We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Requirements for Electronic Delivery Systems in E-Government – An Austrian Experience
Tauber A.
Software Services for e-Business and e-Society: Proceedings of the 9th IFIP WG6.1 Conference, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, 123-133, (IFIP AICT)
Debugging Formal Specifications Using Simple Counterstrategies
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009, 9th International Conference Formal Methods in Computer Aided Design, 152-159
The Value of Information Security to European Banking Institutions
Posch R., Georg L., Frefel C., Hämmerli B., Liebenau J., Kärrberg P.
, Detecon
Side-Channel Analysis Attacks and Countermeasures - An Embedded-Software Developers View
Herbst C.
, Doctoral Thesis
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, WISA - Workshop on Information Security Applications, 1-13, (Lecture Notes in Computer Science)
Numerical solvers and cryptanalysis
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 249-263
Media-break resistant eSignatures in eGovernment – an Austrian experience
Leitold H., Posch R., Rössler T.
Emerging Challenges for Security, Privacy, and Trust , 24th IFIP TC 11 International Information Security Conference, 109-118, (IFIP Advances in Information and Communication Technologies; vol. 297)
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009, 16th International Fast Software Encryption Workshop, 260-276, (Lecture Notes in Computer Science; vol. 5665)
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 126-143, (Lecture Notes in Computer Science; vol. 5912)
MD5 is Weaker than Weak: Attacks on Concatenated Combiners
Mendel F., Rechberger C., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 144-161, (Lecture Notes in Computer Science; vol. 5912)
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Mendel F., Peyrin T., Rechberger C., Schläffer M.
Selected Areas in Cryptography. SAC 2009, International Workshop on Selected Areas in Cryptography, 16-35, (Lecture Notes in Computer Science; vol. 5867)
Collision Attack on Boole
Nad T., Mendel F., Schläffer M.
Applied Cryptography and Network Security. ACNS 2009, 7th International Conference on Applied Cryptography and Network Security, 369-381, (Lecture Notes in Computer Science; vol. 5536)
A Distinguisher for the Compression Function of SIMD-512
Nad T., Mendel F.
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, 219-232, (Lecture Notes in Computer Science; vol. 5922)
Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme
Tögl R., Hofferek G., Greimel K., Leung A., Phan R., Bloem R.
International Symposium on Trusted Computing (TrustCom 2008) Proceedings, in 9th ICYCS Conference Proceedings, International Symposium on Trusted Computing, 2289-2294
Debugging Design Errors by Using Unsatisfiable Cores
Suelflow A., Fey G., Bloem R., Drechsler R.
Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, Workshop Methoden und Beschreibungssprachen zur Modellierung und Verifikation von Schaltungen und Systemen, 159-168
Analysis of the Hash Function Design Strategy called SMASH
Lamberger M., Pramstaller N., Rechberger C., Rijmen V.
IEEE Transactions on Information Theory, Vol. 54(8), 3647-3655
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Rechberger C., Rijmen V.
Journal of Universal Computer Science , Vol. 14(3), 347-376
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Aumasson J., Fischer S., Khazaei S., Meier W., Rechberger C.
Fast Software Encryption Workshop, Springer, 470-488