Manuel Koschuch
Manuel Koschuch
FH Campus Wien
Verified email at
Cited by
Cited by
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
C Lederer, R Mader, M Koschuch, J Großschädl, A Szekely, S Tillich
Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009
Hardware/software co-design of elliptic curve cryptography on an 8051 microcontroller
M Koschuch, J Lechner, A Weitzer, J Großschädl, A Szekely, S Tillich, ...
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
Safety & security in the context of autonomous driving
M Koschuch, W Sebron, Z Szalay, Á Török, H Tschiürtz, I Wahl
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE), 1-7, 2019
Smart elliptic curve cryptography for smart dust
J Großschädl, M Hudler, M Koschuch, M Krüger, A Szekely
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th …, 2012
Token-based authentication for smartphones
M Koschuch, M Hudler, H Eigner, Z Saffer
2013 International Conference on Data Communication Networking (DCNET), 1-6, 2013
Performance evaluation of the TLS handshake in the context of embedded devices
M Koschuch, M Hudler, M Krüger
2010 International Conference on Data Communication Networking (DCNET), 1-10, 2010
Applied crypto hardening
W Breyha, D Durvaux, T Dussa, LA Kaplan, F Mendel, C Mock, ...
Workload characterization of a lightweight SSL implementation resistant to side-channel attacks
M Koschuch, J Großschädl, U Payer, M Hudler, M Krüger
Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008
Hardware/software co-design of public-key cryptography for ssl protocol execution in embedded systems
M Koschuch, J Großschädl, D Page, P Grabher, M Hudler, M Krüger
Information and Communications Security: 11th International Conference …, 2009
How Little is Enough? Implementation and Evaluation of a Lightweight Secure Firmware Update Process for the Internet of Things.
S Schmidt, M Tausig, M Koschuch, M Hudler, G Simhandl, P Puddu, ...
IoTBDS, 63-72, 2018
Fogging the cloud—Implementing and evaluating searchable encryption schemes in practice
M Koschuch, M Hombauer, S Schefer-Wenzl, U Haböck, S Hrdlicka
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA
M Koschuch, M Hudler, M Krüger
e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012
Optimizing cryptographic threshold schemes for the use in wireless sensor networks: Position paper
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
Proceedings of the International Conference on, 1-4, 2011
Applicability of multiparty computation schemes for wireless sensor networks
M Koschuch, M Hudler, M Krüger, P Lory, J Wenzl
2010 International Conference on Data Communication Networking (DCNET), 1-4, 2010
Searchitect-A Developer Framework for Hybrid Searchable Encryption (Position Paper).
U Haböck, M Koschuch, I Kramer, S Schmidt, M Tausig
IoTBDS, 291-298, 2018
Trust revoked—practical evaluation of ocsp-and crl-checking implementations
M Koschuch, R Wagner
E-Business and Telecommunications: 11th International Joint Conference …, 2015
Secure Key Management in Embedded Systems: A First Proposal.
G Jank, S Schmidt, M Koschuch
IoTBDS, 81-91, 2021
Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.
I Kramer, S Schmidt, M Tausig, M Koschuch
IoTBDS, 414-421, 2019
Speaking in tongues practical evaluation of TLS cipher suites compatibility
M Koschuch, T Fruhwirth, A Glaser, S Schmidt, M Hudler
2015 12th International Joint Conference on e-Business and …, 2015
Papers, Please…: X. 509 certificate revocation in practice
M Koschuch, R Wagner
2014 5th International Conference on Data Communication Networking (DCNET), 1-5, 2014
The system can't perform the operation now. Try again later.
Articles 1–20