Volker Wittelsberger

Learn More
It is widely recognized that data security will play a central role in future IT systems. Providing public-key cryptographic primitives, which are the core tools for security, is often difficult on embedded processor due to computational, memory, and power constraints. This contribution appears to be the first thorough comparison of two public-key families,(More)
In the recent years, communication with embedded computers has become omnipresent. Mobile phones and personal digital assistants (PDAs) are a part of our business and personnel everyday life. Protecting contents with cryptographic primitives is inevitable and demands for highly efficient cryptographic applications in the sense of time and power consumption.(More)
  • 1