We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Cryptanalysis of Hash Functions
Rechberger C.
, Doctoral Thesis
Cryptanalysis of Twister
Mendel F., Rechberger C., Schläffer M.
Applied Cryptography and Network Security, 7th International Conference on Applied Cryptography and Network Security, 342-353, (Lecture Notes in Computer Science; vol. 5536)
Automated Analysis of e-participation Data by utilizing Associative Networks, Spreading Activation and Unsupervised Learning
Teufl P., Payer U., Parycek P.
Electronic Participation, 1st International Conference on eParticipation , 139-150, (Lecture Notes in Computer Science; vol. 5694)
Cryptanalysis of Vortex
Aumasson J., Dunkelman O., Mendel F., Rechberger C., Thomsen S.
Lecture Notes in Computer Science, 2nd International Conference on Cryptology in Africa, 14-28, (LNCS)
Wie lange halten die SHA-2 Hashfunktionen kryptanalytischen Angriffen noch stand?
Rechberger C.
Tagungsband 11. Deutscher IT-Sicherheitskongress, Deutscher IT-Sicherheitskongress
Cryptanalysis of MDC-2
Knudsen L., Mendel F., Rechberger C., Thomsen S.
Advances in Cryptology - EUROCRYPT 2009, Eurocrypt - International Conference on the Theory and Applications of Cryptographic Techniques, 106-120, (LNCS)
Elektronische Vollmachten im österreichischen E-Government
Tauber A., Rössler T.
eGovernment Review, Vol. 4, 22-23
Ausländische Identitäten im österreichischen E-Government
Stranacher K., Tauber A., Rössler T.
Arbeitskonferenz DACH Security, 263-272
Interoperability: Coupling of e-Delivery Domains
Rössler T., Tauber A.
Proceedings of the 8th International Conference on Ongoing Research, General Development Issues and Projects of Electronic Government (EGOV 09), Eighth International Conference EGOV 2008, 247-254, (Schriftenreihe Informatik)
Professional Representation in Austrian EGovernment
Tauber A., Rössler T.
Proceedings of the 8th International Conference EGOV 2009, Eighth International Conference EGOV 2009, 388-398, (Lecture Notes in Computer Science (LNCS))
Requirements for Electronic Delivery Systems in E-Government – An Austrian Experience
Tauber A.
Software Services for e-Business and e-Society: Proceedings of the 9th IFIP WG6.1 Conference, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, 123-133, (IFIP AICT)
Synthesizing Robust Systems
Bloem R., Greimel K., Henzinger T., Jobstmann B.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009, 85-92
The Value of Information Security to European Banking Institutions
Posch R., Georg L., Frefel C., Hämmerli B., Liebenau J., Kärrberg P.
, Detecon
Side-Channel Analysis Attacks and Countermeasures - An Embedded-Software Developers View
Herbst C.
, Doctoral Thesis
Debugging Formal Specifications Using Simple Counterstrategies
Könighofer R., Hofferek G., Bloem R.
Proceedings of 9th International Conference 2009 Formal Methods in Computer Aided Design FMCAD 2009, 9th International Conference Formal Methods in Computer Aided Design, 152-159
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, WISA - Workshop on Information Security Applications, 1-13, (Lecture Notes in Computer Science)
Numerical solvers and cryptanalysis
Nad T., Lamberger M., Rijmen V.
Journal of Mathematical Cryptology, Vol. 3(3), 249-263
Media-break resistant eSignatures in eGovernment – an Austrian experience
Leitold H., Posch R., Rössler T.
Emerging Challenges for Security, Privacy, and Trust , 24th IFIP TC 11 International Information Security Conference, 109-118, (IFIP Advances in Information and Communication Technologies; vol. 297)
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Mendel F., Rechberger C., Schläffer M., Thomsen S.
Fast Software Encryption. FSE 2009, 16th International Fast Software Encryption Workshop, 260-276, (Lecture Notes in Computer Science; vol. 5665)
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
Lamberger M., Mendel F., Rechberger C., Rijmen V., Schläffer M.
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, 126-143, (Lecture Notes in Computer Science; vol. 5912)