dblp: Manuel Koschuch
https://dblp.org/pid/60/688.html
dblp person page RSS feedFri, 31 May 2024 01:43:33 +0200en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Manuel Koschuchhttps://dblp.org/pid/60/688.html14451Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.https://doi.org/10.5220/0012736800003705Philipp Grassl, Matthias Hudler, Manuel Koschuch: Low-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.IoTBDS2024: 329-338]]>https://dblp.org/rec/conf/iotbd/GrasslHK24Mon, 01 Jan 2024 00:00:00 +0100Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.https://doi.org/10.5220/0011087400003194Pol Hölzmer, Manuel Koschuch, Matthias Hudler: Putting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.IoTBDS2022: 258-266]]>https://dblp.org/rec/conf/iotbd/HolzmerKH22Sat, 01 Jan 2022 00:00:00 +0100Secure Key Management in Embedded Systems: A First Proposal.https://doi.org/10.5220/0010475600810091Gorazd Jank, Silvia Schmidt, Manuel Koschuch: Secure Key Management in Embedded Systems: A First Proposal.IoTBDS2021: 81-91]]>https://dblp.org/rec/conf/iotbd/JankSK21Fri, 01 Jan 2021 00:00:00 +0100Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.https://doi.org/10.1007/978-3-030-97532-6_9Lenhard Reuter, Maria Leitner, Paul Smith, Manuel Koschuch: Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.SKM2021: 151-170]]>https://dblp.org/rec/conf/skm/ReuterL0K21Fri, 01 Jan 2021 00:00:00 +0100Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework.https://doi.org/10.5220/0009337000250035Ines Kramer, Silvia Schmidt, Manuel Koschuch, Mathias Tausig: Experimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework.IoTBDS2020: 25-35]]>https://dblp.org/rec/conf/iotbd/KramerSKT20Wed, 01 Jan 2020 00:00:00 +0100Safety & Security in the Context of Autonomous Driving.https://doi.org/10.1109/ICCVE45908.2019.8965092Manuel Koschuch, Walter Sebron, Zsolt Szalay, Árpád Török, Hans Tschürtz, István Wahl: Safety & Security in the Context of Autonomous Driving.ICCVE2019: 1-7]]>https://dblp.org/rec/conf/iccve/KoschuchSSTTW19Tue, 01 Jan 2019 00:00:00 +0100Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.https://doi.org/10.5220/0007753804140421Ines Kramer, Silvia Schmidt, Mathias Tausig, Manuel Koschuch: Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.IoTBDS2019: 414-421]]>https://dblp.org/rec/conf/iotbd/KramerSTK19Tue, 01 Jan 2019 00:00:00 +0100How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.https://doi.org/10.5220/0006670300630072Silvie Schmidt, Mathias Tausig, Manuel Koschuch, Matthias Hudler, Georg Simhandl, Patrick Puddu, Zoran Stojkovic: How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.IoTBDS2018: 63-72]]>https://dblp.org/rec/conf/iotbd/SchmidtTKHSPS18Mon, 01 Jan 2018 00:00:00 +0100Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper).https://doi.org/10.5220/0006789402910298Ulrich Haböck, Manuel Koschuch, Ines Kramer, Silvie Schmidt, Mathias Tausig: Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper).IoTBDS2018: 291-298]]>https://dblp.org/rec/conf/iotbd/HabockKKST18Mon, 01 Jan 2018 00:00:00 +0100Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.https://doi.org/10.5220/0005507900130023Manuel Koschuch, Taro Fruhwirth, Alexander Glaser, Silvie Schmidt, Matthias Hudler: Speaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.DCNET2015: 13-23]]>https://dblp.org/rec/conf/icete/KoschuchFGSH15Thu, 01 Jan 2015 00:00:00 +0100What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.https://doi.org/10.1007/978-3-319-30222-5_3Stefan Prinz, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, Matthias Hudler: What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.ICETE (Selected Papers)2015: 58-78]]>https://dblp.org/rec/conf/icete/PrinzSKGFH15Thu, 01 Jan 2015 00:00:00 +0100Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.https://doi.org/10.1109/INM.2015.7140497Manuel Koschuch, Michael Hombauer, Sigrid Schefer-Wenzl, Ulrich Haböck, Stefan Hrdlicka: Fogging the cloud - Implementing and evaluating searchable encryption schemes in practice.IM2015: 1365-1368]]>https://dblp.org/rec/conf/im/KoschuchHSHH15Thu, 01 Jan 2015 00:00:00 +0100Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations.https://doi.org/10.1007/978-3-319-25915-4_2Manuel Koschuch, Ronald Wagner: Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations.ICETE (Selected Papers)2014: 26-33]]>https://dblp.org/rec/conf/icete/KoschuchW14aWed, 01 Jan 2014 00:00:00 +0100Papers, Please... - X.509 Certificate Revocation in Practice.https://doi.org/10.5220/0005113800360040Manuel Koschuch, Ronald Wagner: Papers, Please... - X.509 Certificate Revocation in Practice.DCNET2014: 36-40]]>https://dblp.org/rec/conf/icete/KoschuchW14Wed, 01 Jan 2014 00:00:00 +0100Token-based Authentication for Smartphones.https://ieeexplore.ieee.org/document/7220057/Manuel Koschuch, Matthias Hudler, Hubert Eigner, Zsolt Saffer: Token-based Authentication for Smartphones.DCNET/ICE-B/OPTICS2013: 51-56]]>https://dblp.org/rec/conf/icete/KoschuchHES13Tue, 01 Jan 2013 00:00:00 +0100Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.https://ieeexplore.ieee.org/document/7220059/Manuel Koschuch, Matthias Hudler, Zsolt Saffer: Towards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.DCNET/ICE-B/OPTICS2013: 64-68]]>https://dblp.org/rec/conf/icete/KoschuchHS13Tue, 01 Jan 2013 00:00:00 +0100Hash Algorithms for 8051-based Sensornodes.https://dblp.org/pid/60/688.htmlManuel Koschuch, Matthias Hudler, Michael Krüger: Hash Algorithms for 8051-based Sensornodes.DCNET/ICE-B/OPTICS2012: 65-68]]>https://dblp.org/rec/conf/icete/KoschuchHK12Sun, 01 Jan 2012 00:00:00 +0100Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.https://doi.org/10.1007/978-3-642-35755-8_6Manuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory, Jürgen Wenzl: Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.ICETE (Selected Papers)2011: 74-81]]>https://dblp.org/rec/conf/icete/KoschuchHKLW11aSat, 01 Jan 2011 00:00:00 +0100Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.https://dblp.org/pid/60/688.htmlManuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory, Jürgen Wenzl: Optimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.DCNET/OPTICS2011: 75-78]]>https://dblp.org/rec/conf/icete/KoschuchHKLW11Sat, 01 Jan 2011 00:00:00 +0100Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.https://dblp.org/pid/60/688.htmlManuel Koschuch, Matthias Hudler, Michael Krüger: Performance Evaluation of the TLS Handshake in the Context of Embedded Devices.DCNET/OPTICS2010: 35-44]]>https://dblp.org/rec/conf/icete/KoschuchHK10Fri, 01 Jan 2010 00:00:00 +0100The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.https://doi.org/10.1007/978-3-642-25206-8_4Manuel Koschuch, Matthias Hudler, Michael Krüger: The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.ICETE (Selected Papers)2010: 71-83]]>https://dblp.org/rec/conf/icete/KoschuchHK10aFri, 01 Jan 2010 00:00:00 +0100Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.https://dblp.org/pid/60/688.htmlManuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory, Jürgen Wenzl: Applicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.DCNET/OPTICS2010: 125-128]]>https://dblp.org/rec/conf/icete/KoschuchHKLW10Fri, 01 Jan 2010 00:00:00 +0100Smart Elliptic Curve Cryptography for Smart Dust.https://doi.org/10.1007/978-3-642-29222-4_44Johann Großschädl, Matthias Hudler, Manuel Koschuch, Michael Krüger, Alexander Szekely: Smart Elliptic Curve Cryptography for Smart Dust.QSHINE2010: 623-634]]>https://dblp.org/rec/conf/qshine/GrossschadlHKKS10Fri, 01 Jan 2010 00:00:00 +0100Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.https://doi.org/10.1007/978-3-642-11145-7_7Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger: Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.ICICS2009: 63-79]]>https://dblp.org/rec/conf/icics/KoschuchGPGHK09Thu, 01 Jan 2009 00:00:00 +0100Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.https://doi.org/10.1007/978-3-642-03944-7_9Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich: Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.WISTP2009: 112-127]]>https://dblp.org/rec/conf/wistp/LedererMKGST09Thu, 01 Jan 2009 00:00:00 +0100Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.https://doi.org/10.1007/978-3-540-89641-8_25Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger: Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.CANS2008: 349-365]]>https://dblp.org/rec/conf/cans/KoschuchGPHK08Tue, 01 Jan 2008 00:00:00 +0100Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.https://doi.org/10.1007/11894063_34Manuel Koschuch, Joachim Lechner, Andreas Weitzer, Johann Großschädl, Alexander Szekely, Stefan Tillich, Johannes Wolkerstorfer: Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.CHES2006: 430-444]]>https://dblp.org/rec/conf/ches/KoschuchLWGSTW06Sun, 01 Jan 2006 00:00:00 +0100