conf/host
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems.
Johann Großschädl
Tobias Vejda
Dan Page
2008
conf/sacrypt
On Software Parallel Implementation of Cryptographic Pairings.
Philipp Grabher
Johann Großschädl
Dan Page
2008
conf/cans
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.
Manuel Koschuch
Johann Großschädl
Udo Payer
Matthias Hudler
Michael Krüger
2007
conf/ccs
The energy cost of cryptographic key establishment in wireless sensor networks.
Johann Großschädl
Alexander Szekely
Stefan Tillich
2007
conf/ches
Power Analysis Resistant AES Implementation with Instruction Set Extensions.
Stefan Tillich
Johann Großschädl
2006
conf/ches
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors.
Stefan Tillich
Johann Großschädl
2006
conf/ches
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.
Manuel Koschuch
Joachim Lechner
Andreas Weitzer
Johann Großschädl
Alexander Szekely
Stefan Tillich
Johannes Wolkerstorfer
2005
conf/ches
Energy-Efficient Software Implementation of Long Integer Modular Arithmetic.
Johann Großschädl
Roberto Maria Avanzi
Erkay Savas
Stefan Tillich
2004
conf/ches
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2<sup>m</sup>).
Johann Großschädl
Erkay Savas
2003
conf/acns
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Johann Großschädl
Guy-Armand Kamendje
2003
conf/wisa
Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2<sup>m</sup>).
Johann Großschädl
Guy-Armand Kamendje
2001
conf/ches
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2<sup>m</sup>).
Johann Großschädl
2000
conf/sec
A New Serial/Parallel Architecture for a Low Power Modular Multiplier.
Johann Großschädl
2000
conf/ches
High-Speed RSA Hardware Based on Barret's Modular Reduction Method.
Johann Großschädl
2000
conf/acsac
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip.
Johann Großschädl
Coauthors
Aleksei Udovenko
(3)
Alex Biryukov
(4)
Alexander Szekely
(2)
Andreas Weitzer
(1)
Ben Marshall
(2)
Christof Beierle
(2)
Dalin Chu
(1)
Dan Page
(8)
Daniel Dinu
(2)
Daniel Page
(1)
Elisabeth Oswald
(1)
Erich Wenger
(1)
Erkay Savas
(2)
Francesco Regazzoni
(2)
François-Xavier Standaert
(1)
Georgios Fotiadis
(3)
Guy-Armand Kamendje
(2)
Hao Cheng
(5)
Howon Kim
(5)
Hwajeong Seo
(6)
Ilya Kizhvatov
(1)
Ingrid Verbauwhede
(1)
Jean-Sébastien Coron
(2)
Jiaqi Tian
(1)
Joachim Lechner
(1)
Johann Großschädl
(45)
Johannes Wolkerstorfer
(1)
Jongseok Choi
(1)
Junhao Huang
(1)
Junwei Wang
(1)
Kimmo Järvinen
(1)
Léo Perrin
(3)
Lin Li
(1)
Luan Cardoso dos Santos
(2)
Manuel Koschuch
(3)
Marcel Medwed
(1)
Marcin Wójcik
(1)
Matthias Hudler
(2)
Mehdi Tibouchi
(1)
Michael Krüger
(2)
Michael Tunstall
(1)
Peter B. Rønne
(2)
Peter Y. A. Ryan
(3)
Philipp Grabher
(4)
Praveen Kumar Vadnala
(3)
Qingju Wang
(2)
Qiuliang Xu
(2)
Roberto Maria Avanzi
(1)
Si Gao
(1)
Simon Hoerder
(1)
Stefan Tillich
(6)
Sujoy Sinha Roy
(1)
Thinh Hung Pham
(2)
Tobias Vejda
(1)
Udo Payer
(1)
Vesselin Velichkov
(3)
Volker Müller
(1)
Xinyi Huang
(1)
Yang Zhang
(1)
Zhe Liu
(11)
Zhi Hu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to