We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cross-border Certified Electronic Mailing: A Scalable Interoperability Framework for Certified Mail Systems
Tauber A.
, Doctoral Thesis
SPOCS: Interoperable eGovernment Services in the Context of the Services Directive
Tauber A., Stranacher K., Medimorec D.
European Journal of ePractice, Vol. 14, 90-106
Cross-Border Legal Identity Management
Zwattendorfer B., Tauber A., Stranacher K., Reichstädter P.
Electronic Government 11th IFIP WG 8.5 International Conference, EGOV 2012, EGOV - IFIP e-Government Conference, 149-161
Secure Cloud Authentication using eIDs
Zwattendorfer B., Tauber A.
Proceedings of IEEE CCIS2012, IEEE International Conference on Cloud Computing and Intelligence Systems, 515-519
Secure Cross-Cloud Single Sign-On (SSO) using eIDs
Zwattendorfer B., Tauber A.
ICITST-2012 Proceedings, International Conference for Internet Technology and Secured Transactions, 150-155
Bürgerkarten-Authentifizierung zur Public Cloud
Zwattendorfer B., Stranacher K., Tauber A.
D-A-CH Security 2012, Arbeitskonferenz D-A-CH Security 2012, 136-147
The Public Cloud for E-Government
Zwattendorfer B., Tauber A.
IADIS International Conferences Web Based Communities and Social Media and Collaborative Technologies 2012, IADIS International Conference Collaborative Technologies 2012, 129-136
Tools in the Cryptanalysis of Symmetric Primitives
Nad T.
, Doctoral Thesis
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Eisenbarth T., Gong Z., Güneysu T., Heyse S., Indesteege S., Kerckhof S., Koeune F., Nad T., Plos T., Reggazoni F., Standaert F., van Oldeneel tot Oldenzeel L.
Progress in Cryptology – AFRICACRYPT 2012 Fifth International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings, 5th International Conference on Cryptology in Africa, 172-187, (Lecture Notes in Computer Science)
Generalized Reactivity(1) Synthesis without a Monolithic Strategy
Schlaipfer M., Hofferek G., Bloem R.
Hardware and Software: Verification and Testing, 7th International Haifa Verification Conference, 20-34, (Lecture Notes in Computer Science; vol. 7261)
FoREnSiC - An Automatic Debugging Environment for C Programs
Bloem R., Drechsler R., Fey G., Finder A., Hofferek G., Könighofer R., Raik J., Repinski U., Sülflow A.
Haifa Verification Conference, Haifa Verification Conference, 260-265, (Lecture Notes in Computer Science; vol. 7857)
Repair with On-The-Fly Program Analysis
Könighofer R., Bloem R.
Hardware and Software: Verification and Testing, Haifa Verification Conference, 56-71, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7857 LNCS)
Approaching the Challenge of eID Interoperability: An Austrian Perspective
Tauber A., Zefferer T., Zwattendorfer B.
European Journal of ePractice, Vol. 2012(14), 22-39
Qualified PDF signatures on mobile phones
Zefferer T., Tauber A., Zwattendorfer B., Stranacher K.
Electronic Government and Electronic Participation - Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and IFIP ePart 2012, EGOV - IFIP e-Government Conference, 115-123, (Informatik)
An Interoperability Standard for Certified Mail Systems
Tauber A., Apitzsch J., Boldrin L.
Computer Standards & Interfaces, Vol. 34(5), 452-466
Differential Attacks on Reduced RIPEMD-160
Mendel F., Nad T., Scherz S., Schläffer M.
Information Security, 15th International Conference Information Security , 23-38, (Lecture Notes in Computer Science; vol. 7483)
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Mendel F., Nad T., Schläffer M.
Fast Software Encryption, 19th Fast Software Encryption Workshop, 226-243, (Lecture Notes in Computer Science; vol. 7549)
Specification-centered robustness
Bloem R., Chatterjee K., Greimel K., Henzinger T., Jobstmann B.
2011 6th International Symposium on Industrial Embedded Systems, IEEE International Symposium on Industrial Embedded Systems, 176-185
One for all - all for one: unifying standard differential power analysis attacks
Mangard S., Elisabeth O., Standaert F.
IET Information Security, 100-110
Arithmetic Logic Units with High Error Detection Rates to Counteract Fault Attacks
Medwed M., Mangard S.
Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition