We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
MoCrySIL - Carry Your Cryptographic Keys in Your Pocket
Reimair F., Teufl P., Kollmann C., Thaller C.
12th International Conference on Security and Cryptography
Analysis of SHA-512/224 and SHA-512/256
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Higher-Order Cryptanalysis of LowMC
Dobraunig C., Eichlseder M., Mendel F.
Information Security and Cryptology - ICISC 2015
Java Privacy Guard - The OpenPGP Message Format and an Implementation in Java
More S.
Bachelor's Thesis, 2015
Cooperative Reactive Synthesis
Bloem R., Ehlers R., Könighofer R.
Automated Technology for Verification and Analysis (ATVA'15)
Synthesizing cooperative reactive mission plans
Ehlers R., Könighofer R., Bloem R.
2015 IEEE/RSJ International Conference on Intelligent Robots and Systems
Assume-Guarantee Synthesis for Concurrent Reactive Programs with Partial Information
Bloem R., Chatterjee K., Jacobs S., Könighofer R.
Tools and Algorithms for the Construction and Analysis of Systems (TACAS) - 21st International Conference
Future Directions in Mobile Government
Zefferer T.
IADIS International Journal on WWW/Internet, Vol. 13(2), 2015
Encryption-based Second Authentication Factor Solutions for Qualified Server-side Signature Creation
Rath C., Roth S., Bratko H., Zefferer T.
Electronic Government and the Information Systems Perspective. EGOVIS 2015
POWER: A Cloud-based Mobile Augmentation Approach for Web- and Cross-Platform Applications
Reiter A., Zefferer T.
2015 IEEE 4th International Conference on Cloud Networking (CloudNet)
Paving the Way for Security in Cloud-Based Mobile Augmentation Systems
Reiter A., Zefferer T.
3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015)
Secure single sign-on authentication using eIDs across public clouds
Zwattendorfer B., Tauber A.
International Journal of Internet Technology and Secured Transactions, Vol. 5(4), 2015
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Dobraunig C., Eichlseder M., Mendel F.
Advances in Cryptology - ASIACRYPT 2015
Forgery Attacks on round-reduced ICEPOLE-128
Dobraunig C., Eichlseder M., Mendel F.
Selected Areas in Cryptography- SAC 2015
Cryptanalysis of Ascon
Dobraunig C., Eichlseder M., Mendel F., Schläffer M.
Topics in Cryptology - CT-RSA 2015
Related-Key Forgeries for Proest-OTR
Dobraunig C., Eichlseder M., Mendel F.
Fast Software Encryption - FSE 2015
On the Security of Fresh Re-Keying to Counteract Side-Channel and Fault Attacks
Dobraunig C., Eichlseder M., Mangard S., Mendel F.
Smart Card Research and Advanced Applications - CARDIS 2014
Do you think your passwords are secure?
Ziegler D., Stromberger C., Rauter M., Teufl P., Hein D.
International Conference on Privacy & Security in Mobile Systems
Android - On-Device Detection of SMS Catchers and Sniffers
Teufl P., Zefferer T., Wörgötter C., Oprisnik A., Hein D.
International Conference on Privacy & Security in Mobile Systems
Android Encryption Systems
Teufl P., Fitzek A., Hein D., Marsalek A., Oprisnik A., Zefferer T.
International Conference on Privacy & Security in Mobile Systems
