default search action
Alexander Wagner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Alexander Wagner, Felix Oberhansl, Marc Schink:
Extended version - to be, or not to be stateful: post-quantum secure boot using hash-based signatures. J. Cryptogr. Eng. 14(4): 631-648 (2024) - [j8]Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein:
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 88-129 (2024) - [j7]Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl:
Impeccable Keccak Towards Fault Resilient SPHINCS+ Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 154-189 (2024) - 2023
- [c14]Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder:
Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or SPHINCS+ Signatures. PQCrypto 2023: 658-687 - [i9]Alexander Wagner, Vera Wesselkamp, Felix Oberhansl, Marc Schink, Emanuele Strieder:
Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures. IACR Cryptol. ePrint Arch. 2023: 1572 (2023) - 2022
- [j6]Elchanan Solomon, Alexander Wagner, Paul Bendich:
From geometry to topology: Inverse theorems for distributed persistence. J. Comput. Geom. 14(2): 172-196 (2022) - [c13]Alexander Wagner, Felix Oberhansl, Marc Schink:
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures. ASHES@CCS 2022: 85-94 - [c12]Elchanan Solomon, Alexander Wagner, Paul Bendich:
From Geometry to Topology: Inverse Theorems for Distributed Persistence. SoCG 2022: 61:1-61:16 - [i8]Alexander Wagner, Felix Oberhansl, Marc Schink:
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures. IACR Cryptol. ePrint Arch. 2022: 1198 (2022) - 2021
- [j5]Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 176-201 (2021) - [c11]Elchanan Solomon, Alexander Wagner, Paul Bendich:
A Fast and Robust Method for Global Topological Functional Optimization. AISTATS 2021: 109-117 - [c10]Julia Eisentraut, Stephan Holzer, Katharina Klioba, Jan Kretínský, Lukas Pin, Alexander Wagner:
Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions. ICTAC 2021: 214-234 - [i7]Elchanan Solomon, Alexander Wagner, Paul Bendich:
From Geometry to Topology: Inverse Theorems for Distributed Persistence. CoRR abs/2101.12288 (2021) - [i6]Alexander Wagner, Elchanan Solomon, Paul Bendich:
Improving Metric Dimensionality Reduction with Distributed Topology. CoRR abs/2106.07613 (2021) - [i5]Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. IACR Cryptol. ePrint Arch. 2021: 640 (2021) - 2020
- [j4]Paul Bendich, Peter Bubenik, Alexander Wagner:
Stabilizing the unstable output of persistent homology computations. J. Appl. Comput. Topol. 4(2): 309-338 (2020) - [j3]Peter Bubenik, Alexander Wagner:
Embeddings of persistence diagrams into Hilbert spaces. J. Appl. Comput. Topol. 4(3): 339-351 (2020) - [j2]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 22-72 (2020) - [c9]Irina Filozova, Tatyana Zaikina, Galina Shestakova, Roman Semenov, Martin Köhler, Alexander Wagner, Laura Baracchi:
JINR Open Access Repository based on the JOIN² Platform. DAMDID/RCDL (Supplementary Proceedings) 2020: 142-155 - [i4]Elchanan Solomon, Alexander Wagner, Paul Bendich:
A Fast and Robust Method for Global Topological Functional Optimization. CoRR abs/2009.08496 (2020)
2010 – 2019
- 2019
- [c8]Alexander Wagner, Stan Uryasev:
Portfolio Optimization with Expectile and Omega Functions. WSC 2019: 926-937 - [i3]Peter Bubenik, Alexander Wagner:
Embeddings of Persistence Diagrams into Hilbert Spaces. CoRR abs/1905.05604 (2019) - [i2]Alexander Wagner:
Nonembeddability of Persistence Diagrams with p>2 Wasserstein Metric. CoRR abs/1910.13935 (2019) - [i1]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Cryptol. ePrint Arch. 2019: 1448 (2019) - 2014
- [c7]Patrick Bartsch, Thomas Lux, Roland Gabriel, Alexander Wagner:
Plattformkonzept zur Orchestrierung komplexer Dienstleistungen im kommunalen Quartier -Prozesse, Abläufe und Standards in der ambulanten Pflege und komplementäreDienstleistungen im Rahmen eines Modellprojektes. MKWI 2014: 678-685 - 2013
- [c6]Patrick Bartsch, Thomas Lux, Alexander Wagner, Roland Gabriel:
Business Intelligence and Information Systems in Hospitals - Distribution and Usage of BI and HIS in German Hospitals. ICIMTH 2013: 191-193 - 2012
- [c5]Thomas Lux, Roland Gabriel, Alexander Wagner, Patrick Bartsch:
Supply Chain Management von Arzneimitteln und Medikalproduktenim Krankenhaus - Ziele, Vorgehensweise und erste Ergebnisse einesProjektes. MKWI 2012: 329-340 - [c4]Patrick Bartsch, Thomas Lux, Alexander Wagner, Roland Gabriel:
E-Procurement in Hospitals - An Integrated Supply Chain Management of Pharmaceutical and Medical Products by the Usage of Mobile Devices. MobiHealth 2012: 406-412 - 2011
- [c3]Thomas Lux, Roland Gabriel, Alexander Wagner:
eProcurement und Supply Chain Management im Gesundheitswesen. GI-Jahrestagung 2011: 403 - [c2]Wolfgang Beer, Alexander Wagner:
Smart books: adding context-awareness and interaction to electronic books. MoMM 2011: 218-222 - 2010
- [c1]Roland Gabriel, Alexander Wagner, Thomas Lux:
Informationssicherheit im Krankenhaus - eine prozessorientierte Analyse der Patientendaten. GI Jahrestagung (1) 2010: 241-246
2000 – 2009
- 2003
- [b1]Alexander Wagner:
Unerwünschte E-Mail-Werbung. University of Vienna, Austria, WUV-Univ.-Verlag 2003, ISBN 978-3-85114-813-8, pp. 1-214 - 2001
- [j1]Alexander Wagner, Douglas Edward Turner, Terry Anthony Byrd:
A survey of innovative technology processes in manufacturing. Ind. Manag. Data Syst. 101(5): 210-216 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint