default search action
Erich Wenger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. J. Cryptol. 33(4): 1442-1460 (2020)
2010 – 2019
- 2018
- [j3]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. J. Cryptol. 31(4): 1164-1182 (2018) - 2017
- [j2]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Ascon hardware implementations and side-channel evaluation. Microprocess. Microsystems 52: 470-479 (2017) - 2016
- [j1]Erich Wenger, Paul Wolfger:
Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs. J. Cryptogr. Eng. 6(4): 287-297 (2016) - 2015
- [c19]Mario Werner, Erich Wenger, Stefan Mangard:
Protecting the Control Flow of Embedded Processors against Fault Attacks. CARDIS 2015: 161-176 - [c18]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! - Made-to-Measure Hardware Implementations of ASCON. DSD 2015: 645-652 - [i4]Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:
Suit up! Made-to-Measure Hardware Implementations of Ascon. IACR Cryptol. ePrint Arch. 2015: 34 (2015) - [i3]Erich Wenger, Paul Wolfger:
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. IACR Cryptol. ePrint Arch. 2015: 143 (2015) - 2014
- [c17]Thomas Unterluggauer, Erich Wenger:
Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices. ARES 2014: 69-77 - [c16]Zhe Liu, Erich Wenger, Johann Großschädl:
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. ACNS 2014: 361-379 - [c15]Thomas Unterluggauer, Erich Wenger:
Efficient Pairings and ECC for Embedded Systems. CHES 2014: 298-315 - [c14]Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter:
PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag. RFIDSec 2014: 54-73 - [c13]Erich Wenger, Paul Wolfger:
Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster. Selected Areas in Cryptography 2014: 363-379 - [i2]Erich Wenger, Paul Wolfger:
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster. IACR Cryptol. ePrint Arch. 2014: 368 (2014) - [i1]Thomas Unterluggauer, Erich Wenger:
Efficient Pairings and ECC for Embedded Systems. IACR Cryptol. ePrint Arch. 2014: 800 (2014) - 2013
- [c12]Erich Wenger:
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. ACNS 2013: 290-306 - [c11]Erich Wenger, Thomas Unterluggauer, Mario Werner:
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors. INDOCRYPT 2013: 244-261 - [c10]Erich Wenger:
A Lightweight ATmega-Based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography. LightSec 2013: 1-15 - [c9]Erich Wenger, Thomas Korak, Mario Kirschbaum:
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. RFIDSec 2013: 128-144 - 2012
- [c8]Erich Wenger, Thomas Baier, Johannes Feichtner:
JAAVR: Introducing the Next Generation of Security-Enabled RFID Tags. DSD 2012: 640-647 - [c7]Erich Wenger, Johann Großschädl:
An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things. MICRO Workshops 2012: 39-46 - 2011
- [c6]Erich Wenger, Mario Werner:
Evaluating 16-Bit Processors for Elliptic Curve Cryptography. CARDIS 2011: 166-181 - [c5]Erich Wenger, Michael Hutter:
A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs. CARDIS 2011: 182-198 - [c4]Michael Hutter, Erich Wenger:
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. CHES 2011: 459-474 - [c3]Erich Wenger, Michael Hutter:
Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. NordSec 2011: 256-271 - 2010
- [c2]Martin Feldhofer, Manfred Josef Aigner, Thomas Baier, Michael Hutter, Thomas Plos, Erich Wenger:
Semi-passive RFID development platform for implementing and attacking security tags. ICITST 2010: 1-6 - [c1]Erich Wenger, Martin Feldhofer, Norbert Felber:
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. WISA 2010: 92-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint