We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Security Layer on Small Devices
Tauber A.
, Master's Thesis
Formal verification of control software: A case study
Griesmayer A., Bloem R., Hautzendorfer M., Wotawa F.
Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 783-788, (Lecture Notes in Computer Science ; vol. 3533)
Exploiting Coding Theory for Collision Attacks on SHA-1
Pramstaller N., Rechberger C., Rijmen V.
Cryptography and Coding. Cryptography and Coding 2005, 10th IMA International Conference Cryptography and Coding, 78-95, (Lecture Notes in Computer Science; vol. 3796)
SCARD D1.2 Requirement Specification Report
Aigner M., Mangard S., Popp T.
A Masked AES ASIC Implementation
Pramstaller N., Oswald M., Mangard S., Gürkaynak F., Häne S.
Proceedings of Austrochip 2004, Austrochip 2004, 77-81
Hardware Countermeasures Against DPA – A Statistical Analysis of Their Effectiveness
Mangard S.
Topics in Cryptology - CT-RSA 2004, Cryptographers´ Track at the RSA Conference, 222-235, (Lecture Notes in Computer Science)
The Austrian Citizen Card: A Bottom-Up View
Leitold H., Posch K.
Security and Privacy in Advanced Networking Technologies, IOS Press, 231-236
Technische Aspekte des E-Voting
Leitold H.
Journal für Rechtspolitik, Vol. 12(2), 77-84
What to Expect from Biometrics
Leitold H., Posch R.
Proceedings of BSI Biometrieworkshop, BSI Biometrieworkshop
Identification in cross-border e-Government
Leitold H., Posch R., Roessler T.
European Conference on E-Government, European Conference on E-Government, 481-491
Security of IEEE 802.11 considering Power and EM Side-Channel Information
Rechberger C., Oswald M.
International Conference on Computing, Communications and Control Technologies (CCCT 2004), 129-133
Stream Ciphers and Side-Channel Analysis
Rechberger C., Oswald M.
SASC - The State of the Art of Stream Ciphers, 320-326
Practical Template Attacks
Rechberger C., Oswald M.
Information Security Applications, WISA - Workshop on Information Security Applications, 440-456, (Lecture Notes in Computer Science)
A Highly Regular and Scalable AES Hardware Architecture
Mangard S., Aigner M., Dominikus S.
IEEE Transactions on Computers, Vol. 52(4), 483-491
Exploiting Radiated Emissions - EM Attacks on Cryptographic ICs
Mangard S.
Proceedings of Austrochip 2003, Austrochip 2003, 13-16
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
Mangard S.
Information Security and Cryptology - ICISC 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002. Revised Papers, International Conference on Information Security and Cryptology, 343-358, (Lecture Notes in Computer Science)
Recent trends in computer-aided verification
Bloem R.
CoLogNET Newsletter, Vol. 5, 1-2
Austrian e-Government and Citizen Card Initiatives
Leitold H., Posch R.
Proceedings of the 2nd NATO scientific conference on Security and Protection of Information, 7-14
Verification and Fault Localization for VHDL Programs
Bloem R., Wotawa F.
Telematik, Vol. 8(2), 30-33