Johann Heyszl

Orcid: 0000-0002-8425-3114

According to our database1, Johann Heyszl authored at least 46 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ASCA vs. SASCA - A Closer Look at the AES Key Schedule.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2021
Security and Trust in Open Source Security Tokens.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version.
J. Cryptogr. Eng., 2021

Breaking Black Box Crypto-Devices Using Laser Fault Injection.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Secure and user-friendly over-the-air firmware distribution in a portable faraday cage.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption.
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2019

2018
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction.
IACR Cryptol. ePrint Arch., 2018

18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices.
IACR Cryptol. ePrint Arch., 2018

Dividing the threshold: Multi-probe localized EM analysis on threshold implementations.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

2017
Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier.
Microprocess. Microsystems, 2017

Fast and reliable PUF response evaluation from unsettled bistable rings.
Microprocess. Microsystems, 2017

Hardware/software trade-offs for shared resources virtualization in mixed-criticality automotive multicore systems.
it Inf. Technol., 2017

Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA.
IACR Cryptol. ePrint Arch., 2017

How to Break Secure Boot on FPGA SoCs through Malicious Hardware.
IACR Cryptol. ePrint Arch., 2017

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
Proceedings of the 26th USENIX Security Symposium, 2017

Securing FPGA SoC configurations independent of their manufacturers.
Proceedings of the 30th IEEE International System-on-Chip Conference, 2017

Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Compromising FPGA SoCs using malicious hardware blocks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

2016
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

Enhancing Fault Emulation of Transient Faults by Separating Combinational and Sequential Fault Propagation.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

Attack on a DFA Protected AES by Simultaneous Laser Fault Injections.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors.
Proceedings of the Computer Security - ESORICS 2016, 2016

X25519 Hardware Implementation for Low-Latency Applications.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs.
Microprocess. Microsystems, 2015

Geldspielgeräte in Zukunft mit geprüfter Sicherheit.
Datenschutz und Datensicherheit, 2015

Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Precise Laser Fault Injections into 90 nm and 45 nm SRAM-cells.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

Hardware Trojans: current challenges and approaches.
IET Comput. Digit. Tech., 2014

Investigating measurement methods for high-resolution electromagnetic field side-channel analysis.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Side-channel analysis of a high-throughput AES peripheral with countermeasures.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Closing the Gap between Speed and Configurability of Multi-bit Fault Emulation Environments for Security and Safety-Critical Designs.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

2013
Impact of localized electromagnetic field measurements on implementations of asymmetric cryptography.
PhD thesis, 2013

Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations.
IACR Cryptol. ePrint Arch., 2013

Localized electromagnetic analysis of RO PUFs.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

2012
Localized Electromagnetic Analysis of Cryptographic Implementations.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
A Cost-Effective FPGA-based Fault Simulation Environment.
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011

2010
FPGA Implementation of an Improved Attack against the DECT Standard Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Efficient One-pass Entity Authentication based on ECC for Constrained Devices.
Proceedings of the HOST 2010, 2010


  Loading...