Profil

GROSZSCHÄDL Johann

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
LIU, Zhe  (18)
CHENG, Hao  (11)
BIRYUKOV, Alex  (10)
DINU, Dumitru-Daniel  (8)
RYAN, Peter Y A  (8)
Main Referenced Keywords
Lightweight Cryptography (16); Elliptic Curve Cryptography (13); Multiple-Precision Arithmetic (8); Post-Quantum Cryptography (7); Internet of Things (IoT) (5);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (7)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography (2)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > APSIA - Applied Security and Information Assurance (1)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX (1)
Main Referenced Disciplines
Computer science (56)

Publications (total 56)

The most downloaded
1207 downloads
Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2013). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. In S. Qing, J. Zhou, ... D. Liu (Eds.), Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (pp. 302-317). Springer Verlag. doi:10.1007/978-3-319-02726-5_22 https://hdl.handle.net/10993/12934

The most cited

93 citations (Scopus®)

Liu, Z., Choo, K.-K. R., & Groszschädl, J. (February 2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56 (2), 158-162. doi:10.1109/MCOM.2018.1700330 https://hdl.handle.net/10993/37496

CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., & RYAN, P. Y. A. (2023). IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things. In S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, ... E. Renault (Eds.), Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (pp. 1-16). Cham, Switzerland: Springer Verlag. doi:10.1007/978-3-031-52426-4_1
Peer reviewed

Alsahli, M. R. M., Borgognoni, A., Cardoso Dos Santos, L., Cheng, H., Franck, C., & Groszschädl, J. (2022). Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things. In G. Bella, M. Doinea, ... H. Janicke (Eds.), Innovative Security Solutions for Information Technology and Communications, 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers (pp. 17-36). Springer Verlag. doi:10.1007/978-3-031-32636-3_2
Peer reviewed

Cheng, H., Groszschädl, J., Marshall, B., Page, D., & Pham, T. (November 2022). RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023 (1), 193-237. doi:10.46586/tches.v2023.i1.193-237
Peer Reviewed verified by ORBi

Cheng, H., Fotiadis, G., Groszschädl, J., & Ryan, P. Y. A. (February 2022). Highly Vectorized SIKE for AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022 (2), 41-68. doi:10.46586/tches.v2022.i2.41-68
Peer reviewed

Groszschädl, J., Franck, C., & Liu, Z. (2021). Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of Things. In R. Deng, F. Bao, G. Wang, J. Shen, M. Ryan, W. Meng, ... D. Wang (Eds.), Information Security Practice and Experience, 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings (pp. 263-282). Springer Verlag. doi:10.1007/978-3-030-93206-0_16
Peer reviewed

Franck, C., & Groszschädl, J. (2021). Optimized Implementation of SHA-512 for 16-bit MSP430 Microcontrollers. In P. Y. A. Ryan & C. Toma (Eds.), Innovative Security Solutions for Information Technology and Communications 14th International Conference, SECITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers (pp. 86-97). Springer Verlag. doi:10.1007/978-3-031-17510-7_7
Peer reviewed

Cardoso Dos Santos, L., & Groszschädl, J. (2021). An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations. In P. Y. A. Ryan & C. Toma (Eds.), Innovative Security Solutions for Information Technology and Communications 14th International Conference, SECITC 2021, Virtual Event, November 25-26, 2021, Revised Selected Papers (pp. 70-85). Springer Verlag. doi:10.1007/978-3-031-17510-7_6
Peer reviewed

Cheng, H., Fotiadis, G., Groszschädl, J., Ryan, P. Y. A., & Roenne, P. (August 2021). Batching CSIDH Group Actions using AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021 (4), 618-649. doi:10.46586/tches.v2021.i4.618-649
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2021). AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. In 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (pp. 1272-1277). IEEE. doi:10.23919/DATE51398.2021.9474033
Peer reviewed

Huang, J., Liu, Z., Hu, Z., & Groszschädl, J. (2020). Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2. In J. K. Liu & H. Cui (Eds.), Information Security and Privacy, 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings (pp. 204-224). Springer Verlag. doi:10.1007/978-3-030-55304-3_11
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2020). Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. In P.-Y. Liardet & N. Mentens (Eds.), Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (pp. 18-33). Springer Verlag. doi:10.1007/978-3-030-68487-7_2
Peer reviewed

Cheng, H., Groszschädl, J., Tian, J., Roenne, P., & Ryan, P. Y. A. (2020). High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. In O. Dunkelman, M. J. Jacobson Jr., ... C. O'Flynn (Eds.), Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 698-719). Springer Verlag. doi:10.1007/978-3-030-81652-0_27
Peer reviewed

Dupont, E., Franck, C., & Groszschädl, J. (2020). Fast and Flexible Elliptic Curve Cryptography for Dining Cryptographers Networks. In S. Bouzefrane, M. Laurent, S. Boumerdassi, ... R. Eric (Eds.), Mobile, Secure, and Programmable Networking, 6th International Conference, MSPN 2020, Paris, France, October 28–29, 2020, Revised Selected Papers (pp. 89-109). Springer Verlag. doi:10.1007/978-3-030-67550-9_7
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L., Udovenko, A., Velichkov, V., & Wang, Q. (2020). Alzette: A 64-Bit ARX-box (Feat. CRAX and TRAX). In D. Micciancio & T. Ristenpart (Eds.), Advances in Cryptology -- CRYPTO 2020, 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (pp. 419-448). Springer Verlag. doi:10.1007/978-3-030-56877-1_15
Peer reviewed

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (June 2020). Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Transactions on Symmetric Cryptology, 2020 (S1), 208-261. doi:10.13154/tosc.v2020.iS1.208-261
Peer Reviewed verified by ORBi

Cheng, H., Dinu, D.-D., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M. Laurent & T. Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag. doi:10.1007/978-3-030-41702-4_7
Peer reviewed

Cardoso Dos Santos, L., Groszschädl, J., & Biryukov, A. (2019). FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms. In S. Belaïd & T. Güneysu (Eds.), Smart Card Research and Advanced Applications, 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers (pp. 216-233). Springer Verlag. doi:10.1007/978-3-030-42068-0_13
Peer reviewed

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (September 2019). Triathlon of Lightweight Block Ciphers for the Internet of Things. Journal of Cryptographic Engineering, 9 (3), 283-302. doi:10.1007/s13389-018-0193-x
Peer reviewed

Groszschädl, J., Liu, Z., Hu, Z., Su, C., & Zhou, L. (2019). Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. In Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019) (pp. 1-8). IEEE. doi:10.1109/SIOT48044.2019.9637091
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/42597.

Beierle, C., Biryukov, A., Cardoso Dos Santos, L., Groszschädl, J., Perrin, L. P., Udovenko, A., Velichkov, V., & Wang, Q. (2019). Alzette: A 64-bit ARX-box. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/41994.

Ghatpande, S., Groszschädl, J., & Liu, Z. (2018). A Family of Lightweight Twisted Edwards Curves for the Internet of Things. In O. Blazy & C. Y. Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag. doi:10.1007/978-3-030-20074-9_14
Peer reviewed

Cheng, H., Dinu, D.-D., & Groszschädl, J. (2018). Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers. In J.-L. Lanet & C. Toma (Eds.), Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (pp. 273-287). Springer Verlag. doi:10.1007/978-3-030-12942-2_21
Peer reviewed

Franck, C., Groszschädl, J., Le Corre, Y., & Lenou Tago, C. (2018). Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers. In I. Awan, M. Younas, ... F. Portela, Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018) (pp. 231-236). Los Alamitos, United States - California: IEEE Computer Society. doi:10.1109/W-FiCloud.2018.00044
Peer reviewed

Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J. Fan & B. Gierlichs, Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (pp. 82-98). Springer. doi:10.1007/978-3-319-89641-0_5
Peer reviewed

Le Corre, Y., Groszschädl, J., & Dinu, D.-D. (2018). Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. In J. Fan & B. Gierlichs, Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (pp. 82-98). Springer Verlag. doi:10.1007/978-3-319-89641-0
Peer reviewed

Liu, Z., Choo, K.-K. R., & Groszschädl, J. (February 2018). Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography. IEEE Communications Magazine, 56 (2), 158-162. doi:10.1109/MCOM.2018.1700330
Peer Reviewed verified by ORBi

Dinu, D.-D., Groszschädl, J., & Le Corre, Y. (2017). Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares. In P. Q. Nguyen & J. Zhou, Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (pp. 39-57). Springer Verlag. doi:10.1007/978-3-319-69659-1
Peer reviewed

Liu, Z., Pöppelmann, T., Oder, T., Seo, H., Roy, S. S., Güneysu, T., Groszschädl, J., Kim, H., & Verbauwhede, I. (September 2017). High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Transactions on Embedded Computing Systems, 16 (4), 117. doi:10.1145/3092951
Peer Reviewed verified by ORBi

Franck, C., & Groszschädl, J. (2017). Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves. In S. Bouzefrane, S. Banerjee, F. Sailhan, S. Boumerdassi, ... E. Renault, Mobile, Secure, and Programmable Networking - Third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised Selected Papers (pp. 1-17). Springer Verlag. doi:10.1007/978-3-319-67807-8
Peer reviewed

Liu, Z., Groszschädl, J., Hu, Z., Järvinen, K., Wang, H., & Verbauwhede, I. (May 2017). Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things. IEEE Transactions on Computers, 66 (5), 773-785. doi:10.1109/TC.2016.2623609
Peer Reviewed verified by ORBi

Seo, H., Liu, Z., Groszschädl, J., & Kim, H. (December 2016). Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. Security and Communication Networks, 9 (18), 5401-5411. doi:10.1002/sec.1706
Peer reviewed

Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H. Cheon & T. Takagi (Eds.), Advances in Cryptology --- ASIACRYPT 2016, 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (pp. 484-513). Springer Verlag. doi:10.1007/978-3-662-53887-6_18
Peer reviewed

Galindo, D., Groszschädl, J., Liu, Z., Vadnala, P. K., & Venkatesh, S. V. (September 2016). Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, 6 (3), 229-238. doi:10.1007/s13389-016-0121-x
Peer reviewed

Liu, Z., Groszschädl, J., Li, L., & Xu, Q. (2016). Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. In J. K. Liu & R. Steinfeld (Eds.), Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (pp. 94-112). Springer Verlag. doi:10.1007/978-3-319-40253-6_6
Peer reviewed

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (July 2016). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Transactions on Information Forensics and Security, 11 (7), 1385-1397. doi:10.1109/TIFS.2015.2491261
Peer reviewed

Biryukov, A., Dinu, D.-D., & Groszschädl, J. (2016). Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In M. Manulis, A.-R. Sadeghi, ... S. Schneider (Eds.), Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (pp. 537-557). Springer Verlag. doi:10.1007/978-3-319-39555-5_29
Peer reviewed

Liu, Z., Seo, H., Roy, S. S., Groszschädl, J., Kim, H., & Verbauwhede, I. (2015). Efficient Ring-LWE Encryption on 8-bit AVR Processors. In T. Güneysu & H. Handschuh (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2015, 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (pp. 663-682). Springer Verlag. doi:10.1007/978-3-662-48324-4_33
Peer reviewed

Dinu, D.-D., Biryukov, A., Groszschädl, J., Khovratovich, D., Le Corre, Y., & Perrin, L. P. (July 2015). FELICS - Fair Evaluation of Lightweight Cryptographic Systems [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (July 2015). Triathlon of Lightweight Block Ciphers for the Internet of Things [Paper presentation]. NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, United States - Maryland.

Vadnala, P. K., & Groszschädl, J. (2015). Faster Mask Conversion with Lookup Tables. In S. Mangard & A. Y. Poschmann (Eds.), Constructive Side-Channel Analysis and Secure Design, 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers (pp. 207-221). Springer Verlag. doi:10.1007/978-3-319-21476-4_14
Peer reviewed

Liu, Z., Seo, H., Hu, Z., Huang, X., & Groszschädl, J. (2015). Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. In F. Bao, S. Miller, J. Zhou, ... G.-J. Ahn (Eds.), ASIACCS'15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore (pp. 145-153). ACM Press. doi:10.1145/2714576.2714608
Peer reviewed

Wang, J., Vadnala, P. K., Groszschädl, J., & Xu, Q. (2015). Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. In K. Nyberg (Ed.), Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (pp. 181-198). Springer Verlag. doi:10.1007/978-3-319-16715-2_10
Peer reviewed

Coron, J.-S., Groszschädl, J., Tibouchi, M., & Vadnala, P. K. (2015). Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. In G. Leander (Ed.), Fast Software Encryption, 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (pp. 130-149). Springer Verlag. doi:10.1007/978-3-662-48116-5_7
Peer reviewed

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2014). Reverse Product-Scanning Multiplication and Squaring on 8-bit AVR Processors. In L. C. K. Hui, S. Qing, E. Shi, ... S.-M. Yiu (Eds.), Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014. Proceedings (pp. 158–175). Springer Verlag. doi:10.1007/978-3-319-21966-0_12
Peer reviewed

Seo, H., Liu, Z., Groszschädl, J., Choi, J., & Kim, H. (2014). Montgomery Modular Multiplication on ARM-NEON Revisited. In J. Kim & J. Lee (Eds.), Information Security and Cryptology - ICISC 2014, 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Springer Verlag.
Peer reviewed

Coron, J.-S., Groszschädl, J., & Vadnala, P. K. (2014). Secure Conversion between Boolean and Arithmetic Masking of Any Order. In L. Batina & M. Robshaw (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2014, 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings (pp. 188-205). Springer Verlag.
Peer reviewed

Liu, Z., Wenger, E., & Groszschädl, J. (2014). MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. In I. Boureanu, P. Owezarski, ... S. Vaudenay (Eds.), Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings (pp. 361-379). Springer Verlag. doi:10.1007/978-3-319-07536-5_22
Peer reviewed

Liu, Z., & Groszschädl, J. (2014). New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. In D. Pointcheval & D. Vergnaud (Eds.), Progress in Cryptology - AFRICACRYPT 2014, 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (pp. 215-234). Springer Verlag.
Peer reviewed

Cui, S., Liu, Z., Groszschädl, J., & Xu, Q. (2014). High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. In X. Huang & J. Zhou (Eds.), Information Security Practice and Experience, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings (pp. 202-216). Springer Verlag.
Peer reviewed

Liu, Z., Seo, H., Groszschädl, J., & Kim, H. (2013). Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. In S. Qing, J. Zhou, ... D. Liu (Eds.), Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings (pp. 302-317). Springer Verlag. doi:10.1007/978-3-319-02726-5_22
Peer reviewed

Liu, Z., Groszschädl, J., & Wong, D. S. (2013). Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. In D. Lin, S. Xu, ... M. Yung (Eds.), Information Security and Cryptology - 9th International Conference, INSCRYPT 2013, Guangzhou, China, November 27-30, 2013 (pp. 217-235). Springer Verlag. doi:10.1007/978-3-319-12087-4_14
Peer reviewed

Vadnala, P. K., & Groszschädl, J. (2013). Algorithms for Switching between Boolean and Arithmetic Masking of Second Order. In B. Gierlichs, S. Guilley, ... D. Mukhopadhyay (Eds.), Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings (pp. 95-110). Springer Verlag. doi:10.1007/978-3-642-41224-0_8
Peer reviewed

Chu, D., Groszschädl, J., Liu, Z., Müller, V., & Zhang, Y. (2013). Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. In K. Chen, Q. Xie, W. Qiu, S. Xu, ... Y. Zhao (Eds.), Proceedings of the first ACM Workshop on Asia Public-Key Cryptography (ASIAPKC 2013) (pp. 39-44). ACM Press. doi:10.1145/2484389.2484398
Peer reviewed

Biryukov, A., & Groszschädl, J. (April 2012). Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. Fundamenta Informaticae, 114 (3-4), 221-237. doi:10.3233/FI-2012-626
Peer Reviewed verified by ORBi

Großschädl, J., Savas, E., & Yumbul, K. (2009). Realizing Arbitrary-Precision Modular Multiplication with a Fixed-Precision Multiplier Datapath. In V. K. Prasanna, L. Torres, ... R. Cumplido (Eds.), Proceedings of the 5th International Conference on Reconfigurable Computing and FPGAs (RECONFIG 2009) (pp. 261-266). IEEE Computer Society. doi:10.1109/ReConFig.2009.83
Peer reviewed

Contact ORBilu