Manuel Koschuchhttps://orcid.org/0000-0001-8090-3784Philipp GrasslMatthias HudlerManuel KoschuchLow-Performance Embedded Internet of Things Devices and the Need for Hardware-Accelerated Post-Quantum Cryptography.329-3382024IoTBDShttps://doi.org/10.5220/0012736800003705conf/iotbd/2024db/conf/iotbd/iotbd2024.html#GrasslHK24Pol HölzmerManuel KoschuchMatthias HudlerPutting Chaos into Perspective: Evaluation of Statistical Test Suite Implementations on Isolated Sequences of Arbitrary Length.258-2662022IoTBDShttps://doi.org/10.5220/0011087400003194conf/iotbd/2022db/conf/iotbd/iotbd2022.html#HolzmerKH22Gorazd JankSilvia SchmidtManuel KoschuchSecure Key Management in Embedded Systems: A First Proposal.81-912021IoTBDShttps://doi.org/10.5220/0010475600810091conf/iotbd/2021db/conf/iotbd/iotbd2021.html#JankSK21Lenhard ReuterMaria LeitnerPaul Smith 0001Manuel KoschuchDealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems.151-1702021SKMhttps://doi.org/10.1007/978-3-030-97532-6_9conf/skm/2021db/conf/skm/skm2021.html#ReuterL0K21Ines KramerSilvia SchmidtManuel KoschuchMathias TausigExperimental Evaluation of Forward Secure Dynamic Symmetric Searchable Encryption using the Searchitect Framework.25-352020IoTBDShttps://doi.org/10.5220/0009337000250035conf/iotbd/2020db/conf/iotbd/iotbd2020.html#KramerSKT20Manuel KoschuchWalter SebronZsolt SzalayÁrpád TörökHans TschürtzIstván WahlSafety & Security in the Context of Autonomous Driving.1-72019ICCVEhttps://doi.org/10.1109/ICCVE45908.2019.8965092conf/iccve/2019db/conf/iccve/iccve2019.html#KoschuchSSTTW19Ines KramerSilvia SchmidtMathias TausigManuel KoschuchSearch, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.414-4212019IoTBDShttps://doi.org/10.5220/0007753804140421conf/iotbd/2019db/conf/iotbd/iotbd2019.html#KramerSTK19Silvie SchmidtMathias TausigManuel KoschuchMatthias HudlerGeorg SimhandlPatrick PudduZoran StojkovicHow Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.63-722018IoTBDShttps://doi.org/10.5220/0006670300630072conf/iotbd/2018db/conf/iotbd/iotbd2018.html#SchmidtTKHSPS18Ulrich HaböckManuel KoschuchInes KramerSilvie SchmidtMathias TausigSearchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper).291-2982018IoTBDShttps://doi.org/10.5220/0006789402910298conf/iotbd/2018db/conf/iotbd/iotbd2018.html#HabockKKST18Manuel KoschuchTaro FruhwirthAlexander GlaserSilvie SchmidtMatthias HudlerSpeaking in Tongues - Practical Evaluation of TLS Cipher Suites Compatibility.13-232015DCNEThttps://doi.org/10.5220/0005507900130023conf/icete/2015ddb/conf/icete/dcnet2015.html#KoschuchFGSH15Stefan PrinzSilvie SchmidtManuel KoschuchAlexander GlaserTaro FruhwirthMatthias HudlerWhat a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility.58-782015ICETE (Selected Papers)https://doi.org/10.1007/978-3-319-30222-5_3conf/icete/2015sdb/conf/icete/icete2015.html#PrinzSKGFH15Manuel KoschuchMichael HombauerSigrid Schefer-WenzlUlrich HaböckStefan HrdlickaFogging the cloud - Implementing and evaluating searchable encryption schemes in practice.1365-13682015IMhttps://doi.org/10.1109/INM.2015.7140497conf/im/2015db/conf/im/im2015.html#KoschuchHSHH15Manuel KoschuchRonald WagnerTrust Revoked - Practical Evaluation of OCSP- and CRL-Checking Implementations.26-332014ICETE (Selected Papers)https://doi.org/10.1007/978-3-319-25915-4_2conf/icete/2014sdb/conf/icete/icete2014.html#KoschuchW14aManuel KoschuchRonald WagnerPapers, Please... - X.509 Certificate Revocation in Practice.36-402014DCNEThttps://doi.org/10.5220/0005113800360040https://ieeexplore.ieee.org/document/7509767/conf/icete/2014ddb/conf/icete/dcnet2014.html#KoschuchW14Manuel KoschuchMatthias HudlerHubert EignerZsolt SafferToken-based Authentication for Smartphones.51-562013DCNET/ICE-B/OPTICSconf/icete/2013ddb/conf/icete/dcnet2013.html#KoschuchHES13https://ieeexplore.ieee.org/document/7220057/Manuel KoschuchMatthias HudlerZsolt SafferTowards Algorithm Agility for Wireless Sensor Networks - Comparison of the Portability of Selected Hash Functions.64-682013DCNET/ICE-B/OPTICSconf/icete/2013ddb/conf/icete/dcnet2013.html#KoschuchHS13https://ieeexplore.ieee.org/document/7220059/Manuel KoschuchMatthias HudlerMichael KrügerHash Algorithms for 8051-based Sensornodes.65-682012DCNET/ICE-B/OPTICSconf/icete/2012ddb/conf/icete/dcnet2012.html#KoschuchHK12Manuel KoschuchMatthias HudlerMichael KrügerPeter LoryJürgen WenzlShared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography.74-812011ICETE (Selected Papers)https://doi.org/10.1007/978-3-642-35755-8_6conf/icete/2011sdb/conf/icete/icete2011.html#KoschuchHKLW11aManuel KoschuchMatthias HudlerMichael KrügerPeter LoryJürgen WenzlOptimizing Cryptographic Threshold Schemes for the Use in Wireless Sensor Networks - Position Paper.75-782011DCNET/OPTICSconf/icete/2011ddb/conf/icete/dcnet2011.html#KoschuchHKLW11Manuel KoschuchMatthias HudlerMichael KrügerPerformance Evaluation of the TLS Handshake in the Context of Embedded Devices.35-442010DCNET/OPTICSconf/icete/2010ddb/conf/icete/dcnet2010.html#KoschuchHK10Manuel KoschuchMatthias HudlerMichael KrügerThe Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA.71-832010ICETE (Selected Papers)https://doi.org/10.1007/978-3-642-25206-8_4conf/icete/2010sdb/conf/icete/icete2010.html#KoschuchHK10aManuel KoschuchMatthias HudlerMichael KrügerPeter LoryJürgen WenzlApplicability of Multiparty Computation Schemes for Wireless Sensor Networks - Position Paper.125-1282010DCNET/OPTICSconf/icete/2010ddb/conf/icete/dcnet2010.html#KoschuchHKLW10Johann GroßschädlMatthias HudlerManuel KoschuchMichael KrügerAlexander SzekelySmart Elliptic Curve Cryptography for Smart Dust.623-6342010QSHINEhttps://doi.org/10.1007/978-3-642-29222-4_44http://eudl.eu/doi/10.1007/978-3-642-29222-4_44conf/qshine/2010db/conf/qshine/qshine2010.html#GrossschadlHKKS10Manuel KoschuchJohann GroßschädlDan PagePhilipp GrabherMatthias HudlerMichael KrügerHardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems.63-792009ICICShttps://doi.org/10.1007/978-3-642-11145-7_7conf/icics/2009db/conf/icics/icics2009.html#KoschuchGPGHK09Christian LedererRoland MaderManuel KoschuchJohann GroßschädlAlexander SzekelyStefan TillichEnergy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.112-1272009WISTPhttps://doi.org/10.1007/978-3-642-03944-7_9conf/wistp/2009db/conf/wistp/wistp2009.html#LedererMKGST09Manuel KoschuchJohann GroßschädlUdo PayerMatthias HudlerMichael KrügerWorkload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.349-3652008CANShttps://doi.org/10.1007/978-3-540-89641-8_25conf/cans/2008db/conf/cans/cans2008.html#KoschuchGPHK08Manuel KoschuchJoachim LechnerAndreas WeitzerJohann GroßschädlAlexander SzekelyStefan TillichJohannes WolkerstorferHardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller.430-4442006conf/ches/2006CHEShttps://doi.org/10.1007/11894063_34db/conf/ches/ches2006.html#KoschuchLWGSTW06Hubert EignerTaro FruhwirthAlexander GlaserPhilipp GrabherPhilipp GrasslJohann GroßschädlUlrich HaböckPol HölzmerMichael HombauerStefan HrdlickaMatthias HudlerGorazd JankInes KramerMichael KrügerJoachim LechnerChristian LedererMaria LeitnerPeter LoryRoland MaderDan PageUdo PayerStefan PrinzPatrick PudduLenhard ReuterZsolt SafferSigrid Schefer-WenzlSilvia SchmidtSilvie SchmidtWalter SebronGeorg SimhandlPaul Smith 0001Zoran StojkovicZsolt SzalayAlexander SzekelyMathias TausigStefan TillichÁrpád TörökHans TschürtzRonald WagnerIstván WahlAndreas WeitzerJürgen WenzlJohannes Wolkerstorfer