default search action
Johann Heyszl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i14]Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 427 (2024) - 2023
- [c32]Emanuele Strieder, Manuel Ilg, Johann Heyszl, Florian Unterstein, Silvan Streit:
ASCA vs. SASCA - A Closer Look at the AES Key Schedule. COSADE 2023: 65-85 - 2021
- [j12]Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl:
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version. J. Cryptogr. Eng. 11(3): 257-272 (2021) - [j11]Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 176-201 (2021) - [c31]Bodo Selmke, Emanuele Strieder, Johann Heyszl, Sven Freud, Tobias Damm:
Breaking Black Box Crypto-Devices Using Laser Fault Injection. FPS 2021: 75-90 - [i13]Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. IACR Cryptol. ePrint Arch. 2021: 640 (2021) - 2020
- [j10]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 22-72 (2020) - [j9]Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 365-388 (2020) - [c30]Martin Striegel, Johann Heyszl, Florian Jakobsmeier, Yacov Matveev, Georg Sigl:
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage. WISEC 2020: 173-183 - [i12]Martin Striegel, Florian Jakobsmeier, Yacov Matveev, Johann Heyszl, Georg Sigl:
Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage. CoRR abs/2005.12347 (2020) - [i11]Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. IACR Cryptol. ePrint Arch. 2020: 960 (2020)
2010 – 2019
- 2019
- [c29]Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl:
SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption. ASHES@CCS 2019: 43-53 - [c28]Martin Striegel, Carsten Rolfes, Johann Heyszl, Fabian Helfert, Maximilian Hornung, Georg Sigl:
EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field. EWSN 2019: 184-193 - [i10]Martin Striegel, Carsten Rolfes, Johann Heyszl, Fabian Helfert, Maximilian Hornung, Georg Sigl:
EyeSec: A Retrofittable Augmented Reality Tool for Troubleshooting Wireless Sensor Networks in the Field. CoRR abs/1907.12364 (2019) - [i9]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Cryptol. ePrint Arch. 2019: 1448 (2019) - 2018
- [j8]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 1-17 (2018) - [c27]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved Construction. CT-RSA 2018: 413-434 - [c26]Bodo Selmke, Kilian Zinnecker, Philipp Koppermann, Katja Miller, Johann Heyszl, Georg Sigl:
Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors. FDTC 2018: 7-14 - [c25]Robert Specht, Vincent Immler, Florian Unterstein, Johann Heyszl, Georg Sigl:
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations. HOST 2018: 33-40 - [i8]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction. IACR Cryptol. ePrint Arch. 2018: 55 (2018) - [i7]Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl:
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices. IACR Cryptol. ePrint Arch. 2018: 932 (2018) - 2017
- [j7]Timo Sandmann, Andre Oliver Richter, Johann Heyszl, Enno Lübbers:
Hardware/software trade-offs for shared resources virtualization in mixed-criticality automotive multicore systems. it Inf. Technol. 59(5): 223-231 (2017) - [j6]Robert Hesselbarth, Johann Heyszl, Georg Sigl:
Fast and reliable PUF response evaluation from unsettled bistable rings. Microprocess. Microsystems 52: 325-332 (2017) - [j5]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Low-latency X25519 hardware implementation: breaking the 100 microseconds barrier. Microprocess. Microsystems 52: 491-497 (2017) - [c24]Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware. CHES 2017: 425-442 - [c23]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. COSADE 2017: 34-49 - [c22]Nisha Jacob, Carsten Rolfes, Andreas Zankl, Johann Heyszl, Georg Sigl:
Compromising FPGA SoCs using malicious hardware blocks. DATE 2017: 1122-1127 - [c21]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs. HOST 2017: 35-40 - [c20]Nisha Jacob, Jakob Wittmann, Johann Heyszl, Robert Hesselbarth, Florian Wilde, Michael Pehl, Georg Sigl, Kai Fischer:
Securing FPGA SoC configurations independent of their manufacturers. SoCC 2017: 114-119 - [c19]Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. USENIX Security Symposium 2017: 1075-1091 - [i6]Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. CoRR abs/1703.09763 (2017) - [i5]Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. IACR Cryptol. ePrint Arch. 2017: 272 (2017) - [i4]Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs through Malicious Hardware. IACR Cryptol. ePrint Arch. 2017: 625 (2017) - [i3]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. IACR Cryptol. ePrint Arch. 2017: 814 (2017) - 2016
- [c18]Andreas Zankl, Johann Heyszl, Georg Sigl:
Automated Detection of Instruction Cache Leaks in Modular Exponentiation Software. CARDIS 2016: 228-244 - [c17]Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
X25519 Hardware Implementation for Low-Latency Applications. DSD 2016: 99-106 - [c16]Andreas Zankl, Katja Miller, Johann Heyszl, Georg Sigl:
Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors. ESORICS (2) 2016: 3-19 - [c15]Bodo Selmke, Johann Heyszl, Georg Sigl:
Attack on a DFA Protected AES by Simultaneous Laser Fault Injections. FDTC 2016: 36-46 - [c14]Ralph Nyberg, Johann Heyszl, Dietmar Heinz, Georg Sigl:
Enhancing Fault Emulation of Transient Faults by Separating Combinational and Sequential Fault Propagation. ACM Great Lakes Symposium on VLSI 2016: 209-214 - [c13]Hermann Seuschek, Johann Heyszl, Fabrizio De Santis:
A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes. CS2@HiPEAC 2016: 7-12 - 2015
- [j4]Johann Heyszl, Florian Thiel:
Geldspielgeräte in Zukunft mit geprüfter Sicherheit. Datenschutz und Datensicherheit 39(4): 234-239 (2015) - [j3]Ralph Nyberg, Johann Heyszl, Dirk Rabe, Georg Sigl:
Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs. Microprocess. Microsystems 39(8): 1119-1129 (2015) - [c12]Bodo Selmke, Stefan Brummer, Johann Heyszl, Georg Sigl:
Precise Laser Fault Injections into 90 nm and 45 nm SRAM-cells. CARDIS 2015: 193-205 - [c11]Robert Specht, Johann Heyszl, Martin Kleinsteuber, Georg Sigl:
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements. COSADE 2015: 3-19 - 2014
- [j2]Nisha Jacob, Dominik Merli, Johann Heyszl, Georg Sigl:
Hardware Trojans: current challenges and approaches. IET Comput. Digit. Tech. 8(6): 264-273 (2014) - [j1]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptogr. Eng. 4(3): 157-171 (2014) - [c10]Ralph Nyberg, Jürgen Nolles, Johann Heyszl, Dirk Rabe, Georg Sigl:
Closing the Gap between Speed and Configurability of Multi-bit Fault Emulation Environments for Security and Safety-Critical Designs. DSD 2014: 114-121 - [c9]Robert Specht, Johann Heyszl, Georg Sigl:
Investigating measurement methods for high-resolution electromagnetic field side-channel analysis. ISIC 2014: 21-24 - [c8]Benedikt Heinz, Johann Heyszl, Frederic Stumpf:
Side-channel analysis of a high-throughput AES peripheral with countermeasures. ISIC 2014: 25-29 - 2013
- [b1]Johann Heyszl:
Impact of localized electromagnetic field measurements on implementations of asymmetric cryptography. Technical University Munich, 2013, pp. 1-154 - [c7]Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl:
Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations. CARDIS 2013: 79-93 - [c6]Dominik Merli, Johann Heyszl, Benedikt Heinz, Dieter Schuster, Frederic Stumpf, Georg Sigl:
Localized electromagnetic analysis of RO PUFs. HOST 2013: 19-24 - [i2]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. IACR Cryptol. ePrint Arch. 2013: 305 (2013) - [i1]Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl:
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations. IACR Cryptol. ePrint Arch. 2013: 438 (2013) - 2012
- [c5]Johann Heyszl, Dominik Merli, Benedikt Heinz, Fabrizio De Santis, Georg Sigl:
Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis. CARDIS 2012: 248-262 - [c4]Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl:
Localized Electromagnetic Analysis of Cryptographic Implementations. CT-RSA 2012: 231-244 - 2011
- [c3]Angelika Janning, Johann Heyszl, Frederic Stumpf, Georg Sigl:
A Cost-Effective FPGA-based Fault Simulation Environment. FDTC 2011: 21-31 - 2010
- [c2]Johann Heyszl, Frederic Stumpf:
Efficient One-pass Entity Authentication based on ECC for Constrained Devices. HOST 2010: 88-93 - [c1]Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl:
FPGA Implementation of an Improved Attack against the DECT Standard Cipher. ICISC 2010: 177-188
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint